Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HBL BLJ2T2411809005 & DAJKT2411000812.exe

Overview

General Information

Sample name:HBL BLJ2T2411809005 & DAJKT2411000812.exe
Analysis ID:1566611
MD5:256fe34a6161cbba558466708ed77ccd
SHA1:570e4231de0facbb5e44c99d46ce5752c52f0fc9
SHA256:537a4ce3b361be65fda8653311be0779be529e3d33b6f193cd60c6fb95f97e30
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Contains functionality to register a low level keyboard hook
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • adobe.exe (PID: 7596 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 256FE34A6161CBBA558466708ED77CCD)
    • adobe.exe (PID: 7632 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 256FE34A6161CBBA558466708ED77CCD)
    • adobe.exe (PID: 7640 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 256FE34A6161CBBA558466708ED77CCD)
  • adobe.exe (PID: 7888 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 256FE34A6161CBBA558466708ED77CCD)
    • adobe.exe (PID: 7916 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 256FE34A6161CBBA558466708ED77CCD)
    • adobe.exe (PID: 7924 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 256FE34A6161CBBA558466708ED77CCD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_evico", "Password": "Doll650#@"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000C.00000002.1498078671.000000000366C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 16 entries
            SourceRuleDescriptionAuthorStrings
            12.2.adobe.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              12.2.adobe.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                12.2.adobe.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33f56:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33fc8:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x34052:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x340e4:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3414e:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x341c0:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x34256:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x342e6:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                12.2.adobe.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x31239:$s2: GetPrivateProfileString
                • 0x30944:$s3: get_OSFullName
                • 0x31f6e:$s5: remove_Key
                • 0x32113:$s5: remove_Key
                • 0x33072:$s6: FtpWebRequest
                • 0x33f38:$s7: logins
                • 0x344aa:$s7: logins
                • 0x371bb:$s7: logins
                • 0x3726d:$s7: logins
                • 0x38bbe:$s7: logins
                • 0x37e07:$s9: 1.85 (Hash, version 2, native byte-order)
                0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 15 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe, ProcessId: 5912, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc, CommandLine: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe", ParentImage: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe, ParentProcessId: 5780, ParentProcessName: HBL BLJ2T2411809005 & DAJKT2411000812.exe, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc, ProcessId: 5896, ProcessName: svchost.exe
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc, CommandLine: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe", ParentImage: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe, ParentProcessId: 5780, ParentProcessName: HBL BLJ2T2411809005 & DAJKT2411000812.exe, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc, ProcessId: 5896, ProcessName: svchost.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeAvira: detected
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeAvira: detection malicious, Label: HEUR/AGEN.1306767
                  Source: 12.2.adobe.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_evico", "Password": "Doll650#@"}
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeReversingLabs: Detection: 42%
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJoe Sandbox ML: detected
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeJoe Sandbox ML: detected
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49728 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49750 version: TLS 1.2
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                  Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                  Source: Joe Sandbox ViewIP Address: 213.189.52.181 213.189.52.181
                  Source: Joe Sandbox ViewASN Name: ECO-ATMAN-PLECO-ATMAN-PL ECO-ATMAN-PLECO-ATMAN-PL
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BDC000.00000004.00000800.00020000.00000000.sdmp, HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.000000000366C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.000000000293C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49728 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49750 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, SKTzxzsJw.cs.Net Code: yMwXHKL8p
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_05749710 SetWindowsHookExA 0000000D,00000000,?,?,?,?,?,?,?,?,?,0574A570,00000000,000000004_2_05749710
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  System Summary

                  barindex
                  Source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 0_2_02FDDF0C0_2_02FDDF0C
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_029FF2084_2_029FF208
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_029FE7004_2_029FE700
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_029F4A904_2_029F4A90
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_029F3E784_2_029F3E78
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_029FB3B04_2_029FB3B0
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_029F41C04_2_029F41C0
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_057426E84_2_057426E8
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_057426DB4_2_057426DB
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_057426A34_2_057426A3
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E62384_2_068E6238
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E23884_2_068E2388
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068EC1D84_2_068EC1D8
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E51E84_2_068E51E8
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068EAE784_2_068EAE78
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E79C84_2_068E79C8
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E59304_2_068E5930
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068EE4004_2_068EE400
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E72E84_2_068E72E8
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068E80084_2_068E8008
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_0072DF0C10_2_0072DF0C
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_0240004010_2_02400040
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_0240000610_2_02400006
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D4E03012_2_01D4E030
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D4E8B812_2_01D4E8B8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D44A9012_2_01D44A90
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D4ADA812_2_01D4ADA8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D43E7812_2_01D43E78
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D441C012_2_01D441C0
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D4AE6812_2_01D4AE68
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC663812_2_06FC6638
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC278812_2_06FC2788
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC55E812_2_06FC55E8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC7DC812_2_06FC7DC8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FCB28012_2_06FCB280
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FCC1D812_2_06FCC1D8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC76E812_2_06FC76E8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FCE40012_2_06FCE400
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC5D3012_2_06FC5D30
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC004012_2_06FC0040
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_06FC000612_2_06FC0006
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_0163DF0C14_2_0163DF0C
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_0570A23014_2_0570A230
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C2E03016_2_00C2E030
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C241C016_2_00C241C0
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C2E8B816_2_00C2E8B8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C24A9016_2_00C24A90
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C2ADA816_2_00C2ADA8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C23E7816_2_00C23E78
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644663816_2_06446638
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644278816_2_06442788
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_06447DC816_2_06447DC8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_064455E816_2_064455E8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644B28016_2_0644B280
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644C1D816_2_0644C1D8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_064476E816_2_064476E8
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644E40016_2_0644E400
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_06445D3016_2_06445D30
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644004016_2_06440040
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_0644001116_2_06440011
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1275401231.000000000139E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSoftwareGame.dll: vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed9e9e37e-59b8-4cab-97db-2b15f3b5cf75.exe4 vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000000.1270033383.0000000000DB2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePrivateOne.exe6 vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276879105.0000000003161000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed9e9e37e-59b8-4cab-97db-2b15f3b5cf75.exe4 vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3740156133.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeBinary or memory string: OriginalFilenamePrivateOne.exe6 vs HBL BLJ2T2411809005 & DAJKT2411000812.exe
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/3@2/2
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile created: C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: NULL
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile read: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, XPE.cs.Net Code: Polan System.AppDomain.Load(byte[])
                  Source: adobe.exe.4.dr, XPE.cs.Net Code: Polan System.AppDomain.Load(byte[])
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: 0x8976A1D5 [Fri Jan 30 17:54:29 2043 UTC]
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_0574BC00 push es; ret 4_2_0574BC10
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068EFC98 push esp; iretd 4_2_068EFC9D
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeCode function: 4_2_068EFBD1 push eax; ret 4_2_068EFBDD
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D40C55 push edi; retf 12_2_01D40C7A
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 12_2_01D4EED0 pushad ; ret 12_2_01D4EED1
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C20C55 push edi; retf 16_2_00C20C7A
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 16_2_00C2EED0 pushad ; ret 16_2_00C2EED1
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exeStatic PE information: section name: .text entropy: 7.4070296863659
                  Source: adobe.exe.4.drStatic PE information: section name: .text entropy: 7.4070296863659
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.5950000.3.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.5950000.3.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                  Source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: 4B60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 720000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2540000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2350000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1830000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 35F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1D70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1610000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3280000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: BE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 28C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599563Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599344Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599110Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598985Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598712Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598572Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598442Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598313Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598189Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597938Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597828Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597594Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597484Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597266Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597156Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596938Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596813Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596593Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596375Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596186Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595110Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594110Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 593985Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 593860Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 593735Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599778Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598671Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598562Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598343Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598234Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598124Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598015Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597796Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597465Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597344Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597233Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597124Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597015Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596906Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596797Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596576Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596468Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596343Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596233Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596125Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596015Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595906Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595796Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595468Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595359Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595140Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594920Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594797Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594685Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594519Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599765Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598766Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598437Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598218Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598109Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597997Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597884Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597607Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597484Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597265Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597156Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596937Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596609Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596391Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596281Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596172Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596062Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595953Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595734Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595625Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595515Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595288Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595181Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595060Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594734Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594625Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594515Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594297Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594187Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWindow / User API: threadDelayed 2455Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWindow / User API: threadDelayed 7365Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 2503Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 7255Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 2193Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 7650Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep count: 33 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7432Thread sleep count: 2455 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599891s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7432Thread sleep count: 7365 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599781s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599563s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599453s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599344s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -599110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598828s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598712s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598572s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598442s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598313s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598189s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -598063s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597938s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597828s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597594s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597484s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597375s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597266s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597156s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -597047s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596938s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596813s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596703s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596593s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596375s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596186s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -596000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -595735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -595610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -595485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -595360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -595235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -595110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -594110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -593985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -593860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe TID: 7428Thread sleep time: -593735s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep count: 36 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7768Thread sleep count: 2503 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7768Thread sleep count: 7255 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599778s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599656s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599547s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599437s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599328s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599218s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599109s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -599000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598890s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598781s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598671s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598562s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598453s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598343s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598234s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598124s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -598015s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597906s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597796s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597687s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597578s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597465s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597344s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597233s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597124s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -597015s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596906s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596797s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596687s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596576s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596468s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596343s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596233s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596125s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -596015s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595906s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595796s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595687s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595578s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595468s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595359s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595250s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595140s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -595031s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -594920s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -594797s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -594685s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7752Thread sleep time: -594519s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7908Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep count: 40 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -36893488147419080s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8052Thread sleep count: 2193 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8052Thread sleep count: 7650 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599765s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599656s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599547s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599437s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599328s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599219s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -599094s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598984s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598875s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598766s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598656s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598547s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598437s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598328s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598218s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -598109s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597997s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597884s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597607s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597484s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597375s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597265s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597156s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -597047s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596937s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596828s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596719s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596609s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596500s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596391s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596281s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596172s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -596062s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595953s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595844s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595734s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595625s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595515s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595406s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595288s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595181s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -595060s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594953s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594844s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594734s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594625s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594515s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594406s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594297s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8048Thread sleep time: -594187s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeLast function: Thread delayed
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599563Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599344Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 599110Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598985Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598712Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598572Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598442Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598313Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598189Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597938Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597828Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597594Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597484Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597266Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597156Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596938Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596813Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596593Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596375Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596186Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 596000Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 595110Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 594110Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 593985Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 593860Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeThread delayed: delay time: 593735Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599778Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599218Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598890Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598671Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598562Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598343Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598234Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598124Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598015Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597796Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597465Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597344Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597233Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597124Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597015Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596906Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596797Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596576Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596468Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596343Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596233Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596125Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596015Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595906Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595796Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595468Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595359Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595140Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595031Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594920Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594797Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594685Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594519Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599765Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598875Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598766Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598656Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598547Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598437Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598328Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598218Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598109Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597997Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597884Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597607Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597484Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597265Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597156Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596937Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596828Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596719Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596609Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596500Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596391Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596281Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596172Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596062Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595953Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595734Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595625Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595515Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595288Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595181Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595060Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594844Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594734Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594625Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594515Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594406Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594297Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594187Jump to behavior
                  Source: svchost.exe, 00000008.00000002.3741030905.000001A501E64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                  Source: svchost.exe, 00000008.00000002.3740819227.000001A501E4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 00000008.00000002.3740819227.000001A501E51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D: @
                  Source: svchost.exe, 00000008.00000002.3740654353.000001A501E24000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: *@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 00000008.00000002.3740395455.000001A501E02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                  Source: svchost.exe, 00000008.00000002.3741030905.000001A501E64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                  Source: svchost.exe, 00000008.00000002.3741946676.000001A501F02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: svchost.exe, 00000008.00000002.3741030905.000001A501E64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                  Source: adobe.exe, 0000000C.00000002.1494393522.0000000001651000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3740868279.000000000101E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~
                  Source: svchost.exe, 00000008.00000002.3740819227.000001A501E51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: adobe.exe, 00000010.00000002.3743048720.0000000000CF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeProcess created: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe "C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q?<b>[ Program Manager]</b> (02/12/2024 10:59:44)<br>{Win}r{Win}rTHdqD
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q8<b>[ Program Manager]</b> (02/12/2024 10:59:44)<br>{Win}THdqD
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR_q`
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q><b>[ Program Manager]</b> (02/12/2024 10:59:44)<br>{Win}r{Win}THdqD
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 12/16/2024 10:02:25<br>User Name: user<br>Computer Name: 648351<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 8.46.123.228<br><hr><b>[ Program Manager]</b> (02/12/2024 10:59:44)<br>{Win}r{Win}r</html>
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q9<b>[ Program Manager]</b> (02/12/2024 10:59:44)<br>{Win}rTHdqD
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_q3<b>[ Program Manager]</b> (02/12/2024 10:59:44)<br>
                  Source: HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR_q4
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1498078671.000000000366C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3745517310.0000000002BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.3747841517.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.3747841517.000000000293C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HBL BLJ2T2411809005 & DAJKT2411000812.exe PID: 5780, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HBL BLJ2T2411809005 & DAJKT2411000812.exe PID: 5912, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7640, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7924, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.3747841517.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HBL BLJ2T2411809005 & DAJKT2411000812.exe PID: 5780, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HBL BLJ2T2411809005 & DAJKT2411000812.exe PID: 5912, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7640, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7924, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 12.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.42e1c80.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ed5b0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.HBL BLJ2T2411809005 & DAJKT2411000812.exe.41ab580.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1498078671.000000000366C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.3745517310.0000000002BDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.3747841517.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.3747841517.000000000293C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: HBL BLJ2T2411809005 & DAJKT2411000812.exe PID: 5780, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: HBL BLJ2T2411809005 & DAJKT2411000812.exe PID: 5912, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7640, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7924, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  Registry Run Keys / Startup Folder
                  112
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  31
                  Input Capture
                  35
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  Registry Run Keys / Startup Folder
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  231
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Software Packing
                  NTDS2
                  Process Discovery
                  Distributed Component Object Model31
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets161
                  Virtualization/Sandbox Evasion
                  SSH1
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Masquerading
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job161
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Hidden Files and Directories
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566611 Sample: HBL BLJ2T2411809005 & DAJKT... Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 35 s4.serv00.com 2->35 37 api.ipify.org 2->37 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus / Scanner detection for submitted sample 2->47 49 8 other signatures 2->49 7 adobe.exe 2 2->7         started        10 HBL BLJ2T2411809005 & DAJKT2411000812.exe 2 2->10         started        12 adobe.exe 3 2->12         started        signatures3 process4 signatures5 51 Antivirus detection for dropped file 7->51 53 Multi AV Scanner detection for dropped file 7->53 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->55 57 2 other signatures 7->57 14 adobe.exe 14 2 7->14         started        17 adobe.exe 7->17         started        19 HBL BLJ2T2411809005 & DAJKT2411000812.exe 16 4 10->19         started        23 svchost.exe 2 10->23         started        25 HBL BLJ2T2411809005 & DAJKT2411000812.exe 10->25         started        27 adobe.exe 2 12->27         started        29 adobe.exe 12->29         started        process6 dnsIp7 39 s4.serv00.com 213.189.52.181, 21, 49709, 49734 ECO-ATMAN-PLECO-ATMAN-PL Poland 19->39 41 api.ipify.org 104.26.13.205, 443, 49707, 49728 CLOUDFLARENETUS United States 19->41 31 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 19->31 dropped 33 C:\Users\user\...\adobe.exe:Zone.Identifier, ASCII 19->33 dropped 59 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->59 61 Tries to steal Mail credentials (via file / registry access) 19->61 63 Drops executable to a common third party application directory 19->63 65 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->65 67 Tries to harvest and steal ftp login credentials 27->67 69 Tries to harvest and steal browser information (history, passwords, etc) 27->69 71 Installs a global keyboard hook 27->71 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  HBL BLJ2T2411809005 & DAJKT2411000812.exe42%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  HBL BLJ2T2411809005 & DAJKT2411000812.exe100%AviraHEUR/AGEN.1306767
                  HBL BLJ2T2411809005 & DAJKT2411000812.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%AviraHEUR/AGEN.1306767
                  C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\Adobe\adobe.exe42%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://s4.serv00.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ipify.org
                  104.26.13.205
                  truefalse
                    high
                    s4.serv00.com
                    213.189.52.181
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.ipify.orgHBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://account.dyn.com/HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org/tHBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameHBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.00000000035F1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.00000000028CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://s4.serv00.comHBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BDC000.00000004.00000800.00020000.00000000.sdmp, HBL BLJ2T2411809005 & DAJKT2411000812.exe, 00000004.00000002.3745517310.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000C.00000002.1498078671.000000000366C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000010.00000002.3747841517.000000000293C000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.26.13.205
                                api.ipify.orgUnited States
                                13335CLOUDFLARENETUSfalse
                                213.189.52.181
                                s4.serv00.comPoland
                                57367ECO-ATMAN-PLECO-ATMAN-PLtrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1566611
                                Start date and time:2024-12-02 14:19:02 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 9m 9s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:22
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@16/3@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 239
                                • Number of non-executed functions: 20
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • VT rate limit hit for: HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                TimeTypeDescription
                                08:19:57API Interceptor7659137x Sleep call for process: HBL BLJ2T2411809005 & DAJKT2411000812.exe modified
                                08:20:10API Interceptor6425664x Sleep call for process: adobe.exe modified
                                14:19:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                                14:20:07AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                104.26.13.2052b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousRDPWrap ToolBrowse
                                • api.ipify.org/
                                Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                • api.ipify.org/
                                213.189.52.181Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                  Arrival Notice - BL 713410220035.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                    BL NBNSA240600050.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                          Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            s4.serv00.comStatement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.189.52.181
                                            Arrival Notice - BL 713410220035.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.189.52.181
                                            BL NBNSA240600050.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 213.189.52.181
                                            DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 213.189.52.181
                                            PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.189.52.181
                                            Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.189.52.181
                                            api.ipify.orghttps://drive.google.com/uc?export=download&id=1YBKJhy1GWwuEta_1b7KX-jKtXfpHDuuYGet hashmaliciousHTMLPhisherBrowse
                                            • 104.26.13.205
                                            1d5sraR1S1.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            P4toChrGer.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            zed.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            back.ps1Get hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            zed.exeGet hashmaliciousUnknownBrowse
                                            • 172.67.74.152
                                            kyjjrfgjjsedf.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.13.205
                                            kohjaekdfth.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.13.205
                                            kthkksefd.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.13.205
                                            jhnykawfkth.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 104.26.12.205
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSFonts.exeGet hashmaliciousMassLogger RATBrowse
                                            • 104.21.67.152
                                            New Order C0038 2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 172.67.177.134
                                            Order MEI PO IM202411484.exeGet hashmaliciousFormBookBrowse
                                            • 172.67.186.192
                                            021337ISOGENERAL.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                            • 172.67.177.134
                                            https://management.sigmaonline.ro/newsletter_re_news.php?from_email=&abonat_id=&newsletter_id=773&followLink=http://ezp-prod1.hul.harvard.edu/login?url=https://accotoxtnation.es/mime/#Y25pY2hvbHNAZGVyaWNrZGVybWF0b2xvZ3kuY29tGet hashmaliciousHTMLPhisherBrowse
                                            • 104.17.25.14
                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                            • 104.21.16.9
                                            https://a.rs6.net/1/pc?ep=e4f2f4ad2c30fbb2SK2ZyQxbsE02cV3UOfuPD-JxSRgUD6Y86mFtUF3WRqjeuMrz9o3Xbb320wCTDsWWUHuFG0qWroCiniptiREBdHyyzdrPc45m6t-HBEB7SZ8gZX4dYr4o80JwDUJz1eSGQlrcb9as_P_3jZu-t-DrRTdQARm9vPjp5IAqdyzm4bLxpaVnP8_0eRiLoUggvzge&c=$%7bContact.encryptedContactId%7dGet hashmaliciousHTMLPhisherBrowse
                                            • 104.18.95.41
                                            https://secure_sharing0utlook.wesendit.com/dl/ON6fQWpNLtFc53e1u/bWlrZS5zbGVpZ2h0QGtlbXRpbGUuY28udWsGet hashmaliciousHTMLPhisherBrowse
                                            • 104.21.11.98
                                            https://atpscan.global.hornetsecurity.com/?d=m-jrZYNTvS7OucEG6zgopo_P-eFuotBy6khKzMMoLZ4&f=B3z_aD7k-FJHzGTgRypMC4okZ3IwSory4vTIxE3HdJ_vtmaZKtKUThjBimGO9ug0&i=&k=4AW8&m=GVQPkt_RSTiDpwD3aZUptFFr0zCshjoFLqhJ3NjtibWBkTpV22jDRnOpUHUftsT9uvGtNvEk65KPlyjsi0fzlHEgnGzER6prH6oEwQ6iGZMuyrzkW43X0VpXiLTd8OwU&n=LPqMxEbLmB_Zh1f7NoMu0JEABS3tNgPjYsrca87TqctDejHSuebypqLStQvhBN5eG43hQ2ReWbrTClyFyYZQHA&r=-0Amt46rVl0s1yn8_P2jWFIQhQ5qvzjVNyyZ7Ng6X4pWNR2O0BffN49tqRoSmkJg&s=ef9a322854c7503d3037fcbcda0a6c433cee94d107fe0a8ab1fda12b2f14509b&u=https%3A%2F%2Fsecure_sharing0utlook.wesendit.com%2Fdl%2FON6fQWpNLtFc53e1u%2FbWlrZS5zbGVpZ2h0QGtlbXRpbGUuY28udWsGet hashmaliciousUnknownBrowse
                                            • 104.17.25.14
                                            https://www.therooms.ca/sites/default/files/images/virtual-exhibits/rnr/3dobject_example.zipGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            ECO-ATMAN-PLECO-ATMAN-PLAmalgamers.exeGet hashmaliciousAgentTeslaBrowse
                                            • 185.36.171.17
                                            Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.189.52.181
                                            9zldYT23H2.elfGet hashmaliciousMirai, GafgytBrowse
                                            • 31.186.82.2
                                            RicevutaPagamento_115538206.datGet hashmaliciousUnknownBrowse
                                            • 128.204.223.111
                                            http://bdvenlineabanven.serv00.net/Get hashmaliciousUnknownBrowse
                                            • 85.194.246.69
                                            http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                            • 85.194.246.69
                                            http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                            • 85.194.246.69
                                            http://ahksoch.serv00.net/x92gamy6wh/Get hashmaliciousHTMLPhisherBrowse
                                            • 128.204.218.63
                                            http://intesa-it.serv00.net/it/conto/Get hashmaliciousUnknownBrowse
                                            • 85.194.246.69
                                            https://spofity.serv00.net/spotify/auth/login.phpGet hashmaliciousUnknownBrowse
                                            • 128.204.223.117
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0eNew Order C0038 2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 104.26.13.205
                                            faktura461250706050720242711#U00b7pdf.vbsGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            021337ISOGENERAL.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                            • 104.26.13.205
                                            11315781264#U00b7pdf.vbsGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            30180908_signed#U00b7pdf.vbsGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            https://secure_sharing0utlook.wesendit.com/dl/ON6fQWpNLtFc53e1u/bWlrZS5zbGVpZ2h0QGtlbXRpbGUuY28udWsGet hashmaliciousHTMLPhisherBrowse
                                            • 104.26.13.205
                                            asegurar.vbsGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                            • 104.26.13.205
                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                            • 104.26.13.205
                                            seemebestgoodluckthings.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                            • 104.26.13.205
                                            No context
                                            Process:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):1119
                                            Entropy (8bit):5.345080863654519
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                            MD5:88593431AEF401417595E7A00FE86E5F
                                            SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                            SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                            SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):522240
                                            Entropy (8bit):7.394684871017393
                                            Encrypted:false
                                            SSDEEP:6144:42mQ0BNkLswVju5lVwpNGQlzh5GuVWbX8svn6MZTqpU+1ltHWG3xxnVD6nnn:48Ldj4Dwpblzh5GuVWzhqisltHWqznV
                                            MD5:256FE34A6161CBBA558466708ED77CCD
                                            SHA1:570E4231DE0FACBB5E44C99D46CE5752C52F0FC9
                                            SHA-256:537A4CE3B361BE65FDA8653311BE0779BE529E3D33B6F193CD60C6FB95F97E30
                                            SHA-512:907634D8505A0A78700FE9C7AACE67021BD8BBD8328CC1F63CA8CFD6CFF5FCC07690357FE45A5EFDFE5757492CF7294E5676A4E853F8B5E75218D499CF5747D3
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 42%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v...............0.............^.... ... ....@.. .......................`............@.....................................O.... .......................@....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................@.......H........I..\.......L........?..........................................".(,....*Vs-........s.........*.s.........*.~....o/...*.s-........*Vs-........(Q........*...sO...}......(P..... ... ....sQ...(R.....r...poS....*j.(T.....(U....sI...(V....*&.(,.....*".......*".([....*VsS...(\...t.........*F.~....(e....i...*6.~.....(f...*F.~....(e....i...*6.~.....(f...*F.~....(e....i...*6.~.....(f...*F.~....(e........*J.~..........(g...*F.~....(e....i...*6.~.....(f...*F.~....(e........*J.~
                                            Process:C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.394684871017393
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            File size:522'240 bytes
                                            MD5:256fe34a6161cbba558466708ed77ccd
                                            SHA1:570e4231de0facbb5e44c99d46ce5752c52f0fc9
                                            SHA256:537a4ce3b361be65fda8653311be0779be529e3d33b6f193cd60c6fb95f97e30
                                            SHA512:907634d8505a0a78700fe9c7aace67021bd8bbd8328cc1f63ca8cfd6cff5fcc07690357fe45a5efdfe5757492cf7294e5676a4e853f8b5e75218d499cf5747d3
                                            SSDEEP:6144:42mQ0BNkLswVju5lVwpNGQlzh5GuVWbX8svn6MZTqpU+1ltHWG3xxnVD6nnn:48Ldj4Dwpblzh5GuVWzhqisltHWqznV
                                            TLSH:28B4BF0D3A6059B5DA3985F1B8E3407D6B70B55261E2C42229CF1FDCADCEB404B972AF
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....v...............0.............^.... ... ....@.. .......................`............@................................
                                            Icon Hash:90cececece8e8eb0
                                            Entrypoint:0x480d5e
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x8976A1D5 [Fri Jan 30 17:54:29 2043 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x80d0c0x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x820000x5b6.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x840000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x7ed640x7ee00f3fe2b57a51b3b7dd2bbe92017e68bb5False0.6460764316502463data7.4070296863659IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0x820000x5b60x600d94fd2bf821d2183d1719c5f5b77eca4False0.41796875data4.079548048119175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x840000xc0x200a862b1cba24ea37ade4b4c9bf99c3c19False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_VERSION0x820a00x32cdata0.4211822660098522
                                            RT_MANIFEST0x823cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 2, 2024 14:19:56.666629076 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:56.666671038 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:56.666821957 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:56.673712969 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:56.673734903 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:57.938107014 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:57.938225985 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:57.942675114 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:57.942683935 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:57.942965984 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:57.989347935 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:58.044884920 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:58.091330051 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:58.393472910 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:58.393543959 CET44349707104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:19:58.393646002 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:58.400103092 CET49707443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:19:59.309859991 CET4970921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:19:59.430053949 CET2149709213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:19:59.430155993 CET4970921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:19:59.434665918 CET4970921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:19:59.554755926 CET2149709213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:19:59.554856062 CET4970921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:09.769798040 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:09.769841909 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:09.770114899 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:09.773680925 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:09.773695946 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.004793882 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.004925013 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:11.045969963 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:11.045984030 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.046322107 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.101876974 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:11.234616041 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:11.279333115 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.564970970 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.565021038 CET44349728104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:11.565073013 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:11.568355083 CET49728443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:12.073657990 CET4973421192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:12.193619967 CET2149734213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:20:12.193691969 CET4973421192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:12.196187973 CET4973421192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:12.316803932 CET2149734213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:20:12.316859007 CET4973421192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:18.296086073 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:18.296129942 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:18.296210051 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:18.300077915 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:18.300100088 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:19.667088985 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:19.667190075 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:19.670197010 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:19.670206070 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:19.670475006 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:19.719502926 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:19.767330885 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:20.131300926 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:20.131371021 CET44349750104.26.13.205192.168.2.11
                                            Dec 2, 2024 14:20:20.131443024 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:20.134267092 CET49750443192.168.2.11104.26.13.205
                                            Dec 2, 2024 14:20:20.988517046 CET4975921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:21.110188007 CET2149759213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:20:21.110268116 CET4975921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:21.112919092 CET4975921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:20:21.232863903 CET2149759213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:20:21.235960007 CET4975921192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:21:32.783992052 CET4990721192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:21:32.905145884 CET2149907213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:21:32.908123016 CET4990721192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:21:32.912005901 CET4990721192.168.2.11213.189.52.181
                                            Dec 2, 2024 14:21:33.032042980 CET2149907213.189.52.181192.168.2.11
                                            Dec 2, 2024 14:21:33.036207914 CET4990721192.168.2.11213.189.52.181
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 2, 2024 14:19:56.520045042 CET6513453192.168.2.111.1.1.1
                                            Dec 2, 2024 14:19:56.659849882 CET53651341.1.1.1192.168.2.11
                                            Dec 2, 2024 14:19:58.953334093 CET5542053192.168.2.111.1.1.1
                                            Dec 2, 2024 14:19:59.308744907 CET53554201.1.1.1192.168.2.11
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Dec 2, 2024 14:19:56.520045042 CET192.168.2.111.1.1.10x39f6Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            Dec 2, 2024 14:19:58.953334093 CET192.168.2.111.1.1.10xd545Standard query (0)s4.serv00.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Dec 2, 2024 14:19:56.659849882 CET1.1.1.1192.168.2.110x39f6No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Dec 2, 2024 14:19:56.659849882 CET1.1.1.1192.168.2.110x39f6No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            Dec 2, 2024 14:19:56.659849882 CET1.1.1.1192.168.2.110x39f6No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Dec 2, 2024 14:19:59.308744907 CET1.1.1.1192.168.2.110xd545No error (0)s4.serv00.com213.189.52.181A (IP address)IN (0x0001)false
                                            • api.ipify.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.1149707104.26.13.2054435912C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            TimestampBytes transferredDirectionData
                                            2024-12-02 13:19:58 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-12-02 13:19:58 UTC424INHTTP/1.1 200 OK
                                            Date: Mon, 02 Dec 2024 13:19:58 GMT
                                            Content-Type: text/plain
                                            Content-Length: 12
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8ebb9c94df8e8c2f-EWR
                                            server-timing: cfL4;desc="?proto=TCP&rtt=1823&min_rtt=1823&rtt_var=684&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1600877&cwnd=243&unsent_bytes=0&cid=b8210949d4c12731&ts=466&x=0"
                                            2024-12-02 13:19:58 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                            Data Ascii: 8.46.123.228


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.1149728104.26.13.2054437640C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-12-02 13:20:11 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-12-02 13:20:11 UTC424INHTTP/1.1 200 OK
                                            Date: Mon, 02 Dec 2024 13:20:11 GMT
                                            Content-Type: text/plain
                                            Content-Length: 12
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8ebb9ce739b941a1-EWR
                                            server-timing: cfL4;desc="?proto=TCP&rtt=1734&min_rtt=1699&rtt_var=662&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1718658&cwnd=224&unsent_bytes=0&cid=bc71ff0dcbc18bac&ts=585&x=0"
                                            2024-12-02 13:20:11 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                            Data Ascii: 8.46.123.228


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.1149750104.26.13.2054437924C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            TimestampBytes transferredDirectionData
                                            2024-12-02 13:20:19 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-12-02 13:20:20 UTC427INHTTP/1.1 200 OK
                                            Date: Mon, 02 Dec 2024 13:20:19 GMT
                                            Content-Type: text/plain
                                            Content-Length: 12
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8ebb9d1cb92642c0-EWR
                                            server-timing: cfL4;desc="?proto=TCP&rtt=33550&min_rtt=1651&rtt_var=19597&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1768625&cwnd=208&unsent_bytes=0&cid=20834c04afdbc09f&ts=468&x=0"
                                            2024-12-02 13:20:20 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                            Data Ascii: 8.46.123.228


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:08:19:54
                                            Start date:02/12/2024
                                            Path:C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"
                                            Imagebase:0xd30000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1276953901.0000000004169000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:08:19:54
                                            Start date:02/12/2024
                                            Path:C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"
                                            Imagebase:0x3e0000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:4
                                            Start time:08:19:54
                                            Start date:02/12/2024
                                            Path:C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\HBL BLJ2T2411809005 & DAJKT2411000812.exe"
                                            Imagebase:0x870000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3745517310.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3745517310.0000000002BDC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:8
                                            Start time:08:19:55
                                            Start date:02/12/2024
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                            Imagebase:0x7ff68dea0000
                                            File size:55'320 bytes
                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:10
                                            Start time:08:20:07
                                            Start date:02/12/2024
                                            Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                            Imagebase:0x40000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 42%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:11
                                            Start time:08:20:08
                                            Start date:02/12/2024
                                            Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                            Imagebase:0x3a0000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:12
                                            Start time:08:20:08
                                            Start date:02/12/2024
                                            Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                            Imagebase:0xf50000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.1498078671.000000000366C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.1498078671.0000000003641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.1493408156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:14
                                            Start time:08:20:15
                                            Start date:02/12/2024
                                            Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                            Imagebase:0xd70000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:15
                                            Start time:08:20:16
                                            Start date:02/12/2024
                                            Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                            Imagebase:0x240000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:16
                                            Start time:08:20:16
                                            Start date:02/12/2024
                                            Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                            Imagebase:0x510000
                                            File size:522'240 bytes
                                            MD5 hash:256FE34A6161CBBA558466708ED77CCD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.3747841517.0000000002911000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.3747841517.0000000002911000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.3747841517.000000000293C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:7.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:73
                                              Total number of Limit Nodes:6
                                              execution_graph 16860 2fd4668 16861 2fd467a 16860->16861 16862 2fd4686 16861->16862 16866 2fd4779 16861->16866 16871 2fd3e10 16862->16871 16867 2fd479d 16866->16867 16875 2fd4888 16867->16875 16879 2fd4878 16867->16879 16872 2fd3e1b 16871->16872 16887 2fd5d6c 16872->16887 16874 2fd705e 16874->16874 16876 2fd48af 16875->16876 16877 2fd498c 16876->16877 16883 2fd4248 16876->16883 16881 2fd48af 16879->16881 16880 2fd498c 16880->16880 16881->16880 16882 2fd4248 CreateActCtxA 16881->16882 16882->16880 16884 2fd5918 CreateActCtxA 16883->16884 16886 2fd59db 16884->16886 16888 2fd5d77 16887->16888 16891 2fd5d8c 16888->16891 16890 2fd71bd 16890->16874 16892 2fd5d97 16891->16892 16895 2fd5dbc 16892->16895 16894 2fd729a 16894->16890 16896 2fd5dc7 16895->16896 16899 2fd5dec 16896->16899 16898 2fd738d 16898->16894 16900 2fd5df7 16899->16900 16902 2fd88eb 16900->16902 16905 2fdafa0 16900->16905 16901 2fd8929 16901->16898 16902->16901 16910 2fdd080 16902->16910 16906 2fdafad 16905->16906 16915 2fdafc9 16906->16915 16919 2fdafd8 16906->16919 16907 2fdafb6 16907->16902 16911 2fdd0b1 16910->16911 16912 2fdd0d5 16911->16912 16927 2fdd231 16911->16927 16931 2fdd240 16911->16931 16912->16901 16916 2fdafd8 16915->16916 16922 2fdb0d0 16916->16922 16917 2fdafe7 16917->16907 16921 2fdb0d0 GetModuleHandleW 16919->16921 16920 2fdafe7 16920->16907 16921->16920 16923 2fdb104 16922->16923 16924 2fdb0e1 16922->16924 16923->16917 16924->16923 16925 2fdb308 GetModuleHandleW 16924->16925 16926 2fdb335 16925->16926 16926->16917 16929 2fdd240 16927->16929 16928 2fdd287 16928->16912 16929->16928 16935 2fdcb68 16929->16935 16933 2fdd24d 16931->16933 16932 2fdd287 16932->16912 16933->16932 16934 2fdcb68 GetModuleHandleW 16933->16934 16934->16932 16936 2fdcb73 16935->16936 16938 2fddb98 16936->16938 16939 2fdcc94 16936->16939 16938->16938 16940 2fdcc9f 16939->16940 16941 2fd5dec GetModuleHandleW 16940->16941 16942 2fddc07 16941->16942 16942->16938 16943 2fdd358 16944 2fdd39e GetCurrentProcess 16943->16944 16946 2fdd3e9 16944->16946 16947 2fdd3f0 GetCurrentThread 16944->16947 16946->16947 16948 2fdd42d GetCurrentProcess 16947->16948 16949 2fdd426 16947->16949 16950 2fdd463 16948->16950 16949->16948 16951 2fdd48b GetCurrentThreadId 16950->16951 16952 2fdd4bc 16951->16952 16953 2fdd5a0 DuplicateHandle 16954 2fdd636 16953->16954

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 294 2fdd349-2fdd3e7 GetCurrentProcess 298 2fdd3e9-2fdd3ef 294->298 299 2fdd3f0-2fdd424 GetCurrentThread 294->299 298->299 300 2fdd42d-2fdd461 GetCurrentProcess 299->300 301 2fdd426-2fdd42c 299->301 303 2fdd46a-2fdd485 call 2fdd527 300->303 304 2fdd463-2fdd469 300->304 301->300 306 2fdd48b-2fdd4ba GetCurrentThreadId 303->306 304->303 308 2fdd4bc-2fdd4c2 306->308 309 2fdd4c3-2fdd525 306->309 308->309
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 02FDD3D6
                                              • GetCurrentThread.KERNEL32 ref: 02FDD413
                                              • GetCurrentProcess.KERNEL32 ref: 02FDD450
                                              • GetCurrentThreadId.KERNEL32 ref: 02FDD4A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 36655bd6c6adc9f714c66f38bbd72d5bc9b09b68e28100b63d78eb8440ff03d3
                                              • Instruction ID: c91432868f20785cba4c90c180e2500e22ff7b65299373ebb2b1cfd81dca9845
                                              • Opcode Fuzzy Hash: 36655bd6c6adc9f714c66f38bbd72d5bc9b09b68e28100b63d78eb8440ff03d3
                                              • Instruction Fuzzy Hash: 805176B59002098FDB58DFA9D648BDEBBF2EF48304F248459E009B73A0D734A984CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 316 2fdd358-2fdd3e7 GetCurrentProcess 320 2fdd3e9-2fdd3ef 316->320 321 2fdd3f0-2fdd424 GetCurrentThread 316->321 320->321 322 2fdd42d-2fdd461 GetCurrentProcess 321->322 323 2fdd426-2fdd42c 321->323 325 2fdd46a-2fdd485 call 2fdd527 322->325 326 2fdd463-2fdd469 322->326 323->322 328 2fdd48b-2fdd4ba GetCurrentThreadId 325->328 326->325 330 2fdd4bc-2fdd4c2 328->330 331 2fdd4c3-2fdd525 328->331 330->331
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 02FDD3D6
                                              • GetCurrentThread.KERNEL32 ref: 02FDD413
                                              • GetCurrentProcess.KERNEL32 ref: 02FDD450
                                              • GetCurrentThreadId.KERNEL32 ref: 02FDD4A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 5daf8c759e1efdde34a619b721502ac997bb4216c4f7edf10d58c8a5a594e2ca
                                              • Instruction ID: 47ea9f536954da31f75e659785cf16e17caabf1fe1eae48d10410813a9f7e3ad
                                              • Opcode Fuzzy Hash: 5daf8c759e1efdde34a619b721502ac997bb4216c4f7edf10d58c8a5a594e2ca
                                              • Instruction Fuzzy Hash: 995177B09002098FDB58DFAAD648B9EBBF6FF48304F248459E009B7360D7356884CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 360 2fdb0d0-2fdb0df 361 2fdb10b-2fdb10f 360->361 362 2fdb0e1-2fdb0ee call 2fdaaa4 360->362 363 2fdb111-2fdb11b 361->363 364 2fdb123-2fdb164 361->364 369 2fdb104 362->369 370 2fdb0f0 362->370 363->364 371 2fdb166-2fdb16e 364->371 372 2fdb171-2fdb17f 364->372 369->361 415 2fdb0f6 call 2fdb368 370->415 416 2fdb0f6 call 2fdb358 370->416 371->372 374 2fdb181-2fdb186 372->374 375 2fdb1a3-2fdb1a5 372->375 373 2fdb0fc-2fdb0fe 373->369 376 2fdb240-2fdb300 373->376 378 2fdb188-2fdb18f call 2fdaab0 374->378 379 2fdb191 374->379 377 2fdb1a8-2fdb1af 375->377 410 2fdb308-2fdb333 GetModuleHandleW 376->410 411 2fdb302-2fdb305 376->411 381 2fdb1bc-2fdb1c3 377->381 382 2fdb1b1-2fdb1b9 377->382 380 2fdb193-2fdb1a1 378->380 379->380 380->377 385 2fdb1c5-2fdb1cd 381->385 386 2fdb1d0-2fdb1d9 call 2fdaac0 381->386 382->381 385->386 391 2fdb1db-2fdb1e3 386->391 392 2fdb1e6-2fdb1eb 386->392 391->392 393 2fdb1ed-2fdb1f4 392->393 394 2fdb209-2fdb216 392->394 393->394 396 2fdb1f6-2fdb206 call 2fdaad0 call 2fdaae0 393->396 401 2fdb239-2fdb23f 394->401 402 2fdb218-2fdb236 394->402 396->394 402->401 412 2fdb33c-2fdb350 410->412 413 2fdb335-2fdb33b 410->413 411->410 413->412 415->373 416->373
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02FDB326
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 97ecb5761a6ae28d9d5903dfb9d7fd9de5edaa818caabf0d662464c1205e2883
                                              • Instruction ID: 5885851f312a3b5520b3af063a67348068e3c97cca518f43f4e917147355da7f
                                              • Opcode Fuzzy Hash: 97ecb5761a6ae28d9d5903dfb9d7fd9de5edaa818caabf0d662464c1205e2883
                                              • Instruction Fuzzy Hash: 75713470A00B058FDB24DF29D54475ABBF2FF88348F148A2DD58ADBA50EB74E845CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 417 2fd590d-2fd59d9 CreateActCtxA 419 2fd59db-2fd59e1 417->419 420 2fd59e2-2fd5a3c 417->420 419->420 427 2fd5a3e-2fd5a41 420->427 428 2fd5a4b-2fd5a4f 420->428 427->428 429 2fd5a51-2fd5a5d 428->429 430 2fd5a60-2fd5a90 428->430 429->430 434 2fd5a42-2fd5a47 430->434 435 2fd5a92-2fd5b14 430->435 434->428
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 02FD59C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: fd173a8b0623ad51b261948c7b2e44e3831a0fa93b535da91ab1f22b9ea87465
                                              • Instruction ID: a93866d7fe8a042ba73c7b07bfd1fd16b8bfb967cb7c55eee90e3dbabe237b83
                                              • Opcode Fuzzy Hash: fd173a8b0623ad51b261948c7b2e44e3831a0fa93b535da91ab1f22b9ea87465
                                              • Instruction Fuzzy Hash: C041F1B0C00629CFDB24DFA9C884B9DBBF6FF49308F64806AD408AB255DB756949CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 438 2fd4248-2fd59d9 CreateActCtxA 441 2fd59db-2fd59e1 438->441 442 2fd59e2-2fd5a3c 438->442 441->442 449 2fd5a3e-2fd5a41 442->449 450 2fd5a4b-2fd5a4f 442->450 449->450 451 2fd5a51-2fd5a5d 450->451 452 2fd5a60-2fd5a90 450->452 451->452 456 2fd5a42-2fd5a47 452->456 457 2fd5a92-2fd5b14 452->457 456->450
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 02FD59C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: f996d89dfa7bf012ed05f3e1653fac088971f23edbc7450834f163a8a79af7fb
                                              • Instruction ID: 99abbbf24dd3481a0fe3f25f2c3f1d69af4eef97980fe7981a446e608df77b54
                                              • Opcode Fuzzy Hash: f996d89dfa7bf012ed05f3e1653fac088971f23edbc7450834f163a8a79af7fb
                                              • Instruction Fuzzy Hash: 3E41F1B0D0061DCBDB24DFA9C984B9DBBB6FF49308F64806AD408AB255DB716949CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 465 2fdd5a0-2fdd634 DuplicateHandle 466 2fdd63d-2fdd65a 465->466 467 2fdd636-2fdd63c 465->467 467->466
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02FDD627
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 70943e378bac4ec67ad6fa8d1c13e599bedea06fa4f5fc8d9533343a39cda745
                                              • Instruction ID: 69661c9fce35d5cda781182c79675d7623572af323e65258bd88a76ffaea13e2
                                              • Opcode Fuzzy Hash: 70943e378bac4ec67ad6fa8d1c13e599bedea06fa4f5fc8d9533343a39cda745
                                              • Instruction Fuzzy Hash: CF21C2B5D00248AFDB10DFAAD984ADEBFF9EB48310F14841AE918A3350D375A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 460 2fdd599-2fdd634 DuplicateHandle 461 2fdd63d-2fdd65a 460->461 462 2fdd636-2fdd63c 460->462 462->461
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02FDD627
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 7d93ffe0299937c2d9a4b6f4354a9b72335d4b252bd4ad41668877f66246b53b
                                              • Instruction ID: 22ec410c083ec06870c25e86e94d958fa065b03684b0e24c56af8640bf04974f
                                              • Opcode Fuzzy Hash: 7d93ffe0299937c2d9a4b6f4354a9b72335d4b252bd4ad41668877f66246b53b
                                              • Instruction Fuzzy Hash: 8721E2B6D00208DFDB10CFAAD984ADEBBF5EB48314F14841AE918B3350D378A944CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 470 2fdb2c0-2fdb300 471 2fdb308-2fdb333 GetModuleHandleW 470->471 472 2fdb302-2fdb305 470->472 473 2fdb33c-2fdb350 471->473 474 2fdb335-2fdb33b 471->474 472->471 474->473
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02FDB326
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: c577b40193f9769842449c5477de5e8f83a6a7fe0f3490c74e1a7bdb1614a1d2
                                              • Instruction ID: 82a27aaee4d8c371855cff83e915809c25230e836e6d7298afe705d97cbfa2d3
                                              • Opcode Fuzzy Hash: c577b40193f9769842449c5477de5e8f83a6a7fe0f3490c74e1a7bdb1614a1d2
                                              • Instruction Fuzzy Hash: F011FDB5C003498BCB10DF9AD444A9EFBF5AB88214F15841AD518B7200D375A545CFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276206803.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16ad000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 69448f9a2f4f9f31d1509f203fd6b0acd607b1622d94f0f926e9b059a369a8ae
                                              • Instruction ID: 308982790823ac90387248125c53b1f681169ffefb1a2b3abe2f667d156fca8a
                                              • Opcode Fuzzy Hash: 69448f9a2f4f9f31d1509f203fd6b0acd607b1622d94f0f926e9b059a369a8ae
                                              • Instruction Fuzzy Hash: 742125B1504240DFDB05DF58DDC0B26BF65FB88318F64C569E9490B756C336D816CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276206803.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16ad000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b750662d975c231d27df9d97dbf6414a9dc4b1e501a3fa9fe5c6f3135fa0b034
                                              • Instruction ID: 22077158ece0a6df7f8937f68be5e1aa0fc40c1643d395f779e93cd5b205328c
                                              • Opcode Fuzzy Hash: b750662d975c231d27df9d97dbf6414a9dc4b1e501a3fa9fe5c6f3135fa0b034
                                              • Instruction Fuzzy Hash: 04214871100204DFDB01DF48CDC0B5ABF65FB88314F60C168E9090B75AC336E806CAA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276256871.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16bd000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d39848274dc592df9dac0737eb5fa4078987b95562403e18ac91e0c8608485c7
                                              • Instruction ID: 595eda6eba86dc642d5b5aee18fbbadfaee6488237088cbcc40e79ec498c14ab
                                              • Opcode Fuzzy Hash: d39848274dc592df9dac0737eb5fa4078987b95562403e18ac91e0c8608485c7
                                              • Instruction Fuzzy Hash: 48210075604200DFCB15DF98D9C0B66BF65EB88318F20C5A9E80A0F396C33AD487CB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276256871.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16bd000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 455010dbad98842a8233741ce998be2d3f0e6e69f9f7e0787cf6e83f1cf49dfb
                                              • Instruction ID: 22f77e9a885e18b2af04253cc28ebda99d4bfc87f604b7d2bdc533031939955d
                                              • Opcode Fuzzy Hash: 455010dbad98842a8233741ce998be2d3f0e6e69f9f7e0787cf6e83f1cf49dfb
                                              • Instruction Fuzzy Hash: 5B218E755093808FDB03CF24D9D4B15BF71EB46218F28C5DAD8498F2A7C33A984ACB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276206803.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16ad000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                              • Instruction ID: 8104a9c9fb910804221568e99c95272347b37dbeff289baf1497df53fe3b403c
                                              • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                              • Instruction Fuzzy Hash: 2D11E172404280CFCB02CF54D9C4B1ABF71FB84314F24C6A9D8490B656C336D85ACFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276206803.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_16ad000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                              • Instruction ID: a0099b6d249c16e9498ed5ade98945c67a3ca1a60027007dfa09f14d8de88c8e
                                              • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                              • Instruction Fuzzy Hash: 0B11CD76404240DFDB02CF44D9C4B56BF61FB84224F24C2A9D9090A656C33AE85ACBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1276531102.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2fd0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aad6ae59dbbb8a0d97bfff2865cc276ff07f5c2e0c06f9b7ca6b50f513f6993d
                                              • Instruction ID: a4a868a5fe491656bf4dadb5d55345d9ef6dc8b62e032b73f52c3fe08c9941ff
                                              • Opcode Fuzzy Hash: aad6ae59dbbb8a0d97bfff2865cc276ff07f5c2e0c06f9b7ca6b50f513f6993d
                                              • Instruction Fuzzy Hash: F6A16D36E002098FCF19DFB4C94099EB7B3FF89344B19856AE906AB265DB71E945CF40

                                              Execution Graph

                                              Execution Coverage:11.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:2.1%
                                              Total number of Nodes:141
                                              Total number of Limit Nodes:16
                                              execution_graph 39951 5746d90 39952 5746d91 GetCurrentProcess 39951->39952 39954 5746e21 39952->39954 39955 5746e28 GetCurrentThread 39952->39955 39954->39955 39956 5746e65 GetCurrentProcess 39955->39956 39957 5746e5e 39955->39957 39958 5746e9b 39956->39958 39957->39956 39959 5746ec3 GetCurrentThreadId 39958->39959 39960 5746ef4 39959->39960 40007 5748a20 40008 5748a2b 40007->40008 40009 5748a3b 40008->40009 40011 57484a0 40008->40011 40012 5748a70 OleInitialize 40011->40012 40013 5748ad4 40012->40013 40013->40009 40014 29f0848 40016 29f084e 40014->40016 40015 29f091b 40016->40015 40018 29f1353 40016->40018 40019 29f1366 40018->40019 40020 29f147a 40019->40020 40031 29f7ebc 40019->40031 40036 29f7f59 40019->40036 40041 29f7d83 40019->40041 40046 29f7d90 40019->40046 40051 29f7efa 40019->40051 40056 574a491 40019->40056 40062 574a4a0 40019->40062 40068 29f8128 40019->40068 40072 29f811b 40019->40072 40076 29f8829 40019->40076 40020->40016 40032 29f7ec1 40031->40032 40081 29f7fff 40032->40081 40085 29f8008 40032->40085 40033 29f7feb 40033->40019 40038 29f7f5e 40036->40038 40037 29f7feb 40037->40019 40039 29f7fff DeleteFileW 40038->40039 40040 29f8008 DeleteFileW 40038->40040 40039->40037 40040->40037 40043 29f7da9 40041->40043 40042 29f7feb 40042->40019 40043->40042 40044 29f7fff DeleteFileW 40043->40044 40045 29f8008 DeleteFileW 40043->40045 40044->40042 40045->40042 40048 29f7da9 40046->40048 40047 29f7feb 40047->40019 40048->40047 40049 29f7fff DeleteFileW 40048->40049 40050 29f8008 DeleteFileW 40048->40050 40049->40047 40050->40047 40052 29f7eff 40051->40052 40054 29f7fff DeleteFileW 40052->40054 40055 29f8008 DeleteFileW 40052->40055 40053 29f7feb 40053->40019 40054->40053 40055->40053 40057 574a4a8 40056->40057 40058 574a4ed 40057->40058 40093 574a500 40057->40093 40097 574a582 40057->40097 40101 574a4f0 40057->40101 40058->40019 40063 574a4a8 40062->40063 40064 574a4ed 40063->40064 40065 574a500 SetWindowsHookExA 40063->40065 40066 574a4f0 SetWindowsHookExA 40063->40066 40067 574a582 SetWindowsHookExA 40063->40067 40064->40019 40065->40063 40066->40063 40067->40063 40070 29f8147 40068->40070 40069 29f8202 40069->40019 40070->40069 40109 29f7800 40070->40109 40074 29f8147 40072->40074 40073 29f8202 40073->40019 40074->40073 40075 29f7800 MoveFileA 40074->40075 40075->40073 40077 29f8833 40076->40077 40078 29f88e9 40077->40078 40113 68ef5c8 40077->40113 40119 68ef5b8 40077->40119 40078->40019 40083 29f8008 40081->40083 40082 29f804a 40082->40033 40083->40082 40089 29f77d8 40083->40089 40086 29f8018 40085->40086 40087 29f804a 40086->40087 40088 29f77d8 DeleteFileW 40086->40088 40087->40033 40088->40087 40090 29f8068 DeleteFileW 40089->40090 40092 29f80e7 40090->40092 40092->40082 40095 574a51d 40093->40095 40094 574a580 40094->40057 40095->40094 40105 5749710 40095->40105 40098 574a53d 40097->40098 40099 5749710 SetWindowsHookExA 40098->40099 40100 574a580 40098->40100 40099->40098 40100->40057 40103 574a500 40101->40103 40102 574a580 40102->40057 40103->40102 40104 5749710 SetWindowsHookExA 40103->40104 40104->40103 40107 574a708 SetWindowsHookExA 40105->40107 40108 574a792 40107->40108 40108->40095 40111 29f8640 MoveFileA 40109->40111 40112 29f86df 40111->40112 40112->40069 40115 68ef5c9 40113->40115 40114 68ef7f2 40114->40078 40115->40114 40116 68efa6c GlobalMemoryStatusEx GlobalMemoryStatusEx 40115->40116 40117 68ef818 GlobalMemoryStatusEx GlobalMemoryStatusEx 40115->40117 40118 68ef809 GlobalMemoryStatusEx GlobalMemoryStatusEx 40115->40118 40116->40115 40117->40115 40118->40115 40121 68ef5bc 40119->40121 40120 68ef7f2 40120->40078 40121->40120 40122 68efa6c GlobalMemoryStatusEx GlobalMemoryStatusEx 40121->40122 40123 68ef818 GlobalMemoryStatusEx GlobalMemoryStatusEx 40121->40123 40124 68ef809 GlobalMemoryStatusEx GlobalMemoryStatusEx 40121->40124 40122->40121 40123->40121 40124->40121 39961 5748158 39963 5748168 39961->39963 39964 5748193 39963->39964 39965 5746bf4 39963->39965 39966 57481a8 KiUserCallbackDispatcher 39965->39966 39968 5748216 39966->39968 39968->39963 39969 5746fd8 DuplicateHandle 39970 574706e 39969->39970 39971 5748bb8 39972 5748c12 OleGetClipboard 39971->39972 39973 5748c52 39972->39973 39974 11fd030 39975 11fd048 39974->39975 39976 11fd0a2 39975->39976 39979 5740a64 39975->39979 39987 5747bb2 39975->39987 39981 5740a6f 39979->39981 39980 5747c41 40003 5746b9c 39980->40003 39981->39980 39983 5747c31 39981->39983 39995 5747d68 39983->39995 39999 5747d58 39983->39999 39984 5747c3f 39988 5747bba 39987->39988 39989 5747c41 39988->39989 39991 5747c31 39988->39991 39990 5746b9c CallWindowProcW 39989->39990 39992 5747c3f 39990->39992 39993 5747d68 CallWindowProcW 39991->39993 39994 5747d58 CallWindowProcW 39991->39994 39993->39992 39994->39992 39997 5747d76 39995->39997 39996 5746b9c CallWindowProcW 39996->39997 39997->39996 39998 5747e4e 39997->39998 39998->39984 40000 5747d76 39999->40000 40001 5746b9c CallWindowProcW 40000->40001 40002 5747e4e 40000->40002 40001->40000 40002->39984 40004 5746ba7 40003->40004 40005 5747f02 CallWindowProcW 40004->40005 40006 5747eb1 40004->40006 40005->40006 40006->39984
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-155944776
                                              • Opcode ID: 88e0643fdb00e2fd90f9e4a23559f85a159b2dc3a643ae1d169db6c64c541697
                                              • Instruction ID: 4765b8b8ecb5b5321de7ecf9a1cd8970dab30d09db1c66676619c1f2cb221e82
                                              • Opcode Fuzzy Hash: 88e0643fdb00e2fd90f9e4a23559f85a159b2dc3a643ae1d169db6c64c541697
                                              • Instruction Fuzzy Hash: 03D25834E10609CFDB64DB68C594A9DB7F2FF8A304F5485A9D509EB265EB30ED81CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1002 68e79c8-68e79e6 1003 68e79e8-68e79eb 1002->1003 1004 68e79ed-68e79f7 1003->1004 1005 68e79f8-68e79fb 1003->1005 1006 68e7a1e-68e7a21 1005->1006 1007 68e79fd-68e7a19 1005->1007 1008 68e7a42-68e7a45 1006->1008 1009 68e7a23-68e7a3d 1006->1009 1007->1006 1010 68e7a5c-68e7a5e 1008->1010 1011 68e7a47-68e7a55 1008->1011 1009->1008 1014 68e7a65-68e7a68 1010->1014 1015 68e7a60 1010->1015 1017 68e7a6e-68e7a84 1011->1017 1020 68e7a57 1011->1020 1014->1003 1014->1017 1015->1014 1022 68e7c9f-68e7ca9 1017->1022 1023 68e7a8a-68e7a93 1017->1023 1020->1010 1024 68e7caa-68e7cdf 1023->1024 1025 68e7a99-68e7ab6 1023->1025 1032 68e7ce1-68e7ce4 1024->1032 1030 68e7c8c-68e7c99 1025->1030 1031 68e7abc-68e7ae4 1025->1031 1030->1022 1030->1023 1031->1030 1052 68e7aea-68e7af3 1031->1052 1033 68e7cea-68e7cf6 1032->1033 1034 68e7d97-68e7d9a 1032->1034 1040 68e7d01-68e7d03 1033->1040 1035 68e7fc6-68e7fc9 1034->1035 1036 68e7da0-68e7daf 1034->1036 1038 68e7fec-68e7fee 1035->1038 1039 68e7fcb-68e7fe7 1035->1039 1049 68e7dce-68e7e09 1036->1049 1050 68e7db1-68e7dcc 1036->1050 1043 68e7ff5-68e7ff8 1038->1043 1044 68e7ff0 1038->1044 1039->1038 1045 68e7d1b-68e7d22 1040->1045 1046 68e7d05-68e7d0b 1040->1046 1043->1032 1053 68e7ffe-68e8007 1043->1053 1044->1043 1047 68e7d24-68e7d31 1045->1047 1048 68e7d33 1045->1048 1054 68e7d0f-68e7d11 1046->1054 1055 68e7d0d 1046->1055 1056 68e7d38-68e7d3a 1047->1056 1048->1056 1063 68e7e0f-68e7e20 1049->1063 1064 68e7f9a-68e7fb0 1049->1064 1050->1049 1052->1024 1057 68e7af9-68e7b15 1052->1057 1054->1045 1055->1045 1058 68e7d3c-68e7d3f 1056->1058 1059 68e7d51-68e7d8a 1056->1059 1069 68e7c7a-68e7c86 1057->1069 1070 68e7b1b-68e7b45 1057->1070 1058->1053 1059->1036 1087 68e7d8c-68e7d96 1059->1087 1074 68e7e26-68e7e43 1063->1074 1075 68e7f85-68e7f94 1063->1075 1064->1035 1069->1030 1069->1052 1085 68e7b4b-68e7b73 1070->1085 1086 68e7c70-68e7c75 1070->1086 1074->1075 1084 68e7e49-68e7f3f call 68e61e8 1074->1084 1075->1063 1075->1064 1136 68e7f4d 1084->1136 1137 68e7f41-68e7f4b 1084->1137 1085->1086 1093 68e7b79-68e7ba7 1085->1093 1086->1069 1093->1086 1099 68e7bad-68e7bb6 1093->1099 1099->1086 1100 68e7bbc-68e7bee 1099->1100 1108 68e7bf9-68e7c15 1100->1108 1109 68e7bf0-68e7bf4 1100->1109 1108->1069 1111 68e7c17-68e7c6e call 68e61e8 1108->1111 1109->1086 1110 68e7bf6 1109->1110 1110->1108 1111->1069 1138 68e7f52-68e7f54 1136->1138 1137->1138 1138->1075 1139 68e7f56-68e7f5b 1138->1139 1140 68e7f5d-68e7f67 1139->1140 1141 68e7f69 1139->1141 1142 68e7f6e-68e7f70 1140->1142 1141->1142 1142->1075 1143 68e7f72-68e7f7e 1142->1143 1143->1075
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q
                                              • API String ID: 0-458585787
                                              • Opcode ID: 150d3b08fbaf5f79943552519abaef22f46c28992af1982b8845d75b4df91f63
                                              • Instruction ID: e65f4d24fd0653d260030b0c80b3722e976e02a53cca707f8fb062489bf53bbd
                                              • Opcode Fuzzy Hash: 150d3b08fbaf5f79943552519abaef22f46c28992af1982b8845d75b4df91f63
                                              • Instruction Fuzzy Hash: 5C029D30B102069FDB58DB74D594AAEB7E2FF89304F248569E509DB398DB35EC46CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1145 68e5930-68e5940 1146 68e5942-68e5945 1145->1146 1147 68e5947-68e594d 1146->1147 1148 68e5954-68e5957 1146->1148 1149 68e594f 1147->1149 1150 68e5959-68e5978 1147->1150 1148->1150 1151 68e598e-68e5991 1148->1151 1149->1148 1166 68e597d-68e5983 1150->1166 1167 68e597a 1150->1167 1152 68e59af-68e59b2 1151->1152 1153 68e5993-68e5998 1151->1153 1156 68e59bb-68e59be 1152->1156 1157 68e59b4-68e59b6 1152->1157 1154 68e599d-68e59aa 1153->1154 1155 68e599a 1153->1155 1154->1152 1155->1154 1156->1147 1159 68e59c0-68e59c3 1156->1159 1157->1156 1161 68e59ca-68e59cc 1159->1161 1162 68e59c5-68e59c7 1159->1162 1164 68e59ce 1161->1164 1165 68e59d3-68e59d6 1161->1165 1162->1161 1164->1165 1165->1146 1170 68e59dc-68e59e4 1165->1170 1168 68e59e5-68e5a22 1166->1168 1169 68e5985-68e5989 1166->1169 1167->1166 1172 68e5a24-68e5a27 1168->1172 1169->1151 1173 68e5a29-68e5a32 1172->1173 1174 68e5a35-68e5a38 1172->1174 1175 68e5a3a-68e5a41 1174->1175 1176 68e5a48-68e5a4b 1174->1176 1177 68e5a43 1175->1177 1178 68e5a51-68e5a58 1175->1178 1176->1178 1179 68e5bc5-68e5bc8 1176->1179 1177->1176 1182 68e5a5e-68e5aa5 1178->1182 1183 68e5ba6-68e5bb9 1178->1183 1180 68e5bdd-68e5be0 1179->1180 1181 68e5bca-68e5bd8 1179->1181 1184 68e5bfc-68e5bfe 1180->1184 1185 68e5be2-68e5bf7 1180->1185 1181->1180 1198 68e5aa7-68e5ab6 1182->1198 1186 68e5c05-68e5c08 1184->1186 1187 68e5c00 1184->1187 1185->1184 1186->1172 1192 68e5c0e-68e5c18 1186->1192 1187->1186 1200 68e5abc-68e5ad2 1198->1200 1201 68e5c1b-68e5c5a 1198->1201 1200->1201 1205 68e5ad8-68e5ae0 1200->1205 1204 68e5c5c-68e5c5f 1201->1204 1206 68e5c72-68e5c75 1204->1206 1207 68e5c61-68e5c6d 1204->1207 1205->1198 1208 68e5ae2-68e5ae8 1205->1208 1211 68e5c89-68e5c8c 1206->1211 1212 68e5c77-68e5c84 1206->1212 1207->1206 1209 68e5aea-68e5aed 1208->1209 1210 68e5b48-68e5b98 call 68e4728 1208->1210 1209->1201 1213 68e5af3-68e5afe 1209->1213 1259 68e5b9a 1210->1259 1260 68e5ba3 1210->1260 1215 68e5c8e-68e5ca1 1211->1215 1216 68e5ca4-68e5ca7 1211->1216 1212->1211 1213->1201 1217 68e5b04-68e5b0e 1213->1217 1218 68e5cbb-68e5cbe 1216->1218 1219 68e5ca9-68e5cb0 1216->1219 1217->1201 1222 68e5b14-68e5b1e 1217->1222 1225 68e5cc0-68e5ccc 1218->1225 1226 68e5cd1-68e5cd4 1218->1226 1223 68e5d56-68e5d5d 1219->1223 1224 68e5cb6 1219->1224 1222->1201 1228 68e5b24-68e5b39 1222->1228 1223->1215 1232 68e5d63-68e5dce 1223->1232 1224->1218 1225->1226 1230 68e5cec-68e5cef 1226->1230 1231 68e5cd6-68e5ce7 1226->1231 1228->1201 1235 68e5b3f-68e5b46 1228->1235 1233 68e5d30-68e5d33 1230->1233 1234 68e5cf1-68e5d10 1230->1234 1231->1230 1266 68e5dd7-68e5dde 1232->1266 1237 68e5d4d-68e5d50 1233->1237 1238 68e5d35-68e5d48 1233->1238 1256 68e5e0c-68e5e16 1234->1256 1235->1209 1235->1210 1237->1223 1243 68e5de1-68e5de4 1237->1243 1238->1237 1245 68e5dfa-68e5dfc 1243->1245 1246 68e5de6-68e5df5 1243->1246 1250 68e5dfe 1245->1250 1251 68e5e03-68e5e06 1245->1251 1246->1245 1250->1251 1251->1204 1251->1256 1259->1260 1260->1183
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: XPdq$\Odq
                                              • API String ID: 0-770551486
                                              • Opcode ID: 83fea170582702885b9797f4a7db1f0082883de1294289330950b6d503091f0f
                                              • Instruction ID: 330ed2ec9b5b798a4bc897a9edc49e8b5eb06817ac41bbcfa09084b8be76ad83
                                              • Opcode Fuzzy Hash: 83fea170582702885b9797f4a7db1f0082883de1294289330950b6d503091f0f
                                              • Instruction Fuzzy Hash: 79D10331F101148FDB54DB68D4946AEBBF2FF8A318F21846AD55ADB351CA32DC41CB92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $
                                              • API String ID: 0-3993045852
                                              • Opcode ID: 8d342201b9d5ded54b5abf481c3404f07eadebac00003f6c05b38fd2520609ec
                                              • Instruction ID: 024610ea0f04705301ea119222f8807380b7de313d8e2a911d6c4c30c975dd0f
                                              • Opcode Fuzzy Hash: 8d342201b9d5ded54b5abf481c3404f07eadebac00003f6c05b38fd2520609ec
                                              • Instruction Fuzzy Hash: 5D22F375E002159FDF64CBA4C5806AEBBB2FF86318F24846AD519EB344DB72DC41CB92
                                              APIs
                                              • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,0574A570,00000000,00000000), ref: 0574A783
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: HookWindows
                                              • String ID:
                                              • API String ID: 2559412058-0
                                              • Opcode ID: 70be49393b88187587da2c6f554e582105f2a9f8e174b1f81c101bce479f68dd
                                              • Instruction ID: 51311f0d755c7ef902f79e2925afa40e6d121816b9811e9074d145551885a944
                                              • Opcode Fuzzy Hash: 70be49393b88187587da2c6f554e582105f2a9f8e174b1f81c101bce479f68dd
                                              • Instruction Fuzzy Hash: 4C2127B5D042099FCB54DF9AC844BEEFBF6FB88310F10842AE419A7250D775A944CFA1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5692adb5c032b76cd96ac40e1f5faa60a4f6453cbd9b311ad87740852712f2c4
                                              • Instruction ID: bdb45eae040d7439a592ccaf1617e2c74e5b6081dc161e0a746365f09a9d4e2d
                                              • Opcode Fuzzy Hash: 5692adb5c032b76cd96ac40e1f5faa60a4f6453cbd9b311ad87740852712f2c4
                                              • Instruction Fuzzy Hash: F962C034B102058FDB64DB68D594AADB7F2FF89314F148469E51ADB394EB31EC86CB80
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8bd8a909a557d355a84a71eef14d724ad9bbf3e2023cbd31e4f9b400741e2909
                                              • Instruction ID: 8a18ad900700b19d106e3af3dc5a28116f47cf77577095eab2e8a04d87c56f86
                                              • Opcode Fuzzy Hash: 8bd8a909a557d355a84a71eef14d724ad9bbf3e2023cbd31e4f9b400741e2909
                                              • Instruction Fuzzy Hash: 2932CF34F102098FDB54DB68D990BADBBB2FB89314F108529E525EB395DB34EC42CB91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1ee0fdae392c31af4322864329ba31ba1016b9fcc9d229d24cc87af504378ff0
                                              • Instruction ID: 62e25b180ff87c1063763387dc2b632413eca6b56e57e1770ddaa27389da847f
                                              • Opcode Fuzzy Hash: 1ee0fdae392c31af4322864329ba31ba1016b9fcc9d229d24cc87af504378ff0
                                              • Instruction Fuzzy Hash: 1A226230E102098BEF64CBA8D6907AEB7B2FB4A314F20882AE515DB395DA35DC45CB51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 68ea910-68ea92e 1 68ea930-68ea933 0->1 2 68ea94d-68ea950 1->2 3 68ea935-68ea93e 1->3 6 68ea964-68ea967 2->6 7 68ea952-68ea95f 2->7 4 68eab47-68eab7e 3->4 5 68ea944-68ea948 3->5 15 68eab80-68eab83 4->15 5->2 8 68ea969-68ea96e 6->8 9 68ea971-68ea974 6->9 7->6 8->9 12 68eab2d-68eab36 9->12 13 68ea97a-68ea97d 9->13 12->3 14 68eab3c-68eab46 12->14 16 68ea98e-68ea991 13->16 17 68ea97f-68ea983 13->17 18 68eaba6-68eaba9 15->18 19 68eab85-68eaba1 15->19 21 68ea9b4-68ea9b7 16->21 22 68ea993-68ea9af 16->22 17->14 20 68ea989 17->20 23 68eabab-68eabb5 18->23 24 68eabb6-68eabb9 18->24 19->18 20->16 25 68ea9b9-68ea9cc 21->25 26 68ea9d1-68ea9d4 21->26 22->21 27 68eabbb 24->27 28 68eabc8-68eabcb 24->28 25->26 31 68ea9d6-68ea9df 26->31 32 68ea9e4-68ea9e6 26->32 124 68eabbb call 68eae6a 27->124 125 68eabbb call 68eae78 27->125 33 68eae34-68eae37 28->33 34 68eabd1-68eac0c 28->34 31->32 36 68ea9ed-68ea9f0 32->36 37 68ea9e8 32->37 42 68eae48-68eae4a 33->42 43 68eae39-68eae3d 33->43 49 68eadff-68eae12 34->49 50 68eac12-68eac1e 34->50 36->1 38 68ea9f6-68eaa1a 36->38 37->36 55 68eab2a 38->55 56 68eaa20-68eaa2f 38->56 39 68eabc1-68eabc3 39->28 46 68eae4c 42->46 47 68eae51-68eae54 42->47 43->34 45 68eae43 43->45 45->42 46->47 47->15 51 68eae5a-68eae64 47->51 52 68eae14 49->52 57 68eac3e-68eac82 50->57 58 68eac20-68eac39 50->58 59 68eae15 52->59 55->12 62 68eaa47-68eaa82 call 68e61e8 56->62 63 68eaa31-68eaa37 56->63 75 68eac9e-68eacdd 57->75 76 68eac84-68eac96 57->76 58->52 59->59 80 68eaa9a-68eaab1 62->80 81 68eaa84-68eaa8a 62->81 64 68eaa3b-68eaa3d 63->64 65 68eaa39 63->65 64->62 65->62 82 68eadc4-68eadd9 75->82 83 68eace3-68eadbe call 68e61e8 75->83 76->75 93 68eaac9-68eaada 80->93 94 68eaab3-68eaab9 80->94 84 68eaa8e-68eaa90 81->84 85 68eaa8c 81->85 82->49 83->82 84->80 85->80 99 68eaadc-68eaae2 93->99 100 68eaaf2-68eab23 93->100 96 68eaabd-68eaabf 94->96 97 68eaabb 94->97 96->93 97->93 102 68eaae6-68eaae8 99->102 103 68eaae4 99->103 100->55 102->100 103->100 124->39 125->39
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-2216122830
                                              • Opcode ID: bc71af46fb6a1331ff47bf618bed06dec2ec4df975b27ac7fbb44ca2aea8697b
                                              • Instruction ID: d2262daea761879c06aabbf60db45a73c564a913fe4e426e34b11835b10e1e80
                                              • Opcode Fuzzy Hash: bc71af46fb6a1331ff47bf618bed06dec2ec4df975b27ac7fbb44ca2aea8697b
                                              • Instruction Fuzzy Hash: 83E18D30F1020A8FDB68DBA8D5906AEB7F6FF85704F208529D519EB354DB35E846CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 572 5746d81-5746d88 573 5746d91-5746e1f GetCurrentProcess 572->573 574 5746d8a 572->574 578 5746e21-5746e27 573->578 579 5746e28-5746e5c GetCurrentThread 573->579 574->573 578->579 580 5746e65-5746e99 GetCurrentProcess 579->580 581 5746e5e-5746e64 579->581 583 5746ea2-5746ebd call 5746f60 580->583 584 5746e9b-5746ea1 580->584 581->580 587 5746ec3-5746ef2 GetCurrentThreadId 583->587 584->583 588 5746ef4-5746efa 587->588 589 5746efb-5746f5d 587->589 588->589
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 05746E0E
                                              • GetCurrentThread.KERNEL32 ref: 05746E4B
                                              • GetCurrentProcess.KERNEL32 ref: 05746E88
                                              • GetCurrentThreadId.KERNEL32 ref: 05746EE1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: a4452f41b23fc36acc16b0043931289c96ce4bfae55422eb0e76ff42c085fe08
                                              • Instruction ID: 87363eb3783ae564d07bcd35aafab0734b4eb7e8b927ed2c793a1088b2ee350f
                                              • Opcode Fuzzy Hash: a4452f41b23fc36acc16b0043931289c96ce4bfae55422eb0e76ff42c085fe08
                                              • Instruction Fuzzy Hash: CB5144B09002499FDB54DFAAD948B9EBFF1BF49304F248469E119A7260D734A948CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 596 5746d90-5746e1f GetCurrentProcess 601 5746e21-5746e27 596->601 602 5746e28-5746e5c GetCurrentThread 596->602 601->602 603 5746e65-5746e99 GetCurrentProcess 602->603 604 5746e5e-5746e64 602->604 606 5746ea2-5746ebd call 5746f60 603->606 607 5746e9b-5746ea1 603->607 604->603 610 5746ec3-5746ef2 GetCurrentThreadId 606->610 607->606 611 5746ef4-5746efa 610->611 612 5746efb-5746f5d 610->612 611->612
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 05746E0E
                                              • GetCurrentThread.KERNEL32 ref: 05746E4B
                                              • GetCurrentProcess.KERNEL32 ref: 05746E88
                                              • GetCurrentThreadId.KERNEL32 ref: 05746EE1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 09a7a0063248338c7e9bf37badfbd28a9259667e35189e36bc7a52f684a5c2cc
                                              • Instruction ID: cfc8204735c701bdbb3c5bd4ac19cd3c5512e1f805a051d2bb19dcc2ea07f0d9
                                              • Opcode Fuzzy Hash: 09a7a0063248338c7e9bf37badfbd28a9259667e35189e36bc7a52f684a5c2cc
                                              • Instruction Fuzzy Hash: 875164B09002098FDB54CFAAD948B9EBBF1BF49304F24C069E119B7260D734A848CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 619 68e8d98-68e8dbd 620 68e8dbf-68e8dc2 619->620 621 68e8dc8-68e8ddd 620->621 622 68e9680-68e9683 620->622 630 68e8ddf-68e8de5 621->630 631 68e8df5-68e8e0b 621->631 623 68e96a9-68e96ab 622->623 624 68e9685-68e96a4 622->624 625 68e96ad 623->625 626 68e96b2-68e96b5 623->626 624->623 625->626 626->620 629 68e96bb-68e96c5 626->629 632 68e8de9-68e8deb 630->632 633 68e8de7 630->633 636 68e8e16-68e8e18 631->636 632->631 633->631 637 68e8e1a-68e8e20 636->637 638 68e8e30-68e8ea1 636->638 639 68e8e24-68e8e26 637->639 640 68e8e22 637->640 649 68e8ecd-68e8ee9 638->649 650 68e8ea3-68e8ec6 638->650 639->638 640->638 655 68e8eeb-68e8f0e 649->655 656 68e8f15-68e8f30 649->656 650->649 655->656 661 68e8f5b-68e8f76 656->661 662 68e8f32-68e8f54 656->662 667 68e8f9b-68e8fa9 661->667 668 68e8f78-68e8f94 661->668 662->661 669 68e8fab-68e8fb4 667->669 670 68e8fb9-68e9033 667->670 668->667 669->629 676 68e9035-68e9053 670->676 677 68e9080-68e9095 670->677 681 68e906f-68e907e 676->681 682 68e9055-68e9064 676->682 677->622 681->676 681->677 682->681
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: 6f1a3a553a17fc5adf5b3b527f4e015dbc9167925202b12aba655a02ab1e07c5
                                              • Instruction ID: a85816f717acd18f9ea2aa4eccec8e103bdd32f23d64cb99ccd8e5db389f97dc
                                              • Opcode Fuzzy Hash: 6f1a3a553a17fc5adf5b3b527f4e015dbc9167925202b12aba655a02ab1e07c5
                                              • Instruction Fuzzy Hash: 8F918070B1020A9FDB54DF64D9547AEB3F6BB89304F108569C909EB388EF709D46CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 685 68ecfa0-68ecfbb 686 68ecfbd-68ecfc0 685->686 687 68ed009-68ed00c 686->687 688 68ecfc2-68ed004 686->688 689 68ed00e-68ed050 687->689 690 68ed055-68ed058 687->690 688->687 689->690 692 68ed05a-68ed070 690->692 693 68ed075-68ed078 690->693 692->693 695 68ed07a-68ed089 693->695 696 68ed0c1-68ed0c4 693->696 697 68ed08b-68ed090 695->697 698 68ed098-68ed0a4 695->698 700 68ed10d-68ed110 696->700 701 68ed0c6-68ed108 696->701 697->698 704 68ed9bd-68ed9ca 698->704 705 68ed0aa-68ed0bc 698->705 706 68ed159-68ed15c 700->706 707 68ed112-68ed154 700->707 701->700 722 68ed9cc 704->722 723 68ed9d1-68ed9d2 704->723 705->696 709 68ed48c-68ed498 706->709 710 68ed162-68ed165 706->710 707->706 709->695 715 68ed49e-68ed78b 709->715 713 68ed1ae-68ed1b1 710->713 714 68ed167-68ed1a9 710->714 720 68ed1bb-68ed1be 713->720 721 68ed1b3-68ed1b8 713->721 714->713 905 68ed9b2-68ed9bc 715->905 906 68ed791-68ed797 715->906 728 68ed207-68ed20a 720->728 729 68ed1c0-68ed1cf 720->729 721->720 726 68ed9ce 722->726 727 68ed9dc-68ed9f6 722->727 730 68ed9d9-68ed9db 723->730 731 68ed9d4 723->731 737 68ed9d5 726->737 738 68ed9d0 726->738 741 68ed9f8-68ed9fb 727->741 742 68ed20c-68ed24e 728->742 743 68ed253-68ed256 728->743 739 68ed1de-68ed1ea 729->739 740 68ed1d1-68ed1d6 729->740 730->727 731->737 737->730 738->723 739->704 748 68ed1f0-68ed202 739->748 740->739 749 68ed9fd 741->749 750 68eda0a-68eda0d 741->750 742->743 745 68ed258-68ed274 743->745 746 68ed279-68ed27c 743->746 745->746 755 68ed27e-68ed280 746->755 756 68ed28b-68ed28e 746->756 748->728 952 68ed9fd call 68edb1b 749->952 953 68ed9fd call 68edb28 749->953 758 68eda0f-68eda2b 750->758 759 68eda30-68eda33 750->759 764 68ed286 755->764 765 68ed347-68ed350 755->765 766 68ed2d7-68ed2da 756->766 767 68ed290-68ed2d2 756->767 758->759 760 68eda66-68eda68 759->760 761 68eda35-68eda61 759->761 772 68eda6f-68eda72 760->772 773 68eda6a 760->773 761->760 764->756 774 68ed35f-68ed36b 765->774 775 68ed352-68ed357 765->775 777 68ed2dc-68ed2de 766->777 778 68ed2e9-68ed2ec 766->778 767->766 769 68eda03-68eda05 769->750 772->741 782 68eda74-68eda83 772->782 773->772 785 68ed47c-68ed481 774->785 786 68ed371-68ed385 774->786 775->774 788 68ed489 777->788 789 68ed2e4 777->789 790 68ed2ee-68ed330 778->790 791 68ed335-68ed337 778->791 805 68edaea-68edaff 782->805 806 68eda85-68edae8 call 68e61e8 782->806 785->788 786->788 807 68ed38b-68ed39d 786->807 788->709 789->778 790->791 795 68ed33e-68ed341 791->795 796 68ed339 791->796 795->686 795->765 796->795 806->805 818 68ed39f-68ed3a5 807->818 819 68ed3c1-68ed3c3 807->819 823 68ed3a9-68ed3b5 818->823 824 68ed3a7 818->824 822 68ed3cd-68ed3d9 819->822 835 68ed3db-68ed3e5 822->835 836 68ed3e7 822->836 827 68ed3b7-68ed3bf 823->827 824->827 827->822 838 68ed3ec-68ed3ee 835->838 836->838 838->788 839 68ed3f4-68ed410 call 68e61e8 838->839 848 68ed41f-68ed42b 839->848 849 68ed412-68ed417 839->849 848->785 851 68ed42d-68ed47a 848->851 849->848 851->788 907 68ed799-68ed79e 906->907 908 68ed7a6-68ed7af 906->908 907->908 908->704 909 68ed7b5-68ed7c8 908->909 911 68ed7ce-68ed7d4 909->911 912 68ed9a2-68ed9ac 909->912 913 68ed7d6-68ed7db 911->913 914 68ed7e3-68ed7ec 911->914 912->905 912->906 913->914 914->704 915 68ed7f2-68ed813 914->915 918 68ed815-68ed81a 915->918 919 68ed822-68ed82b 915->919 918->919 919->704 920 68ed831-68ed84e 919->920 920->912 923 68ed854-68ed85a 920->923 923->704 924 68ed860-68ed879 923->924 926 68ed87f-68ed8a6 924->926 927 68ed995-68ed99c 924->927 926->704 930 68ed8ac-68ed8b6 926->930 927->912 927->923 930->704 931 68ed8bc-68ed8d3 930->931 933 68ed8d5-68ed8e0 931->933 934 68ed8e2-68ed8fd 931->934 933->934 934->927 939 68ed903-68ed91c call 68e61e8 934->939 943 68ed91e-68ed923 939->943 944 68ed92b-68ed934 939->944 943->944 944->704 945 68ed93a-68ed98e 944->945 945->927 952->769 953->769
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q
                                              • API String ID: 0-2441406858
                                              • Opcode ID: a1a911c847d9547ca581f9a3819802d3a7aa6a4d819cba68d73cf185e42850b6
                                              • Instruction ID: bec93ed392b0ed948f75c1ef1d7874516ee06f4538f645c947d998591ff937ba
                                              • Opcode Fuzzy Hash: a1a911c847d9547ca581f9a3819802d3a7aa6a4d819cba68d73cf185e42850b6
                                              • Instruction Fuzzy Hash: 98624030A007068FCB55EB68D690A5DB7F2FF85308B208969D419DF769DB75EC4ACB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 954 68e47b0-68e47d4 955 68e47d6-68e47d9 954->955 956 68e47fa-68e47fd 955->956 957 68e47db-68e47f5 955->957 958 68e4edc-68e4ede 956->958 959 68e4801-68e48fb 956->959 957->956 961 68e4ee5-68e4ee8 958->961 962 68e4ee0 958->962 977 68e497e-68e4985 959->977 978 68e4901-68e4949 959->978 961->955 964 68e4eee-68e4efb 961->964 962->961 979 68e498b-68e49fb 977->979 980 68e4a09-68e4a12 977->980 1000 68e494e call 68e5058 978->1000 1001 68e494e call 68e5068 978->1001 997 68e49fd 979->997 998 68e4a06 979->998 980->964 991 68e4954-68e4970 994 68e497b-68e497c 991->994 995 68e4972 991->995 994->977 995->994 997->998 998->980 1000->991 1001->991
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fdq$XPdq$\Odq
                                              • API String ID: 0-727959394
                                              • Opcode ID: 35a5d64279b932981991f8f8e879102d3f144eb8b9b9a7e7c5b0d4c4d3bf45cf
                                              • Instruction ID: 90425e81da598f0f64bb9695b8942b0250f9265dbeb367ba0e4c8dd68ff1adda
                                              • Opcode Fuzzy Hash: 35a5d64279b932981991f8f8e879102d3f144eb8b9b9a7e7c5b0d4c4d3bf45cf
                                              • Instruction Fuzzy Hash: 5C617C74E102099FEB549BA4C8587AEBBF6FB89304F208429E10AEB395DF754C458F90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1821 68e8d89-68e8dbd 1823 68e8dbf-68e8dc2 1821->1823 1824 68e8dc8-68e8ddd 1823->1824 1825 68e9680-68e9683 1823->1825 1833 68e8ddf-68e8de5 1824->1833 1834 68e8df5-68e8e0b 1824->1834 1826 68e96a9-68e96ab 1825->1826 1827 68e9685-68e96a4 1825->1827 1828 68e96ad 1826->1828 1829 68e96b2-68e96b5 1826->1829 1827->1826 1828->1829 1829->1823 1832 68e96bb-68e96c5 1829->1832 1835 68e8de9-68e8deb 1833->1835 1836 68e8de7 1833->1836 1839 68e8e16-68e8e18 1834->1839 1835->1834 1836->1834 1840 68e8e1a-68e8e20 1839->1840 1841 68e8e30-68e8ea1 1839->1841 1842 68e8e24-68e8e26 1840->1842 1843 68e8e22 1840->1843 1852 68e8ecd-68e8ee9 1841->1852 1853 68e8ea3-68e8ec6 1841->1853 1842->1841 1843->1841 1858 68e8eeb-68e8f0e 1852->1858 1859 68e8f15-68e8f30 1852->1859 1853->1852 1858->1859 1864 68e8f5b-68e8f76 1859->1864 1865 68e8f32-68e8f54 1859->1865 1870 68e8f9b-68e8fa9 1864->1870 1871 68e8f78-68e8f94 1864->1871 1865->1864 1872 68e8fab-68e8fb4 1870->1872 1873 68e8fb9-68e9033 1870->1873 1871->1870 1872->1832 1879 68e9035-68e9053 1873->1879 1880 68e9080-68e9095 1873->1880 1884 68e906f-68e907e 1879->1884 1885 68e9055-68e9064 1879->1885 1880->1825 1884->1879 1884->1880 1885->1884
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q
                                              • API String ID: 0-458585787
                                              • Opcode ID: 2549ef1ed45b1fb0e0db59e761c739ecec3c878e946aaa26abedb729f7172851
                                              • Instruction ID: 814cd72acb3a4182dbe92668e21ffeee90de85965b49b2178835decc4721549e
                                              • Opcode Fuzzy Hash: 2549ef1ed45b1fb0e0db59e761c739ecec3c878e946aaa26abedb729f7172851
                                              • Instruction Fuzzy Hash: D8518170B102069FEB54DF74D951BAEB3F6AB89704F108569C909DB798EB30DC02CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1925 68e47a0-68e47ac 1926 68e47ae-68e47d4 1925->1926 1927 68e4801-68e48fb 1925->1927 1929 68e47d6-68e47d9 1926->1929 1950 68e497e-68e4985 1927->1950 1951 68e4901-68e4949 1927->1951 1931 68e47fa-68e47fd 1929->1931 1932 68e47db-68e47f5 1929->1932 1931->1927 1933 68e4edc-68e4ede 1931->1933 1932->1931 1936 68e4ee5-68e4ee8 1933->1936 1937 68e4ee0 1933->1937 1936->1929 1939 68e4eee-68e4efb 1936->1939 1937->1936 1952 68e498b-68e49fb 1950->1952 1953 68e4a09-68e4a12 1950->1953 1973 68e494e call 68e5058 1951->1973 1974 68e494e call 68e5068 1951->1974 1970 68e49fd 1952->1970 1971 68e4a06 1952->1971 1953->1939 1964 68e4954-68e4970 1967 68e497b-68e497c 1964->1967 1968 68e4972 1964->1968 1967->1950 1968->1967 1970->1971 1971->1953 1973->1964 1974->1964
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fdq$XPdq
                                              • API String ID: 0-3173836435
                                              • Opcode ID: db56d9ea77cb21557652faed034de897b76aa846dbe779a3c7a2ebdb98d6ea7c
                                              • Instruction ID: 5a0fae1d10bfc560c82cf29a8fe496ac596c0c4b1aadfe81aa3d93d9ad527d7c
                                              • Opcode Fuzzy Hash: db56d9ea77cb21557652faed034de897b76aa846dbe779a3c7a2ebdb98d6ea7c
                                              • Instruction Fuzzy Hash: 3B517074F102099FEB589FA5C8547AEBBF6BF88300F208469E15AEB395DB715C05CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2157 29ff733-29ff738 2158 29ff6fd-29ff6ff 2157->2158 2159 29ff73a 2157->2159 2162 29ff703-29ff708 2158->2162 2160 29ff73c 2159->2160 2161 29ff741-29ff759 2159->2161 2160->2162 2163 29ff73e-29ff740 2160->2163 2173 29ff75f-29ff7ec GlobalMemoryStatusEx 2161->2173 2174 29ff75b-29ff75e 2161->2174 2166 29ff709-29ff731 2162->2166 2167 29ff695-29ff6ab 2162->2167 2163->2161 2170 29ff6ad-29ff6d4 2167->2170 2171 29ff6d5-29ff6eb 2167->2171 2189 29ff6ed call 29ff778 2171->2189 2190 29ff6ed call 29ff733 2171->2190 2185 29ff7ee-29ff7f4 2173->2185 2186 29ff7f5-29ff81d 2173->2186 2181 29ff6f2-29ff6f4 2183 29ff6fa-29ff6ff 2181->2183 2184 29ff6f6-29ff6f9 2181->2184 2183->2166 2185->2186 2189->2181 2190->2181
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 029FF7DF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3744990147.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_29f0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: fbdfc70dedf3c91b63c1413d47352f09d1df7eb0d34de0775a989a954b06fdb6
                                              • Instruction ID: d7fa72f27af12e7b2acb70271426f322cc780552470eea2b3cd9e668becdaeef
                                              • Opcode Fuzzy Hash: fbdfc70dedf3c91b63c1413d47352f09d1df7eb0d34de0775a989a954b06fdb6
                                              • Instruction Fuzzy Hash: 8A410471D143599FCB54CFBAC84829EBFF5AF89310F1585AAD404A7681EB749844CBE0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2191 5746b9c-5747ea4 2194 5747f54-5747f74 call 5740a64 2191->2194 2195 5747eaa-5747eaf 2191->2195 2202 5747f77-5747f84 2194->2202 2197 5747eb1-5747ee8 2195->2197 2198 5747f02-5747f3a CallWindowProcW 2195->2198 2205 5747ef1-5747f00 2197->2205 2206 5747eea-5747ef0 2197->2206 2199 5747f43-5747f52 2198->2199 2200 5747f3c-5747f42 2198->2200 2199->2202 2200->2199 2205->2202 2206->2205
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05747F29
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 17b20dbee241c14b389451c87229925490930958d0b2abf485bb3006fa3fb16b
                                              • Instruction ID: 960c9b10301e4c41cfc2aa0637b517147db176c29a46394569727c058e7e60f0
                                              • Opcode Fuzzy Hash: 17b20dbee241c14b389451c87229925490930958d0b2abf485bb3006fa3fb16b
                                              • Instruction Fuzzy Hash: 96414CB5900309DFCB14CF99C488AAABBF5FF88314F25C459E519AB321D335A842CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2208 5748bad-5748c08 2209 5748c12-5748c50 OleGetClipboard 2208->2209 2210 5748c52-5748c58 2209->2210 2211 5748c59-5748ca7 2209->2211 2210->2211 2216 5748cb7 2211->2216 2217 5748ca9-5748cad 2211->2217 2219 5748cb8 2216->2219 2217->2216 2218 5748caf 2217->2218 2218->2216 2219->2219
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Clipboard
                                              • String ID:
                                              • API String ID: 220874293-0
                                              • Opcode ID: 57c879a1e237dcf06cd29cb44cb0f6498df2e000301476bc4ef2784437af0dd3
                                              • Instruction ID: 3c1ccbd8c1113012fc34939f377eb2f82e0c41621b5117fdcdc9f1fbddb3b70e
                                              • Opcode Fuzzy Hash: 57c879a1e237dcf06cd29cb44cb0f6498df2e000301476bc4ef2784437af0dd3
                                              • Instruction Fuzzy Hash: A13110B0D01248DFDB10CF99C984B9EBBF5AF49304F248059E404BB394D7B45844CFA5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Clipboard
                                              • String ID:
                                              • API String ID: 220874293-0
                                              • Opcode ID: 87584d5bd4f8a786bf649b1c51b4e429c40810de7a19394d1163a8755cdf1055
                                              • Instruction ID: 33cf3d518ac444d5856d6d7d579fed2983072b43633c5688c7d2f869a8994bfa
                                              • Opcode Fuzzy Hash: 87584d5bd4f8a786bf649b1c51b4e429c40810de7a19394d1163a8755cdf1055
                                              • Instruction Fuzzy Hash: 64310EB0D01208DFDB10CF99C984B9EBBF5AF48304F208069E404BB394D7B4A884CFA6
                                              APIs
                                              • MoveFileA.KERNEL32(?,00000000,?,?), ref: 029F86D0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3744990147.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_29f0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: FileMove
                                              • String ID:
                                              • API String ID: 3562171763-0
                                              • Opcode ID: 6df08afb7c2a47199a5170f88f99349016792151e8984cec5864227e138b2f4a
                                              • Instruction ID: 4556acd9c59bc05f8ca7b7489a7c3dbda4c86ee1c254252f40c526e9b73791c8
                                              • Opcode Fuzzy Hash: 6df08afb7c2a47199a5170f88f99349016792151e8984cec5864227e138b2f4a
                                              • Instruction Fuzzy Hash: D52107B6C012099FCB90CF99D984ADEFBF5FB88310F24845AE918BB204D3759944CBA4
                                              APIs
                                              • MoveFileA.KERNEL32(?,00000000,?,?), ref: 029F86D0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3744990147.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_29f0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: FileMove
                                              • String ID:
                                              • API String ID: 3562171763-0
                                              • Opcode ID: f9ab464ad02a0c3211fd7248d4c4cd50afc4b3a742da11c7ec355a448940362a
                                              • Instruction ID: 888d091c2d2c9a4e702f87628399c9dbdb6f9b7a4334d576d1ff3c5e126882ab
                                              • Opcode Fuzzy Hash: f9ab464ad02a0c3211fd7248d4c4cd50afc4b3a742da11c7ec355a448940362a
                                              • Instruction Fuzzy Hash: D221EAB6C012099FCB90CF99D984ADEFBF5FB88314F14845AD918BB204D7755944CBA4
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0574705F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 6aa0775d40c6f913e07902fedbe1c288ebb299941c61fb4f721367b3682d4994
                                              • Instruction ID: f28413219d5b35b66915c5206c056f59c38a5d2c6f6210277659bd133673f052
                                              • Opcode Fuzzy Hash: 6aa0775d40c6f913e07902fedbe1c288ebb299941c61fb4f721367b3682d4994
                                              • Instruction Fuzzy Hash: F92103B5900249AFDB10CFA9D984AEEBFF4FB48310F14801AE918A7210D374A944DF64
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0574705F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: e0c36e1059556668f3e3168b126e88202d1c1998893e63652c1f6c67558eab95
                                              • Instruction ID: 227b0b1321fcdbc28d7f45baafd725cadcfc9cac0229141b5346a6b94d2f597a
                                              • Opcode Fuzzy Hash: e0c36e1059556668f3e3168b126e88202d1c1998893e63652c1f6c67558eab95
                                              • Instruction Fuzzy Hash: 0F21C6B59012489FDB10CFAAD584AEEBFF4FB48310F14841AE914A7350D375A944DFA5
                                              APIs
                                              • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,0574A570,00000000,00000000), ref: 0574A783
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: HookWindows
                                              • String ID:
                                              • API String ID: 2559412058-0
                                              • Opcode ID: c253d97ea1b75ffe08ff35f6f815619fb48fe758f316cdf0e15ca7cc03906e33
                                              • Instruction ID: 5f25f55b7083be46d8f9761f6c85a2a7b64dc5d7eee0dcbc2e25dd8b83959078
                                              • Opcode Fuzzy Hash: c253d97ea1b75ffe08ff35f6f815619fb48fe758f316cdf0e15ca7cc03906e33
                                              • Instruction Fuzzy Hash: 8F2104B59042099FDB24DFAAC844BEEFBF5FB88310F10842AE459A7250D775A944CFA1
                                              APIs
                                              • DeleteFileW.KERNEL32(00000000), ref: 029F80D8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3744990147.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_29f0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 69db96093e39ee7854dc503930a4f377818b42e4217feadb299091772ae6ee87
                                              • Instruction ID: 4d287be4d302d94b92def405d656ef4a9609963214fe3be132a1371da56d0b54
                                              • Opcode Fuzzy Hash: 69db96093e39ee7854dc503930a4f377818b42e4217feadb299091772ae6ee87
                                              • Instruction Fuzzy Hash: 6C2144B1C006199BCB90CF9AC545AEEFBF4FB08320F15822AD918B7640D378A944CFE1
                                              APIs
                                              • DeleteFileW.KERNEL32(00000000), ref: 029F80D8
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3744990147.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_29f0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: e1f834dc27fcf050621188d56b94c6d5105b680a2655238a6643977661ad4261
                                              • Instruction ID: 5f391e54718532e8c9b088ef3635ad3773db46298041905286cac8517069cf4a
                                              • Opcode Fuzzy Hash: e1f834dc27fcf050621188d56b94c6d5105b680a2655238a6643977661ad4261
                                              • Instruction Fuzzy Hash: BD2136B1C006199BCB54CF9AC5457DEFBF4FB48320F15812AD918B7640D378A944CFA5
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 029FF7DF
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3744990147.00000000029F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_29f0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 56182e725b126e358fd7fdb245701ad91a7fa7675d8c7b553ed99d70ea553439
                                              • Instruction ID: 0a68919d276907b971d10cf85dc5806835bc53471f624c7e80c6889c20887bfa
                                              • Opcode Fuzzy Hash: 56182e725b126e358fd7fdb245701ad91a7fa7675d8c7b553ed99d70ea553439
                                              • Instruction Fuzzy Hash: FE11E2B1C0065A9BCB10DF9AC545ADEFBF4AB48320F15816AD918B7240D378A944CFA5
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 05748AC5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: 30c4e4b551bc1e8df7edb9bec227434618cad124de00f46f8280e148ef08cfbc
                                              • Instruction ID: 59a5844e6f3d720582851c6030f90ab19c0a7f6849c02a67c5d37ef36f1400d2
                                              • Opcode Fuzzy Hash: 30c4e4b551bc1e8df7edb9bec227434618cad124de00f46f8280e148ef08cfbc
                                              • Instruction Fuzzy Hash: DC1145B19003488FCB20DF9AD444B9EBFF4EB49310F208419D519B3310D374A944CFA5
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,0574817D), ref: 05748207
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: 45f802d8723391f2864acf3df50688f5175dcfe06cd1e4bcc25fa7ec5da4aa48
                                              • Instruction ID: 4a73c1e7e278bb0462cf853d81b433e9a9c2a2c50645304b7f4745cc309d68cd
                                              • Opcode Fuzzy Hash: 45f802d8723391f2864acf3df50688f5175dcfe06cd1e4bcc25fa7ec5da4aa48
                                              • Instruction Fuzzy Hash: 8C1100B5804648CFCB20DF9AD888BDEFBF8EB49320F20845AD519A7250D375A944CFA5
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,0574817D), ref: 05748207
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: acdd99373ef5bd61feabf54b06e10fff56afa473b07e24633c4bb3da96b9e774
                                              • Instruction ID: ca4a3eb5b7c22c7cd4be7d29b70bcf0559e9b4cadc37cf51864eeeda483f92e7
                                              • Opcode Fuzzy Hash: acdd99373ef5bd61feabf54b06e10fff56afa473b07e24633c4bb3da96b9e774
                                              • Instruction Fuzzy Hash: 1F1100B1800649CFCB20DF9AD984BDEFFF8EB49324F20842AD559A7250D375A944CFA5
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 05748AC5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3757571100.0000000005740000.00000040.00000800.00020000.00000000.sdmp, Offset: 05740000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_5740000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: 6d40a563e95b80734084eebc12c4377a5e5569adf79b04e1216265a8630a7e2f
                                              • Instruction ID: 4af885dc9add7a2d579c977a9eddf66ed815f97fb6e5211a4f0a9f64a07e1227
                                              • Opcode Fuzzy Hash: 6d40a563e95b80734084eebc12c4377a5e5569adf79b04e1216265a8630a7e2f
                                              • Instruction Fuzzy Hash: ED1133B19002488FCB20DFAAD484BDEBFF8EB48320F248459D519A3200C378A544CFA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: d93fe4d1bf38612501dd49f70c4f698cd689ea4eb0ec374b9b7202fae60cbba5
                                              • Instruction ID: 3de919591b5e467bd8915f1cddfda46eec407a0c1a9bdf1db91c555abfd17b5e
                                              • Opcode Fuzzy Hash: d93fe4d1bf38612501dd49f70c4f698cd689ea4eb0ec374b9b7202fae60cbba5
                                              • Instruction Fuzzy Hash: DD419D74F0060A9FDB64DF65D4546AEBBB2BF86344F108929E405EB344EB74A84ACB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 6c406b70c58b16fdae5ef813cfd8a6b42772a2e4a7858bff583f490d8787f4f2
                                              • Instruction ID: 90154984d478d1651730e5f23c58cabc82c55305521e75cc0e6087634086c2f2
                                              • Opcode Fuzzy Hash: 6c406b70c58b16fdae5ef813cfd8a6b42772a2e4a7858bff583f490d8787f4f2
                                              • Instruction Fuzzy Hash: 9D31F034B002068FDB69AB78D55466F7BE7EF89218F204928E606DB389DF35DD01C791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: f0b6279400b8d80b6179c4bb9eb0ce9d4e46ce344730e606cb21507d6513dc4f
                                              • Instruction ID: 56a7e2370bdfe76cf16914b53e981726c9f7f9b64bdf3b536e155f756e8b5c87
                                              • Opcode Fuzzy Hash: f0b6279400b8d80b6179c4bb9eb0ce9d4e46ce344730e606cb21507d6513dc4f
                                              • Instruction Fuzzy Hash: 4541A030F006099FDB65DF65D4446AEBBB6FF86344F108929E415EB344EB70E84ACB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 6dfd0e6da47302c50cfa52b9d108114b3d88d3ecabbe36c0468d6ec2005c2093
                                              • Instruction ID: 52968495f198371002b7a7fb48e20f09cb77ffc40e0330d9fbc240e84d8c3fa4
                                              • Opcode Fuzzy Hash: 6dfd0e6da47302c50cfa52b9d108114b3d88d3ecabbe36c0468d6ec2005c2093
                                              • Instruction Fuzzy Hash: 95310330B102058FDB59AB74D56866F7BEBAB8A304F104928D506DB395DF35DE02CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: fd94c6c04a5d638f05f64817f9598b9b0a491e5012eee3562ad33fa02e5ea3d8
                                              • Instruction ID: eda62966c8b68576c87898a281b7df97c747573920d48fd5d117337468e1b36e
                                              • Opcode Fuzzy Hash: fd94c6c04a5d638f05f64817f9598b9b0a491e5012eee3562ad33fa02e5ea3d8
                                              • Instruction Fuzzy Hash: A3310230B102058FDB59AB74D52466F7AEBAF89304F204928D506DB399DF35DE02CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 0c5c98c822ff1926f5d7577136392335e17086e71a4e270c63a9a98af2db5447
                                              • Instruction ID: 60e6c11e5e1a553d2e184bf95b80cad425dc688c5925c49ee178fa4795c9d295
                                              • Opcode Fuzzy Hash: 0c5c98c822ff1926f5d7577136392335e17086e71a4e270c63a9a98af2db5447
                                              • Instruction Fuzzy Hash: AD31DF35B002059FEB69AB74D15866F7BE3AF89614F104928D602DB389EF34DC02CBD1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: |
                                              • API String ID: 0-2343686810
                                              • Opcode ID: 8f7ee49cfac071da45c7b2289f317d083ffae14e972ae153e77c2bcd4a2e0127
                                              • Instruction ID: 29aa8a98c5c54581b823eea3fd0f7fd8c18301aaaf981cbeb2fb8206328cb2dd
                                              • Opcode Fuzzy Hash: 8f7ee49cfac071da45c7b2289f317d083ffae14e972ae153e77c2bcd4a2e0127
                                              • Instruction Fuzzy Hash: 81117F74F002149FDB54DB788805B6D7BF5AF8C710F104469E60ADB390DB399D01DB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: |
                                              • API String ID: 0-2343686810
                                              • Opcode ID: c4db3aa2d57b189b6930f42bc77b5a526100153b39bd5f75a0379082eb790017
                                              • Instruction ID: a714d2bca08aa14f014a69942dc9ae3473d31549db7f8a4aab5c80ddbf71983d
                                              • Opcode Fuzzy Hash: c4db3aa2d57b189b6930f42bc77b5a526100153b39bd5f75a0379082eb790017
                                              • Instruction Fuzzy Hash: 3A112E74B102249FDB54DB788805B6D7BF5AF4C710F108469E90AEB390EB79AD01CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: |
                                              • API String ID: 0-2343686810
                                              • Opcode ID: 0059e00f9fa8f3121a41ba58fabcb8ee4ead2e345e7d1370d2f02956420cbbfe
                                              • Instruction ID: 4035e9a9cdb5bc180ad84f16a498de84b0872cb5d3f6dadc410a870f7b0388ba
                                              • Opcode Fuzzy Hash: 0059e00f9fa8f3121a41ba58fabcb8ee4ead2e345e7d1370d2f02956420cbbfe
                                              • Instruction Fuzzy Hash: F5115E74B002249FDB44DB788805B6D7BF5AF4C700F108469EA0ADB390DB39AD00CB81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c751af7a3108d4cdfdeda1a8cbe696aa2b8a53cff165a773c6c4bc2b40722b46
                                              • Instruction ID: 2f3bc199a53c23af2d71d3057b0e47e1fc7cc4e9c4f28cead1fd329567640f10
                                              • Opcode Fuzzy Hash: c751af7a3108d4cdfdeda1a8cbe696aa2b8a53cff165a773c6c4bc2b40722b46
                                              • Instruction Fuzzy Hash: 05A1A730F102099BEF68DBACC6947AEB7F6FB8A310F204829E515E7395DA35DC418B51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9df4816c32984a82bed1d2a8eda41af65f5fe7ff25b495a5e874c2396311429c
                                              • Instruction ID: d8acda7419d12439e38c05e13a7b6660aaaeea30bd8ea26ed04525025fe95e3b
                                              • Opcode Fuzzy Hash: 9df4816c32984a82bed1d2a8eda41af65f5fe7ff25b495a5e874c2396311429c
                                              • Instruction Fuzzy Hash: EE61D1B1F004224FDF549A7DC88066FBADBAFC5224B254439E90EDB364DE66DD0287D2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d987d39a2ccc6c712720d0e511569b231a0783f407031266a8324ea467c81cad
                                              • Instruction ID: c3df4473b1fd2867ca342a349a35d1d5fa2e48ba6c774d7e0eaeefd940e54dfb
                                              • Opcode Fuzzy Hash: d987d39a2ccc6c712720d0e511569b231a0783f407031266a8324ea467c81cad
                                              • Instruction Fuzzy Hash: 5C815C34B1020A8FDF54DFB4D5547AEB7F6AB89304F108429E50ADB398EB74EC468B91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 87ee8bdf9d267790da35f1b09bb9cce100b1d771920af7a96d66727c4bca752b
                                              • Instruction ID: e10899d22befd64dda425394db01393f31ffd56801ce7b2d9726b94cea267ab2
                                              • Opcode Fuzzy Hash: 87ee8bdf9d267790da35f1b09bb9cce100b1d771920af7a96d66727c4bca752b
                                              • Instruction Fuzzy Hash: C5814B30B102098BDF54DBA8D5547AEB7F6AB89304F108429E50ADB398EB74EC468B91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f8c4d21be687c84390d35c118de0988aa4d2cfff5138e958aa478262a1802e05
                                              • Instruction ID: f6105bcc6504ef66ad3173a1c516428009cf27fcbaee614dfb888de565a5caad
                                              • Opcode Fuzzy Hash: f8c4d21be687c84390d35c118de0988aa4d2cfff5138e958aa478262a1802e05
                                              • Instruction Fuzzy Hash: A7913C34E1061A8BDF60DF64C880B9DB7B1FF8A304F20859AD54DEB255DB70AA85CF51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e4f8e49f7411d37b6c8a92e7fc4e119238d605f6809c1443fa08f291b0ee27b7
                                              • Instruction ID: b5e5967bab7e43d98fd40bd564fdf3109ce08bde5346ccf197d883108df44859
                                              • Opcode Fuzzy Hash: e4f8e49f7411d37b6c8a92e7fc4e119238d605f6809c1443fa08f291b0ee27b7
                                              • Instruction Fuzzy Hash: 7B913B30E1061A8BDF64DFA8C880B9DB7B1FF89304F208599D54DEB255DB70AA85CF50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 325d51ca60de9aac55985a60073141616663d032c86b50b4b6b4d767152c39f0
                                              • Instruction ID: fa3034bb315e48cc59e119f9450fc52a910495e3e8676cdc7b6cd4125a912236
                                              • Opcode Fuzzy Hash: 325d51ca60de9aac55985a60073141616663d032c86b50b4b6b4d767152c39f0
                                              • Instruction Fuzzy Hash: 99712B34F002099FDB54DBA8C984AADBBF6FF85304F248429D119EB355DB30E846CB50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a26b3ba6718fe5ac8125ba60cc2d2723b2b747dc7267bdeaf1a15c9baef6ecff
                                              • Instruction ID: abef60783dda2b6ac26063cc6ae456dee1ebd64f3260330671e0d2a3ae585aff
                                              • Opcode Fuzzy Hash: a26b3ba6718fe5ac8125ba60cc2d2723b2b747dc7267bdeaf1a15c9baef6ecff
                                              • Instruction Fuzzy Hash: F0712934F002099FDB54DBA9C984AADBBF6FF85304F248429E519EB359DB30E846CB51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 24c80b3b9ca706af5302dd6c5f19b21f91c487615110d15ce09d446cc1cf2667
                                              • Instruction ID: 1eeeddfc60c99c7060267752c08bfc797e17ceff369b0e5be3e577d2bf6af3d1
                                              • Opcode Fuzzy Hash: 24c80b3b9ca706af5302dd6c5f19b21f91c487615110d15ce09d446cc1cf2667
                                              • Instruction Fuzzy Hash: 9251FC30B102059BEF64566CDE5473F366BD78A314F10482AF70AC77E9DA38CC4587A2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1fa48f1524e33714b0a9ad9f8ed839e4f8cfc0103e46aea8b2449110b802346d
                                              • Instruction ID: 9edc4aa5111acf460417ec0e1030e91afb0127680ec1d176f7f6e09801fbac0f
                                              • Opcode Fuzzy Hash: 1fa48f1524e33714b0a9ad9f8ed839e4f8cfc0103e46aea8b2449110b802346d
                                              • Instruction Fuzzy Hash: BC51D131E01105DFDB54EF79E4446ADBBB2EF86319F108869E20AEB250DB359855CB81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 626007c231ad4eedf83ac34c02fcc2601686e5c0780cc8651c74c038075cc888
                                              • Instruction ID: 6865350138a63e2a402e70d2fe01ed93ebaf77cf0c2b7472bac1427c9e6a24a5
                                              • Opcode Fuzzy Hash: 626007c231ad4eedf83ac34c02fcc2601686e5c0780cc8651c74c038075cc888
                                              • Instruction Fuzzy Hash: 1551D730B102159BEF64566CDA5472F366BE78A314F20482EF70AC77E9CE78CC4587A2
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5ee0646232570bd56683f1022105f33921730a678166e372868b522b344f162f
                                              • Instruction ID: 6cefd000681ec00ed13203bfe73e503b7a80ada150722aa3ba78829e18541dab
                                              • Opcode Fuzzy Hash: 5ee0646232570bd56683f1022105f33921730a678166e372868b522b344f162f
                                              • Instruction Fuzzy Hash: 5051A870E002054FDF718BA9C48077EFBB2FB47318F248829E559DB285C676D841CB92
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6668abf7e06345d2f5d541391f1efde8eed778112cb33789610cacb05d69f21
                                              • Instruction ID: c70e503c2acd8eb1773ac1cca1e74e436be3ccbdc7324966d1fd2a371816076f
                                              • Opcode Fuzzy Hash: b6668abf7e06345d2f5d541391f1efde8eed778112cb33789610cacb05d69f21
                                              • Instruction Fuzzy Hash: F7415171E006099FDF70CEE9D880AAFF7F2FB85314F10492AE216D7650D772A9458B92
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1ad29782e86fe62aeebc479aba1d66aa12fdf24f41c53f87eff589337dfc66d8
                                              • Instruction ID: 632c27a1c3794f52c1659252c286c65aa9e13c7078a54052948381b20d178a9d
                                              • Opcode Fuzzy Hash: 1ad29782e86fe62aeebc479aba1d66aa12fdf24f41c53f87eff589337dfc66d8
                                              • Instruction Fuzzy Hash: BD317234E102099BCB04CFA4D96569EBBF6FF8A300F108529E916E7754DB71BD42CB50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 76da9f7d46ce59ea0a99f79806658cb9054683b2e35ee9ac341fa1911b3dbe71
                                              • Instruction ID: f1d5ccc5a9a46c8dd86096e59dc9bf5eb56f34f705b9a056b32f8895b735a147
                                              • Opcode Fuzzy Hash: 76da9f7d46ce59ea0a99f79806658cb9054683b2e35ee9ac341fa1911b3dbe71
                                              • Instruction Fuzzy Hash: 03316434E102099BCB54CFA4D85469EBBF6FF8A300F108529E915E7754DB71BD42CB50
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3bd8c3b7350cca42280ff7d7bef9d41abd486f7f386267a1f1808dab273c4c20
                                              • Instruction ID: d9d2bf1bd6af0093ecb1fa027cb0c1892b3b56d2d041ec8f9d80ea4c8348360c
                                              • Opcode Fuzzy Hash: 3bd8c3b7350cca42280ff7d7bef9d41abd486f7f386267a1f1808dab273c4c20
                                              • Instruction Fuzzy Hash: 0F218B75F106199FEB51DFA9D980AAEBBF5EB89310F108069EA45E7340E730DD01CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a6d774cac02b6e9454afdfe64c5449fccfcef955d6a44c591e37f3cc3f4f6d40
                                              • Instruction ID: 27ca4e3d61f6518549d71c5f411ffc45e9872c3213d82260caf1783040e61900
                                              • Opcode Fuzzy Hash: a6d774cac02b6e9454afdfe64c5449fccfcef955d6a44c591e37f3cc3f4f6d40
                                              • Instruction Fuzzy Hash: 65217A75F106199FEB50DF69D980AAEB7F5EB88710F108069EA0AE7384E730DD41CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b81cdb3557e67dfb14f5394c27b3620aaecb7be315d226eaa489583c7458d735
                                              • Instruction ID: 0f0cccf4c95ce2f9f5d2ee77cadcacd38cd8013878bf110425d92c2ffee7320f
                                              • Opcode Fuzzy Hash: b81cdb3557e67dfb14f5394c27b3620aaecb7be315d226eaa489583c7458d735
                                              • Instruction Fuzzy Hash: 07219031A006099FCF64CEE9C8C5AAFFBB2FB85308F104929E115D7654D772A945CB82
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3743285357.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_11fd000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db73b8543b0b2ab517a65ed28abc22d0a9e8eb3503c46cf6c5f3c2cec8ba41ca
                                              • Instruction ID: 6241084c9ec28a5768366c5d7ae381d3b12539d2e8a74c98ad98cf30c3425fcd
                                              • Opcode Fuzzy Hash: db73b8543b0b2ab517a65ed28abc22d0a9e8eb3503c46cf6c5f3c2cec8ba41ca
                                              • Instruction Fuzzy Hash: 2B21F271604204DFDF19DF98E980B26BBA5EB84314F24C5ADEA094B296C37AD447CA62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3743285357.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_11fd000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9abd66cc2f945619954bd18660b08f145437638a27b78d08d509a28c72f71451
                                              • Instruction ID: 59e7d6b60c54ee4485e0c55746533005470aeca8626fe27cf46a7130ce28ca94
                                              • Opcode Fuzzy Hash: 9abd66cc2f945619954bd18660b08f145437638a27b78d08d509a28c72f71451
                                              • Instruction Fuzzy Hash: D221D4B1648244DFDF09DF58E9C0B26BF65FB84314F24C66DEA094B256C336D846C662
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3743285357.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_11fd000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2cce7591a786eab44b139de56985050bc87292868ef4013571e5d7542ca797fc
                                              • Instruction ID: 80a72881e21c7d6530cd45705bdca2a63561d9f520acbecb4dacf0c6a2ab40af
                                              • Opcode Fuzzy Hash: 2cce7591a786eab44b139de56985050bc87292868ef4013571e5d7542ca797fc
                                              • Instruction Fuzzy Hash: D2217A315093C08FCB07CB64D890715BF71AB46214F29C1EBD9898F2A3C33A980ACB62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3544e3b0fffc74ba9822f88a92040b970bb062eef7c7d7eafaff14b2d0933471
                                              • Instruction ID: c38971a100f319c9431527549c9dbb927ceac558628a65203251daae48904428
                                              • Opcode Fuzzy Hash: 3544e3b0fffc74ba9822f88a92040b970bb062eef7c7d7eafaff14b2d0933471
                                              • Instruction Fuzzy Hash: F111D335E002199BCB58DBA8C8406EEF7F5EB8A314F108579E509EB204DA31DD41CB91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40ecbb8baaedf29fc74b0020680a5b02006df23d4ac20a2e6696f9678f3f5c24
                                              • Instruction ID: 32f025ec53e347705d1d5414d5f0b1e92735787ef086202e271a45bcf9051264
                                              • Opcode Fuzzy Hash: 40ecbb8baaedf29fc74b0020680a5b02006df23d4ac20a2e6696f9678f3f5c24
                                              • Instruction Fuzzy Hash: 8411E136B100289BDF54A678E8106AE73EAABC9311F008439D50AE7344EE74DC028BE1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 97031614e7979b8f83ce757b150a7c61bbd982da92415835a2bf801353ad4952
                                              • Instruction ID: 3b02fce2fe59913d90eebe1e2686e4c33c43e9c6ff0312decc7b543f3e997bdc
                                              • Opcode Fuzzy Hash: 97031614e7979b8f83ce757b150a7c61bbd982da92415835a2bf801353ad4952
                                              • Instruction Fuzzy Hash: E201B1357109060BCB659A7898A872E7BD6DBCB720F158429F60ACB355ED25EC024395
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bbafad0f852a130ece7994c1273d56d029a289925b40bd926a1c6b9c46bbd5ba
                                              • Instruction ID: 48834ade7c94cfb481f256aa0797865e23cbb164efbf3b7f83a988edf94a9cbe
                                              • Opcode Fuzzy Hash: bbafad0f852a130ece7994c1273d56d029a289925b40bd926a1c6b9c46bbd5ba
                                              • Instruction Fuzzy Hash: A0012F38B104021BCB28D67D9495B2FABDADBC6724F10843EF60ACB795EE25DC024394
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5bf7abc870ebe66c5b7080392ede01624b1482ce5ec3c2addec84149c200fcf
                                              • Instruction ID: d63e1eb99759944272122b7bb07ff082b0855e6a52cb26e30a6d986ca705b9d1
                                              • Opcode Fuzzy Hash: f5bf7abc870ebe66c5b7080392ede01624b1482ce5ec3c2addec84149c200fcf
                                              • Instruction Fuzzy Hash: 7521D6B1D01259AFCB00DF9AD884ADEFFB8FB49320F10821AE518B7240D3756944CFA5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c564c5b89bd43fd0ca01adf1717ba68261470cc47dba2d8185045bbe1b2c9fc6
                                              • Instruction ID: c7859e4a3f77d00879d8bbf5b157fd3e7f2a27b66f1a426609a017c87ac69012
                                              • Opcode Fuzzy Hash: c564c5b89bd43fd0ca01adf1717ba68261470cc47dba2d8185045bbe1b2c9fc6
                                              • Instruction Fuzzy Hash: 5301A735B100245BEF549A79DC146EF77EA9BC9710F104539D956E7344EE60CD0287E1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3743285357.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_11fd000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5867ea3066c8d66ae14a7e2e82bc980888112c1538e9e79c62cad117a2215a17
                                              • Instruction ID: b24604dce2311eeedd63c3a2bb1631d03356218c94b828c600e3fd578b92d1dd
                                              • Opcode Fuzzy Hash: 5867ea3066c8d66ae14a7e2e82bc980888112c1538e9e79c62cad117a2215a17
                                              • Instruction Fuzzy Hash: D811BF75508284CFDB0ACF54D9C4B25BFB2FB84318F28C6ADD9494B656C33AD44ACB51
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 06ed28f482c70a069f3cd9dbbe677ac4ea1ee26197f3f4f5a67fbf878f405408
                                              • Instruction ID: 79cc973dfb67f1df3a2312d3abcb2cab77ad81b9a770cf9c90043a6985f4a062
                                              • Opcode Fuzzy Hash: 06ed28f482c70a069f3cd9dbbe677ac4ea1ee26197f3f4f5a67fbf878f405408
                                              • Instruction Fuzzy Hash: 9311D0B1D01259AFCB00DF9AD884ADEFFB8FB49310F10812AE918B7200D375A944CFA5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb8aaa02a28cb8c9a4a2939cb04f42fe7f097cbdeff425fcfbe53145abcae55c
                                              • Instruction ID: 024a96a04056c5334961fdbf3ff5628ae65ec01d405e7e0995ab84daaee6198e
                                              • Opcode Fuzzy Hash: bb8aaa02a28cb8c9a4a2939cb04f42fe7f097cbdeff425fcfbe53145abcae55c
                                              • Instruction Fuzzy Hash: 03012134B104120BCB28D57C9451B2FA3DADBCA724F108439F20ECB794EE65EC020394
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f333fbb7deef182f296ab37c442d769620cae44df83d1a53be7bd85b8af8918c
                                              • Instruction ID: 95e9a53297265d85580a3d0fdf26a8aa02b40bffc217a6f8b44ee7f1548adf81
                                              • Opcode Fuzzy Hash: f333fbb7deef182f296ab37c442d769620cae44df83d1a53be7bd85b8af8918c
                                              • Instruction Fuzzy Hash: 3D012834B101400FDBA5DE78E55076E7BE5EB46314F144429F289CF365EA64DC01C781
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a339004e4d92c85bfae27ec9f50a77284404ffac4e29950a7c13bbc63f4daa63
                                              • Instruction ID: d0b947d1374d15f75c082f1ff5c2711d3cae7bf55c27608de8218eba9fe052ec
                                              • Opcode Fuzzy Hash: a339004e4d92c85bfae27ec9f50a77284404ffac4e29950a7c13bbc63f4daa63
                                              • Instruction Fuzzy Hash: 2301A435B108160BCB65D97CD499B2F77DADBCA720F108439F60ACB354EE25EC024795
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6667dc649f30044ee5a38721da80d771e42b5efbeb0beecc5c0bd38e90d1a94d
                                              • Instruction ID: c8d5888e02006ed4007087368343ce95e65c2bbc3e1011ad506fe6d5597ad36e
                                              • Opcode Fuzzy Hash: 6667dc649f30044ee5a38721da80d771e42b5efbeb0beecc5c0bd38e90d1a94d
                                              • Instruction Fuzzy Hash: 0301A434B105154BDB64DA7CF550B6EB7D9EB8A724F108438F60ACB354EEA9EC4187C0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ff1274bc229b73093ebf7988447a36796c3f0f0f69292efb80b57bbb8c639c11
                                              • Instruction ID: cab56f0438e88e0980bec256b6d1d972427baa63c6b02555375b4ed080ac89f9
                                              • Opcode Fuzzy Hash: ff1274bc229b73093ebf7988447a36796c3f0f0f69292efb80b57bbb8c639c11
                                              • Instruction Fuzzy Hash: D1E0DF71E1422CABEF50CAB1894835E77A9DB83314F218AA6EA04E7241F177C9418B81
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: defcd98296a07231a5b4897097714763c583b603e83f85b61719a5b9efdd0c69
                                              • Instruction ID: e2babdd8614594618481b84989f9a4ae581e5f10835dd778a1b32f24f101ce61
                                              • Opcode Fuzzy Hash: defcd98296a07231a5b4897097714763c583b603e83f85b61719a5b9efdd0c69
                                              • Instruction Fuzzy Hash: 93E01271E1412CABDF50DEB4C94575EB7ADE753214F2085A5D608E7241F177DA418780
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-698649689
                                              • Opcode ID: ca483e0d549476d72327bddb0d09b8190f6a001962741d0ecd43123ac4e25f05
                                              • Instruction ID: 612c9c59a5527b10891b85dbf7bd3f4f176230e029e6d25a93744c5637146018
                                              • Opcode Fuzzy Hash: ca483e0d549476d72327bddb0d09b8190f6a001962741d0ecd43123ac4e25f05
                                              • Instruction Fuzzy Hash: EB121A30E002198FDB68DF65C994AADB7F6BF89304F208969D509EB364EB309D45CF81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-2216122830
                                              • Opcode ID: 4befe67c69cb0633fbc54d41cdd04f02079d30730dc0ab723397164f1e1c8f89
                                              • Instruction ID: 2af57711f36b21159637ccf5815fbfadf51ef012f174e3a64470d6ad4b271a5d
                                              • Opcode Fuzzy Hash: 4befe67c69cb0633fbc54d41cdd04f02079d30730dc0ab723397164f1e1c8f89
                                              • Instruction Fuzzy Hash: F1917030E10209DFEBACDB64D984B6E7BF6AF85B04F108529E501EB258DB74D845CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .5wq$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-3129995876
                                              • Opcode ID: 37e3d1798abbe836fe4f03bf7bf345deb24f2e5577f89661df6ba8be03ce052f
                                              • Instruction ID: 367dd36c978495a9f381f3e6e301a974816ad6d1305473f95e4e8cb00efb5476
                                              • Opcode Fuzzy Hash: 37e3d1798abbe836fe4f03bf7bf345deb24f2e5577f89661df6ba8be03ce052f
                                              • Instruction Fuzzy Hash: 2BF15F30B10209DFDB99EFA4C554A6EB7B7BF89304F208568D416DB399DB35AC42CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-155944776
                                              • Opcode ID: 98de76716f8b53e492f29a990f5253202eedeb6c22449d17cd545e1c864d0c1f
                                              • Instruction ID: ba7f7ba5dd4412abe41f8ff47a37122a982cb73f04a805176665599df5d17cdd
                                              • Opcode Fuzzy Hash: 98de76716f8b53e492f29a990f5253202eedeb6c22449d17cd545e1c864d0c1f
                                              • Instruction Fuzzy Hash: 25718F30F1420A8FDB58CFA8D68466DB7F6FF86704F104869D506EB254DB71E945CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: c3743195a4e90197c80aa697088939cb6ce9bdc6a25f4954e6ecd4cbe175a5a2
                                              • Instruction ID: a4082bb45e2f2dd42a4c959b69ebe490301adb74b326359c141f0ba42c1397ca
                                              • Opcode Fuzzy Hash: c3743195a4e90197c80aa697088939cb6ce9bdc6a25f4954e6ecd4cbe175a5a2
                                              • Instruction Fuzzy Hash: E5B16B70E10209CFDBA8EBA8C5846AEB7B2FF89304F248469D505DB359DB75DC46CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LR_q$LR_q$$_q$$_q
                                              • API String ID: 0-2912794808
                                              • Opcode ID: 148b2ff2a65435198687d94fefbe012e9588a996b6bd37a2d9ef03b9ba8536fc
                                              • Instruction ID: 3f89bec26817e273794cd7c050918a06aed499c8454bc97d8d0b47c79ba09361
                                              • Opcode Fuzzy Hash: 148b2ff2a65435198687d94fefbe012e9588a996b6bd37a2d9ef03b9ba8536fc
                                              • Instruction Fuzzy Hash: 555108707102069FDB68DB64D945A6E77F6FF89308F148569E516DB3A9DB30EC00CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.3759126734.00000000068E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_68e0000_HBL BLJ2T2411809005 & DAJKT2411000812.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: fb6cd582cbab510cf30e3a4b70a39b2df9cc09c29fec69a8ede3e2fdfab41d0d
                                              • Instruction ID: eb9348ae301b674ff4d10eca2c1fb13b1483978c9a3aa44ebef772f764909b34
                                              • Opcode Fuzzy Hash: fb6cd582cbab510cf30e3a4b70a39b2df9cc09c29fec69a8ede3e2fdfab41d0d
                                              • Instruction Fuzzy Hash: C551DF30E102098FDFA9EB64D6806AEB7B6FF8AB04F11852AD515EB355DB31DC41CB90

                                              Execution Graph

                                              Execution Coverage:11.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:208
                                              Total number of Limit Nodes:15
                                              execution_graph 23622 2406e50 23623 2406e6a 23622->23623 23624 2406e93 23623->23624 23626 2406ed9 23623->23626 23627 2406ef4 23626->23627 23631 2406f18 23627->23631 23635 2406f09 23627->23635 23628 2406f00 23628->23623 23633 2406f34 23631->23633 23632 2406fa0 23632->23628 23633->23632 23639 2405a34 23633->23639 23637 2406f18 23635->23637 23636 2406fa0 23636->23628 23637->23636 23638 2405a34 12 API calls 23637->23638 23638->23637 23641 2405a3f 23639->23641 23640 240729a 23640->23633 23641->23640 23652 240a227 23641->23652 23656 240a3c6 23641->23656 23661 240a455 23641->23661 23665 240a823 23641->23665 23670 240a363 23641->23670 23674 2409bb2 23641->23674 23679 2409a51 23641->23679 23684 240a269 23641->23684 23688 2409af8 23641->23688 23692 240a518 23641->23692 23697 240af78 23652->23697 23702 240af88 23652->23702 23653 240a23f 23653->23641 23657 240a3f2 23656->23657 23715 24093b0 23657->23715 23719 24093aa 23657->23719 23658 240a42c 23723 240949a 23661->23723 23727 24094a0 23661->23727 23662 240a477 23666 2409b99 23665->23666 23666->23665 23667 2409ac1 23666->23667 23731 240bb28 23666->23731 23736 240bb38 23666->23736 23672 24093b0 WriteProcessMemory 23670->23672 23673 24093aa WriteProcessMemory 23670->23673 23671 240a387 23672->23671 23673->23671 23675 2409b99 23674->23675 23676 2409ac1 23675->23676 23677 240bb28 2 API calls 23675->23677 23678 240bb38 2 API calls 23675->23678 23677->23675 23678->23675 23680 2409a6d 23679->23680 23749 2409638 23680->23749 23753 240962c 23680->23753 23757 240bae0 23684->23757 23762 240baf0 23684->23762 23685 240a281 23767 240afc0 23688->23767 23772 240afd0 23688->23772 23689 2409ac1 23693 240a51e 23692->23693 23694 2409ac1 23693->23694 23695 24093b0 WriteProcessMemory 23693->23695 23696 24093aa WriteProcessMemory 23693->23696 23695->23694 23696->23694 23698 240af88 23697->23698 23707 2409212 23698->23707 23711 2409218 23698->23711 23699 240afb3 23699->23653 23703 240af9d 23702->23703 23705 2409212 Wow64SetThreadContext 23703->23705 23706 2409218 Wow64SetThreadContext 23703->23706 23704 240afb3 23704->23653 23705->23704 23706->23704 23708 240925d Wow64SetThreadContext 23707->23708 23710 24092a5 23708->23710 23710->23699 23712 240925d Wow64SetThreadContext 23711->23712 23714 24092a5 23712->23714 23714->23699 23716 24093f8 WriteProcessMemory 23715->23716 23718 240944f 23716->23718 23718->23658 23720 24093f8 WriteProcessMemory 23719->23720 23722 240944f 23720->23722 23722->23658 23724 24094eb ReadProcessMemory 23723->23724 23726 240952f 23724->23726 23726->23662 23728 24094eb ReadProcessMemory 23727->23728 23730 240952f 23728->23730 23730->23662 23732 240bb38 23731->23732 23741 2409160 23732->23741 23745 2409168 23732->23745 23733 240bb60 23733->23666 23737 240bb4d 23736->23737 23739 2409160 ResumeThread 23737->23739 23740 2409168 ResumeThread 23737->23740 23738 240bb60 23738->23666 23739->23738 23740->23738 23742 2409163 ResumeThread 23741->23742 23744 24091d9 23742->23744 23744->23733 23746 24091a8 ResumeThread 23745->23746 23748 24091d9 23746->23748 23748->23733 23750 24096c1 CreateProcessA 23749->23750 23752 2409883 23750->23752 23752->23752 23754 24096c1 CreateProcessA 23753->23754 23756 2409883 23754->23756 23756->23756 23758 240bb05 23757->23758 23760 2409212 Wow64SetThreadContext 23758->23760 23761 2409218 Wow64SetThreadContext 23758->23761 23759 240bb1b 23759->23685 23760->23759 23761->23759 23763 240bb05 23762->23763 23765 2409212 Wow64SetThreadContext 23763->23765 23766 2409218 Wow64SetThreadContext 23763->23766 23764 240bb1b 23764->23685 23765->23764 23766->23764 23768 240afe5 23767->23768 23777 24092f0 23768->23777 23781 24092ea 23768->23781 23769 240b004 23769->23689 23773 240afe5 23772->23773 23775 24092f0 VirtualAllocEx 23773->23775 23776 24092ea VirtualAllocEx 23773->23776 23774 240b004 23774->23689 23775->23774 23776->23774 23778 2409330 VirtualAllocEx 23777->23778 23780 240936d 23778->23780 23780->23769 23782 2409330 VirtualAllocEx 23781->23782 23784 240936d 23782->23784 23784->23769 23832 2401cf0 23833 2401d58 CreateWindowExW 23832->23833 23835 2401e14 23833->23835 23835->23835 23785 72d5a0 DuplicateHandle 23786 72d636 23785->23786 23836 69d01c 23837 69d034 23836->23837 23838 69d08e 23837->23838 23843 2401e97 23837->23843 23847 2400ad4 23837->23847 23856 2402c09 23837->23856 23865 2401ea8 23837->23865 23844 2401ea8 23843->23844 23845 2400ad4 CallWindowProcW 23844->23845 23846 2401eef 23845->23846 23846->23838 23848 2400adf 23847->23848 23849 2402c79 23848->23849 23851 2402c69 23848->23851 23885 2400bfc 23849->23885 23869 2402d90 23851->23869 23874 2402e6c 23851->23874 23880 2402da0 23851->23880 23852 2402c77 23859 2402c45 23856->23859 23857 2402c79 23858 2400bfc CallWindowProcW 23857->23858 23861 2402c77 23858->23861 23859->23857 23860 2402c69 23859->23860 23862 2402d90 CallWindowProcW 23860->23862 23863 2402da0 CallWindowProcW 23860->23863 23864 2402e6c CallWindowProcW 23860->23864 23862->23861 23863->23861 23864->23861 23866 2401ece 23865->23866 23867 2400ad4 CallWindowProcW 23866->23867 23868 2401eef 23867->23868 23868->23838 23871 2402da0 23869->23871 23870 2402e40 23870->23852 23889 2402e58 23871->23889 23892 2402e5a 23871->23892 23875 2402e7a 23874->23875 23876 2402e2a 23874->23876 23878 2402e58 CallWindowProcW 23876->23878 23879 2402e5a CallWindowProcW 23876->23879 23877 2402e40 23877->23852 23878->23877 23879->23877 23881 2402db4 23880->23881 23883 2402e58 CallWindowProcW 23881->23883 23884 2402e5a CallWindowProcW 23881->23884 23882 2402e40 23882->23852 23883->23882 23884->23882 23886 2400c07 23885->23886 23887 240435a CallWindowProcW 23886->23887 23888 2404309 23886->23888 23887->23888 23888->23852 23890 2402e69 23889->23890 23895 24042a0 23889->23895 23890->23870 23893 2402e69 23892->23893 23894 24042a0 CallWindowProcW 23892->23894 23893->23870 23894->23893 23896 2400bfc CallWindowProcW 23895->23896 23897 24042aa 23896->23897 23897->23890 23787 724668 23788 72467a 23787->23788 23789 724686 23788->23789 23791 724779 23788->23791 23792 72479d 23791->23792 23796 724878 23792->23796 23800 724888 23792->23800 23797 7248af 23796->23797 23799 72498c 23797->23799 23804 724248 23797->23804 23802 7248af 23800->23802 23801 72498c 23801->23801 23802->23801 23803 724248 CreateActCtxA 23802->23803 23803->23801 23805 725918 CreateActCtxA 23804->23805 23807 7259db 23805->23807 23808 72d358 23809 72d39e GetCurrentProcess 23808->23809 23811 72d3f0 GetCurrentThread 23809->23811 23812 72d3e9 23809->23812 23813 72d426 23811->23813 23814 72d42d GetCurrentProcess 23811->23814 23812->23811 23813->23814 23817 72d463 23814->23817 23815 72d48b GetCurrentThreadId 23816 72d4bc 23815->23816 23817->23815 23818 72afd8 23822 72b0d0 23818->23822 23827 72b0bf 23818->23827 23819 72afe7 23823 72b0e1 23822->23823 23824 72b104 23822->23824 23823->23824 23825 72b308 GetModuleHandleW 23823->23825 23824->23819 23826 72b335 23825->23826 23826->23819 23828 72b104 23827->23828 23829 72b0e1 23827->23829 23828->23819 23829->23828 23830 72b308 GetModuleHandleW 23829->23830 23831 72b335 23830->23831 23831->23819

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 557 72d349-72d3e7 GetCurrentProcess 562 72d3f0-72d424 GetCurrentThread 557->562 563 72d3e9-72d3ef 557->563 564 72d426-72d42c 562->564 565 72d42d-72d461 GetCurrentProcess 562->565 563->562 564->565 566 72d463-72d469 565->566 567 72d46a-72d485 call 72d527 565->567 566->567 571 72d48b-72d4ba GetCurrentThreadId 567->571 572 72d4c3-72d525 571->572 573 72d4bc-72d4c2 571->573 573->572
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0072D3D6
                                              • GetCurrentThread.KERNEL32 ref: 0072D413
                                              • GetCurrentProcess.KERNEL32 ref: 0072D450
                                              • GetCurrentThreadId.KERNEL32 ref: 0072D4A9
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: aa112f42d5d197e02bdb277b22cd78cac3b429b4637ebfc96971fce56fc9b1be
                                              • Instruction ID: 4414b7a072dcefdb41ae699cef45915af80d99b86c214ca8b891c9016e5bc1d5
                                              • Opcode Fuzzy Hash: aa112f42d5d197e02bdb277b22cd78cac3b429b4637ebfc96971fce56fc9b1be
                                              • Instruction Fuzzy Hash: 7B5167B09003499FDB54DFA9D548B9EBBF1EF48314F208069E409B73A1DB74A944CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 580 72d358-72d3e7 GetCurrentProcess 584 72d3f0-72d424 GetCurrentThread 580->584 585 72d3e9-72d3ef 580->585 586 72d426-72d42c 584->586 587 72d42d-72d461 GetCurrentProcess 584->587 585->584 586->587 588 72d463-72d469 587->588 589 72d46a-72d485 call 72d527 587->589 588->589 593 72d48b-72d4ba GetCurrentThreadId 589->593 594 72d4c3-72d525 593->594 595 72d4bc-72d4c2 593->595 595->594
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0072D3D6
                                              • GetCurrentThread.KERNEL32 ref: 0072D413
                                              • GetCurrentProcess.KERNEL32 ref: 0072D450
                                              • GetCurrentThreadId.KERNEL32 ref: 0072D4A9
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 2f71640b43fd50a3eeed2fda62e9fc5f6e4939652122096da4eb5603f52b6922
                                              • Instruction ID: 8d852183eef9d5873f76f89cde1014d320e922af6a52de8b17ad509fc85d330c
                                              • Opcode Fuzzy Hash: 2f71640b43fd50a3eeed2fda62e9fc5f6e4939652122096da4eb5603f52b6922
                                              • Instruction Fuzzy Hash: FB5157B09003499FDB54DFA9D548B9EBBF1EF48314F208069E409B73A0DB746944CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 602 72b0d0-72b0df 603 72b0e1-72b0ee call 72aaa4 602->603 604 72b10b-72b10f 602->604 610 72b0f0 603->610 611 72b104 603->611 606 72b123-72b164 604->606 607 72b111-72b11b 604->607 613 72b171-72b17f 606->613 614 72b166-72b16e 606->614 607->606 658 72b0f6 call 72b368 610->658 659 72b0f6 call 72b358 610->659 611->604 615 72b1a3-72b1a5 613->615 616 72b181-72b186 613->616 614->613 621 72b1a8-72b1af 615->621 618 72b191 616->618 619 72b188-72b18f call 72aab0 616->619 617 72b0fc-72b0fe 617->611 620 72b240-72b300 617->620 623 72b193-72b1a1 618->623 619->623 653 72b302-72b305 620->653 654 72b308-72b333 GetModuleHandleW 620->654 624 72b1b1-72b1b9 621->624 625 72b1bc-72b1c3 621->625 623->621 624->625 628 72b1d0-72b1d9 call 72aac0 625->628 629 72b1c5-72b1cd 625->629 633 72b1e6-72b1eb 628->633 634 72b1db-72b1e3 628->634 629->628 635 72b209-72b216 633->635 636 72b1ed-72b1f4 633->636 634->633 643 72b218-72b236 635->643 644 72b239-72b23f 635->644 636->635 638 72b1f6-72b206 call 72aad0 call 72aae0 636->638 638->635 643->644 653->654 655 72b335-72b33b 654->655 656 72b33c-72b350 654->656 655->656 658->617 659->617
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0072B326
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID: XOi$XOi
                                              • API String ID: 4139908857-3909752956
                                              • Opcode ID: 84f0fd9c663cc5c3b3e88e4552eb27d08613fd08751ea341dd52550a7abf0404
                                              • Instruction ID: 67813691b3f3e9cb977513afb5ab617bcb4dc5a9cf51ce48ac62bf214cb0b1a0
                                              • Opcode Fuzzy Hash: 84f0fd9c663cc5c3b3e88e4552eb27d08613fd08751ea341dd52550a7abf0404
                                              • Instruction Fuzzy Hash: 6A715370A00B198FDB24DF29E55575ABBF1FF88300F10892DE48AD7A50DB38E949CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 735 24093aa-24093fe 737 2409400-240940c 735->737 738 240940e-240944d WriteProcessMemory 735->738 737->738 740 2409456-2409486 738->740 741 240944f-2409455 738->741 741->740
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02409440
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID: W
                                              • API String ID: 3559483778-655174618
                                              • Opcode ID: e32a40aa0f8c367b0502941956ab2fb674149f4a27b8b1ae43951982d4026be7
                                              • Instruction ID: 058e618aaf1480be6bb218fe426841d121ec10b07bf9e2ce16da175b30d79257
                                              • Opcode Fuzzy Hash: e32a40aa0f8c367b0502941956ab2fb674149f4a27b8b1ae43951982d4026be7
                                              • Instruction Fuzzy Hash: 9A2124B19002199FDB10DFA9C8857EEBBF1FF48314F10882AE959A7241C7789955CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 745 24092ea-240936b VirtualAllocEx 748 2409374-2409399 745->748 749 240936d-2409373 745->749 749->748
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0240935E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: W
                                              • API String ID: 4275171209-655174618
                                              • Opcode ID: a8cabd1f5ccfe68c7eba1cd26419bb82980b7e0d140f235444643b95b76d1034
                                              • Instruction ID: 49bca24892b4438495f3eb37316fa87426f14d3bc5c271b96edb465929727c69
                                              • Opcode Fuzzy Hash: a8cabd1f5ccfe68c7eba1cd26419bb82980b7e0d140f235444643b95b76d1034
                                              • Instruction Fuzzy Hash: 1D1156719002499FDB10DFA9C8456EFFBF5EF48324F14881AD519A7250C775A945CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 784 240962c-24096cd 786 2409706-2409726 784->786 787 24096cf-24096d9 784->787 792 2409728-2409732 786->792 793 240975f-240978e 786->793 787->786 788 24096db-24096dd 787->788 789 2409700-2409703 788->789 790 24096df-24096e9 788->790 789->786 794 24096eb 790->794 795 24096ed-24096fc 790->795 792->793 796 2409734-2409736 792->796 803 2409790-240979a 793->803 804 24097c7-2409881 CreateProcessA 793->804 794->795 795->795 797 24096fe 795->797 798 2409738-2409742 796->798 799 2409759-240975c 796->799 797->789 801 2409744 798->801 802 2409746-2409755 798->802 799->793 801->802 802->802 805 2409757 802->805 803->804 806 240979c-240979e 803->806 815 2409883-2409889 804->815 816 240988a-2409910 804->816 805->799 808 24097a0-24097aa 806->808 809 24097c1-24097c4 806->809 810 24097ac 808->810 811 24097ae-24097bd 808->811 809->804 810->811 811->811 813 24097bf 811->813 813->809 815->816 826 2409920-2409924 816->826 827 2409912-2409916 816->827 829 2409934-2409938 826->829 830 2409926-240992a 826->830 827->826 828 2409918 827->828 828->826 832 2409948-240994c 829->832 833 240993a-240993e 829->833 830->829 831 240992c 830->831 831->829 835 240995e-2409965 832->835 836 240994e-2409954 832->836 833->832 834 2409940 833->834 834->832 837 2409967-2409976 835->837 838 240997c 835->838 836->835 837->838 840 240997d 838->840 840->840
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0240986E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 53471cca8d47cd45e5891f7f163aa4a7f3dd6d17a0bda4e42c39850373f92ec0
                                              • Instruction ID: aa143e5e2ee9fdb2540e1109ac4985ae61a7f009380dd23d3ce763112258c669
                                              • Opcode Fuzzy Hash: 53471cca8d47cd45e5891f7f163aa4a7f3dd6d17a0bda4e42c39850373f92ec0
                                              • Instruction Fuzzy Hash: AEA19E71D00619CFEB14CF68C8817EEBBB2BF48714F1485AAD848A7391DB749985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 841 2409638-24096cd 843 2409706-2409726 841->843 844 24096cf-24096d9 841->844 849 2409728-2409732 843->849 850 240975f-240978e 843->850 844->843 845 24096db-24096dd 844->845 846 2409700-2409703 845->846 847 24096df-24096e9 845->847 846->843 851 24096eb 847->851 852 24096ed-24096fc 847->852 849->850 853 2409734-2409736 849->853 860 2409790-240979a 850->860 861 24097c7-2409881 CreateProcessA 850->861 851->852 852->852 854 24096fe 852->854 855 2409738-2409742 853->855 856 2409759-240975c 853->856 854->846 858 2409744 855->858 859 2409746-2409755 855->859 856->850 858->859 859->859 862 2409757 859->862 860->861 863 240979c-240979e 860->863 872 2409883-2409889 861->872 873 240988a-2409910 861->873 862->856 865 24097a0-24097aa 863->865 866 24097c1-24097c4 863->866 867 24097ac 865->867 868 24097ae-24097bd 865->868 866->861 867->868 868->868 870 24097bf 868->870 870->866 872->873 883 2409920-2409924 873->883 884 2409912-2409916 873->884 886 2409934-2409938 883->886 887 2409926-240992a 883->887 884->883 885 2409918 884->885 885->883 889 2409948-240994c 886->889 890 240993a-240993e 886->890 887->886 888 240992c 887->888 888->886 892 240995e-2409965 889->892 893 240994e-2409954 889->893 890->889 891 2409940 890->891 891->889 894 2409967-2409976 892->894 895 240997c 892->895 893->892 894->895 897 240997d 895->897 897->897
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0240986E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: e4d1dcc7e1c9ab7e77886adb8f1f5c788886c0523affc4050ea19175c8f18623
                                              • Instruction ID: 15466c8bddd4b0da1a8a986ae137e5942075cc16465e0aca6e55d7773ba74d70
                                              • Opcode Fuzzy Hash: e4d1dcc7e1c9ab7e77886adb8f1f5c788886c0523affc4050ea19175c8f18623
                                              • Instruction Fuzzy Hash: 9C919D71D00619CFDB10CFA8C880BEEBBB2BF48714F0085AAD848A7391DB749985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 898 2401ce4-2401d56 899 2401d61-2401d68 898->899 900 2401d58-2401d5e 898->900 901 2401d73-2401dab 899->901 902 2401d6a-2401d70 899->902 900->899 903 2401db3-2401e12 CreateWindowExW 901->903 902->901 904 2401e14-2401e1a 903->904 905 2401e1b-2401e53 903->905 904->905 909 2401e60 905->909 910 2401e55-2401e58 905->910 911 2401e61 909->911 910->909 911->911
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02401E02
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: d79cdd63df6e2375a2a984fb5889362cd3239126d07f9157a7392b27144b70dc
                                              • Instruction ID: 5c0154b7059ab394f88df6fdeba72333db92f09d0203f7e6a296361ade3ce26c
                                              • Opcode Fuzzy Hash: d79cdd63df6e2375a2a984fb5889362cd3239126d07f9157a7392b27144b70dc
                                              • Instruction Fuzzy Hash: CE51C2B1D003499FDB14CFA9C984ADEBFB1BF88314F64812AE419AB250D7759985CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 912 2401cf0-2401d56 913 2401d61-2401d68 912->913 914 2401d58-2401d5e 912->914 915 2401d73-2401e12 CreateWindowExW 913->915 916 2401d6a-2401d70 913->916 914->913 918 2401e14-2401e1a 915->918 919 2401e1b-2401e53 915->919 916->915 918->919 923 2401e60 919->923 924 2401e55-2401e58 919->924 925 2401e61 923->925 924->923 925->925
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02401E02
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: d15973c2b627b6f199afc36fe207042a8ae4c2814341fe5bc103090fb78b61d7
                                              • Instruction ID: f50da89e4e7db3e3174921623347e7361e4d63c28a1d5faaef79d285ebb0f9bb
                                              • Opcode Fuzzy Hash: d15973c2b627b6f199afc36fe207042a8ae4c2814341fe5bc103090fb78b61d7
                                              • Instruction Fuzzy Hash: 2541B2B1D003499FDB14CF99C984ADEBBB5FF48314F64812AE419AB250D7719985CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 926 72590d-7259d9 CreateActCtxA 928 7259e2-725a3c 926->928 929 7259db-7259e1 926->929 936 725a4b-725a4f 928->936 937 725a3e-725a41 928->937 929->928 938 725a60 936->938 939 725a51-725a5d 936->939 937->936 941 725a61 938->941 939->938 941->941
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 007259C9
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 5b5b054c7fcef85ae98a4f58218cec79d670548d3a0c442e4025adf6baa2cd44
                                              • Instruction ID: fc02dcf6b138c4e3f044d9068c969049fac9d4ca521585b71795aba1712c99c8
                                              • Opcode Fuzzy Hash: 5b5b054c7fcef85ae98a4f58218cec79d670548d3a0c442e4025adf6baa2cd44
                                              • Instruction Fuzzy Hash: DB410FB0C00629CFDB24CFA9C884B8DBBF5FF48304F60816AD048AB255DB75698ACF50
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 02404381
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: d5fd5a1ebf9a62e53bf8e71f2893290e78a733877814aedffaacd4c297263f36
                                              • Instruction ID: a181c3ee319dba900a7cd2f62f9b4fa1adab8b96575215dcc83ac0974b8a5750
                                              • Opcode Fuzzy Hash: d5fd5a1ebf9a62e53bf8e71f2893290e78a733877814aedffaacd4c297263f36
                                              • Instruction Fuzzy Hash: 46412CB5A00309DFCB14CF99C488A9EBBF5FB88314F248559D519A7361D774A881CFA0
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 007259C9
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: ba59c0d79dd196d43fd8286a21426a3d0a6aa7eb2ad9a09a29de8b6c4f2cb651
                                              • Instruction ID: e7d8719ec3fac3754dbaec720c4e58ca0a2606fafbffb7308e40819f1e482b19
                                              • Opcode Fuzzy Hash: ba59c0d79dd196d43fd8286a21426a3d0a6aa7eb2ad9a09a29de8b6c4f2cb651
                                              • Instruction Fuzzy Hash: 63410FB0C0062DCBDB24CFA9C884B8EBBF5FF48304F20806AD448AB255DB756985CF90
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02409440
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 71934536bcf934fed7d9aee01dad3a1149817629ff49d36c31168bf52148d308
                                              • Instruction ID: dc050c1cf9e93504ebdd8e57a2f2c077e777256db7aa20ca0b82e4dd61b1fcb9
                                              • Opcode Fuzzy Hash: 71934536bcf934fed7d9aee01dad3a1149817629ff49d36c31168bf52148d308
                                              • Instruction Fuzzy Hash: BE2136B1D003499FCB10DFAAC885BDEBBF5FF88314F10842AE919A7241C7789955CBA4
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02409296
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 3bb5c4699e92ee078140d4445c82fbb41497c43c16ec577b1687d3ea29510719
                                              • Instruction ID: 517821b374a85ff2c459e15ddf43cb104906270ea07d607d5b6a21e36a0463d4
                                              • Opcode Fuzzy Hash: 3bb5c4699e92ee078140d4445c82fbb41497c43c16ec577b1687d3ea29510719
                                              • Instruction Fuzzy Hash: 53214571D002098FDB10DFAAC485BEEBBF4AF88324F14882ED459A7241CB789945CFA0
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02409520
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: d6fb387c5fdb11fca00955a4f87ddf3064e2f1a42173557492d7ce5c558075e6
                                              • Instruction ID: 8c1a8acc9cd4de9fca642f598f00b92510cee9dd09506eecd272cc729542cb25
                                              • Opcode Fuzzy Hash: d6fb387c5fdb11fca00955a4f87ddf3064e2f1a42173557492d7ce5c558075e6
                                              • Instruction Fuzzy Hash: 9E2136B1D002499FCB10DFAAD881AEEFBF1FF88310F14842EE519A7241C7759945CBA0
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0072D627
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 713a646c8effb48265fa85962e8d004111f51d6c7fd3653065c89a89f63cd363
                                              • Instruction ID: 60679e50cc0b2d64cb28ce32b169a6152e42eb958ddce5556a22c590e5efa8ff
                                              • Opcode Fuzzy Hash: 713a646c8effb48265fa85962e8d004111f51d6c7fd3653065c89a89f63cd363
                                              • Instruction Fuzzy Hash: A821E6B5D00248AFDB10CF9AD984ADEBBF4FB48310F14841AE918B3350D374A954CFA5
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02409296
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 0dc30d60dac232a7d6a2911aa5cdc87df738902647dc18229158c937a12d25cf
                                              • Instruction ID: 109f017c7bb3c9a47b175057462ce966abef1368c9d15a0296efadd2071341fc
                                              • Opcode Fuzzy Hash: 0dc30d60dac232a7d6a2911aa5cdc87df738902647dc18229158c937a12d25cf
                                              • Instruction Fuzzy Hash: EC213471D002098FDB10DFAAC4857EEBBF4AB88324F14842ED419A7241CB78A985CBA0
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02409520
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 08ebbfb917c3e97051d62e8eb0171c4af0c2db5b41bb119105f0cd68f7dd018a
                                              • Instruction ID: 9692f2d6470564f04ef643aefb39e34a97fb2b6cc5eecba0426c772c6396335f
                                              • Opcode Fuzzy Hash: 08ebbfb917c3e97051d62e8eb0171c4af0c2db5b41bb119105f0cd68f7dd018a
                                              • Instruction Fuzzy Hash: 952137B1D003499FCB10DFAAC881AEEFBF5FF48320F50842AE519A7240C7799945CBA0
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0072D627
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: d6198bd4ebf2991094acf352813761fa140311e744228c59d6796ba045837215
                                              • Instruction ID: deafacfb4a0a634b2c5ff2baadd75115d9e826c42a0b63f17fd165bd9053d96a
                                              • Opcode Fuzzy Hash: d6198bd4ebf2991094acf352813761fa140311e744228c59d6796ba045837215
                                              • Instruction Fuzzy Hash: 7821C4B5D00258AFDB10CFAAD584ADEBBF5EB48310F14841AE918B3350D378A954CFA5
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0240935E
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: d60e3e599e1b7b73953bef3aa64b9ed5c91ad8915d19f63da2501ebe8cd1fb3a
                                              • Instruction ID: 1786a9e97c3f95855da9dbabb551edc199e1d996dc59f669071856f7a1ecd419
                                              • Opcode Fuzzy Hash: d60e3e599e1b7b73953bef3aa64b9ed5c91ad8915d19f63da2501ebe8cd1fb3a
                                              • Instruction Fuzzy Hash: 801149719002499FCB20DFAAC845ADFFFF5EF88324F10841AE519A7250C775A944CFA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: ae186f481e678088d8883cbd034ff814cc8061227d6e824fdf64666dd86fd876
                                              • Instruction ID: abebca821cc9371511da1faa59642dc5013055da4c80971c45a043e99517c44b
                                              • Opcode Fuzzy Hash: ae186f481e678088d8883cbd034ff814cc8061227d6e824fdf64666dd86fd876
                                              • Instruction Fuzzy Hash: A81149B1D042498FDB10DFAAC4457EFBBF5AB88324F24882AD019A7240C7759945CBA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1411919375.0000000002400000.00000040.00000800.00020000.00000000.sdmp, Offset: 02400000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_2400000_adobe.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: da1005e6c9536748cb285845e176621d4329f80768666cfd4ae9c7a4b7763396
                                              • Instruction ID: 50c87f66c2fad7e8375d4d37c6fbb37c8ac3a0480e0c13c00638ba611f928e27
                                              • Opcode Fuzzy Hash: da1005e6c9536748cb285845e176621d4329f80768666cfd4ae9c7a4b7763396
                                              • Instruction Fuzzy Hash: 10113AB1D002498FDB20DFAAC4457DFFBF5EB88324F10882AD519B7240CB756945CBA4
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0072B326
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409450806.0000000000720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00720000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_720000_adobe.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 014bf09b8fd64ba3e420929283faa821511f40f6fb16bfa273841ff9b3a62726
                                              • Instruction ID: 7529a544cf3b86214c1db0d4c38930eb1ad8434420ce75c686bdc3d40333705b
                                              • Opcode Fuzzy Hash: 014bf09b8fd64ba3e420929283faa821511f40f6fb16bfa273841ff9b3a62726
                                              • Instruction Fuzzy Hash: AD11CAB68003598BDB10DF9AD444A9EFBF4EB89320F10842AD829B7211D379A945CFA1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409219033.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_68d000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 737534fd97d7b9af96988897ab812c326b284e17e5974e82c1a335e6d71e2892
                                              • Instruction ID: b3d8b0a82eade82ed4ddc0501f6b35ce68e62c16aee24f69206212a428081762
                                              • Opcode Fuzzy Hash: 737534fd97d7b9af96988897ab812c326b284e17e5974e82c1a335e6d71e2892
                                              • Instruction Fuzzy Hash: 3C21F171504204DFCB05EF54D9D0B26BF66FB88310F20C6A9EA090B296C336D916CBB1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409264997.000000000069D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_69d000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 01420208a3fc39f184685354dd7f08b1cb94c673255a0b8e71c1334a02faac7a
                                              • Instruction ID: a6ef7bd797bb18d36b6ee2aa3fcc5151b2e474eb6a9ac96f1883cc5fb20d2c70
                                              • Opcode Fuzzy Hash: 01420208a3fc39f184685354dd7f08b1cb94c673255a0b8e71c1334a02faac7a
                                              • Instruction Fuzzy Hash: 8021F275604204DFDF14DF28D984B26BB6AFB88314F20C579E84A4B796C33AD847CA61
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409264997.000000000069D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_69d000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6bea43957b7025ebc58f5b7bd5e275b44123f084c96fa256b82b4658e9dcaad5
                                              • Instruction ID: aa4262846d198321cc4d9955b740f49e88e314b8bf2a8f32231a2a4263d274b4
                                              • Opcode Fuzzy Hash: 6bea43957b7025ebc58f5b7bd5e275b44123f084c96fa256b82b4658e9dcaad5
                                              • Instruction Fuzzy Hash: F6219F755083809FDB02CF14D994B11BFB6FB46314F25C5EAD8498F6A6C33AD80ACB62
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.1409219033.000000000068D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0068D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_68d000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21e913fbe4a6093fe52002ebff3728cbe293fe76fa7d723964536c1d21f6342d
                                              • Instruction ID: a51b19a63950f5cca7069b102dde799ecea0fc11bab74706ce26912be3fe0170
                                              • Opcode Fuzzy Hash: 21e913fbe4a6093fe52002ebff3728cbe293fe76fa7d723964536c1d21f6342d
                                              • Instruction Fuzzy Hash: 3C21DF76404244CFCB06DF00D9C4B56BF72FB84310F24C2A9ED084B296C33AD92ACBA1

                                              Execution Graph

                                              Execution Coverage:12.7%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:21
                                              Total number of Limit Nodes:4
                                              execution_graph 28554 1d40848 28556 1d4084e 28554->28556 28555 1d4091b 28556->28555 28558 1d41350 28556->28558 28560 1d41356 28558->28560 28559 1d4147a 28559->28556 28560->28559 28562 1d48221 28560->28562 28564 1d4822b 28562->28564 28563 1d482e1 28563->28560 28564->28563 28567 6fcf9d0 28564->28567 28573 6fcf9c1 28564->28573 28569 6fcf9e5 28567->28569 28568 6fcfbfa 28568->28563 28569->28568 28570 6fcfe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 28569->28570 28571 6fcfc20 GlobalMemoryStatusEx GlobalMemoryStatusEx 28569->28571 28572 6fcfc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 28569->28572 28570->28569 28571->28569 28572->28569 28575 6fcf9e5 28573->28575 28574 6fcfbfa 28574->28563 28575->28574 28576 6fcfe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 28575->28576 28577 6fcfc20 GlobalMemoryStatusEx GlobalMemoryStatusEx 28575->28577 28578 6fcfc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 28575->28578 28576->28575 28577->28575 28578->28575
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-155944776
                                              • Opcode ID: 5f56540eab94e2c61f09e77a76eeb1d772bf7b09f4f15a09b430b61aa291c7fb
                                              • Instruction ID: be7839da52f21b167ec583e4f11b0ad459795399290b3bfa7347274e468d69b9
                                              • Opcode Fuzzy Hash: 5f56540eab94e2c61f09e77a76eeb1d772bf7b09f4f15a09b430b61aa291c7fb
                                              • Instruction Fuzzy Hash: D8D24934E0060ACFDB64DB68C584A9DB7B2FF89314F54C5A9D409AB264EB35ED85CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-155944776
                                              • Opcode ID: d5928e942ae6a73a3c78b746c26bb3a3697ef7a4210543f2575cc92f7b930ce3
                                              • Instruction ID: 33b753308b18ef7d9ecba62574e941845614e7761db4d0b4a27a3fa62dfd4398
                                              • Opcode Fuzzy Hash: d5928e942ae6a73a3c78b746c26bb3a3697ef7a4210543f2575cc92f7b930ce3
                                              • Instruction Fuzzy Hash: FB527074E1020B8BDF64CF68D6917AEB7B6FB85320F208829E405DB395DA35DC45CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1760 6fc7dc8-6fc7de6 1762 6fc7de8-6fc7deb 1760->1762 1763 6fc7ded-6fc7df7 1762->1763 1764 6fc7df8-6fc7dfb 1762->1764 1765 6fc7dfd-6fc7e19 1764->1765 1766 6fc7e1e-6fc7e21 1764->1766 1765->1766 1767 6fc7e42-6fc7e45 1766->1767 1768 6fc7e23-6fc7e3d 1766->1768 1770 6fc7e5c-6fc7e5e 1767->1770 1771 6fc7e47-6fc7e55 1767->1771 1768->1767 1772 6fc7e65-6fc7e68 1770->1772 1773 6fc7e60 1770->1773 1775 6fc7e6e-6fc7e84 1771->1775 1779 6fc7e57 1771->1779 1772->1762 1772->1775 1773->1772 1781 6fc809f-6fc80a9 1775->1781 1782 6fc7e8a-6fc7e93 1775->1782 1779->1770 1783 6fc7e99-6fc7eb6 1782->1783 1784 6fc80aa-6fc80df 1782->1784 1790 6fc808c-6fc8099 1783->1790 1791 6fc7ebc-6fc7ee4 1783->1791 1789 6fc80e1-6fc80e4 1784->1789 1792 6fc80ea-6fc80f6 1789->1792 1793 6fc8197-6fc819a 1789->1793 1790->1781 1790->1782 1791->1790 1814 6fc7eea-6fc7ef3 1791->1814 1796 6fc8101-6fc8103 1792->1796 1794 6fc83c6-6fc83c9 1793->1794 1795 6fc81a0-6fc81af 1793->1795 1797 6fc83ec-6fc83ee 1794->1797 1798 6fc83cb-6fc83e7 1794->1798 1811 6fc81ce-6fc8209 1795->1811 1812 6fc81b1-6fc81cc 1795->1812 1800 6fc811b-6fc8122 1796->1800 1801 6fc8105-6fc810b 1796->1801 1803 6fc83f5-6fc83f8 1797->1803 1804 6fc83f0 1797->1804 1798->1797 1808 6fc8124-6fc8131 1800->1808 1809 6fc8133 1800->1809 1806 6fc810d 1801->1806 1807 6fc810f-6fc8111 1801->1807 1803->1789 1813 6fc83fe-6fc8407 1803->1813 1804->1803 1806->1800 1807->1800 1815 6fc8138-6fc813a 1808->1815 1809->1815 1822 6fc820f-6fc8220 1811->1822 1823 6fc839a-6fc83b0 1811->1823 1812->1811 1814->1784 1817 6fc7ef9-6fc7f15 1814->1817 1818 6fc813c-6fc813f 1815->1818 1819 6fc8151-6fc818a 1815->1819 1829 6fc807a-6fc8086 1817->1829 1830 6fc7f1b-6fc7f45 1817->1830 1818->1813 1819->1795 1842 6fc818c-6fc8196 1819->1842 1831 6fc8385-6fc8394 1822->1831 1832 6fc8226-6fc8243 1822->1832 1823->1794 1829->1790 1829->1814 1845 6fc7f4b-6fc7f73 1830->1845 1846 6fc8070-6fc8075 1830->1846 1831->1822 1831->1823 1832->1831 1843 6fc8249-6fc833f call 6fc65e8 1832->1843 1895 6fc834d 1843->1895 1896 6fc8341-6fc834b 1843->1896 1845->1846 1852 6fc7f79-6fc7fa7 1845->1852 1846->1829 1852->1846 1858 6fc7fad-6fc7fb6 1852->1858 1858->1846 1860 6fc7fbc-6fc7fee 1858->1860 1867 6fc7ff9-6fc8015 1860->1867 1868 6fc7ff0-6fc7ff4 1860->1868 1867->1829 1869 6fc8017-6fc806e call 6fc65e8 1867->1869 1868->1846 1871 6fc7ff6 1868->1871 1869->1829 1871->1867 1897 6fc8352-6fc8354 1895->1897 1896->1897 1897->1831 1898 6fc8356-6fc835b 1897->1898 1899 6fc835d-6fc8367 1898->1899 1900 6fc8369 1898->1900 1901 6fc836e-6fc8370 1899->1901 1900->1901 1901->1831 1902 6fc8372-6fc837e 1901->1902 1902->1831
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q
                                              • API String ID: 0-458585787
                                              • Opcode ID: 89b928886235831d6f67945bbefd0fdbd503782ff7b92ec0a715457f338223f6
                                              • Instruction ID: 92921ee5c6d2a95c6ced97b08db47fe1bfb0dfe6690b9595a5103df213573d6c
                                              • Opcode Fuzzy Hash: 89b928886235831d6f67945bbefd0fdbd503782ff7b92ec0a715457f338223f6
                                              • Instruction Fuzzy Hash: 6F027B30F002068FDB54DB68DA946AEBBE2FF84364F148569D419DB394DB35EC46CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2121 6fc55e8-6fc5605 2122 6fc5607-6fc560a 2121->2122 2123 6fc560c-6fc560d 2122->2123 2124 6fc5612-6fc5615 2122->2124 2123->2124 2125 6fc5617-6fc561e 2124->2125 2126 6fc5623-6fc5626 2124->2126 2125->2126 2127 6fc5628-6fc562e 2126->2127 2128 6fc5635-6fc5638 2126->2128 2129 6fc563a-6fc563d 2127->2129 2130 6fc5630 2127->2130 2128->2129 2131 6fc5642-6fc5645 2128->2131 2129->2131 2130->2128 2132 6fc565e-6fc5661 2131->2132 2133 6fc5647-6fc5659 2131->2133 2134 6fc5687-6fc568a 2132->2134 2135 6fc5663-6fc5682 2132->2135 2133->2132 2136 6fc568c-6fc568f 2134->2136 2137 6fc5694-6fc5697 2134->2137 2135->2134 2136->2137 2140 6fc569d-6fc56a0 2137->2140 2141 6fc5721-6fc5727 2137->2141 2142 6fc56a2-6fc56a8 2140->2142 2143 6fc56b3-6fc56b6 2140->2143 2144 6fc5729 2141->2144 2145 6fc5733-6fc5739 2141->2145 2147 6fc56ae 2142->2147 2148 6fc5762-6fc576c 2142->2148 2143->2142 2149 6fc56b8-6fc56bb 2143->2149 2150 6fc572e-6fc5731 2144->2150 2151 6fc573b-6fc5743 2145->2151 2152 6fc57b3-6fc57e3 2145->2152 2147->2143 2159 6fc5773-6fc5775 2148->2159 2153 6fc56bd-6fc56ca 2149->2153 2154 6fc56cf-6fc56d2 2149->2154 2150->2145 2155 6fc575d-6fc5760 2150->2155 2151->2152 2156 6fc5745-6fc5752 2151->2156 2176 6fc57ed-6fc57f0 2152->2176 2153->2154 2160 6fc56d4-6fc56d8 2154->2160 2161 6fc56e3-6fc56e6 2154->2161 2155->2148 2158 6fc577a-6fc577d 2155->2158 2156->2152 2157 6fc5754-6fc5758 2156->2157 2157->2155 2168 6fc577f-6fc5788 2158->2168 2169 6fc5789-6fc578c 2158->2169 2159->2158 2163 6fc56de 2160->2163 2164 6fc57a5-6fc57b2 2160->2164 2166 6fc56e8-6fc56fe 2161->2166 2167 6fc5703-6fc5706 2161->2167 2163->2161 2166->2167 2171 6fc571c-6fc571f 2167->2171 2172 6fc5708-6fc5717 2167->2172 2173 6fc578e-6fc5790 2169->2173 2174 6fc5793-6fc5795 2169->2174 2171->2141 2171->2150 2172->2171 2173->2174 2177 6fc579c-6fc579f 2174->2177 2178 6fc5797 2174->2178 2180 6fc57fa-6fc57fd 2176->2180 2181 6fc57f2-6fc57f9 2176->2181 2177->2122 2177->2164 2178->2177 2182 6fc57ff-6fc5806 2180->2182 2183 6fc5811-6fc5814 2180->2183 2184 6fc580c 2182->2184 2185 6fc58ce-6fc58d5 2182->2185 2186 6fc5836-6fc5839 2183->2186 2187 6fc5816-6fc581a 2183->2187 2184->2183 2190 6fc583b-6fc584c 2186->2190 2191 6fc5851-6fc5854 2186->2191 2188 6fc58d6-6fc58e8 2187->2188 2189 6fc5820-6fc5828 2187->2189 2201 6fc5918-6fc5919 2188->2201 2202 6fc58ea-6fc5914 2188->2202 2189->2188 2194 6fc582e-6fc5831 2189->2194 2190->2191 2192 6fc586e-6fc5871 2191->2192 2193 6fc5856-6fc585a 2191->2193 2196 6fc5882-6fc5885 2192->2196 2197 6fc5873-6fc587d 2192->2197 2193->2188 2195 6fc585c-6fc5864 2193->2195 2194->2186 2195->2188 2200 6fc5866-6fc5869 2195->2200 2203 6fc589f-6fc58a2 2196->2203 2204 6fc5887-6fc588b 2196->2204 2197->2196 2200->2192 2207 6fc591b-6fc5922 2201->2207 2208 6fc5927-6fc592a 2201->2208 2206 6fc5916 2202->2206 2210 6fc58bc-6fc58be 2203->2210 2211 6fc58a4-6fc58a8 2203->2211 2204->2188 2209 6fc588d-6fc5895 2204->2209 2206->2201 2207->2208 2215 6fc592c-6fc5931 2208->2215 2216 6fc5934-6fc5937 2208->2216 2209->2188 2214 6fc5897-6fc589a 2209->2214 2212 6fc58c5-6fc58c8 2210->2212 2213 6fc58c0 2210->2213 2211->2188 2217 6fc58aa-6fc58b2 2211->2217 2212->2176 2212->2185 2213->2212 2214->2203 2215->2216 2218 6fc5939-6fc5940 2216->2218 2219 6fc5945-6fc5948 2216->2219 2217->2188 2220 6fc58b4-6fc58b7 2217->2220 2218->2219 2221 6fc59cd-6fc5b61 2219->2221 2222 6fc594e-6fc5951 2219->2222 2220->2210 2273 6fc5c97-6fc5caa 2221->2273 2274 6fc5b67-6fc5b6e 2221->2274 2223 6fc596b-6fc596e 2222->2223 2224 6fc5953-6fc5964 2222->2224 2225 6fc5988-6fc598b 2223->2225 2226 6fc5970-6fc5981 2223->2226 2229 6fc598d-6fc599e 2224->2229 2231 6fc5966 2224->2231 2225->2229 2230 6fc59a9-6fc59ac 2225->2230 2234 6fc59ae-6fc59c1 2226->2234 2237 6fc5983 2226->2237 2229->2207 2243 6fc59a4 2229->2243 2230->2234 2235 6fc59c4-6fc59c7 2230->2235 2231->2223 2235->2221 2236 6fc5cad-6fc5cb0 2235->2236 2239 6fc5cce-6fc5cd1 2236->2239 2240 6fc5cb2-6fc5cc3 2236->2240 2237->2225 2244 6fc5cef-6fc5cf2 2239->2244 2245 6fc5cd3-6fc5ce4 2239->2245 2240->2207 2249 6fc5cc9 2240->2249 2243->2230 2244->2221 2247 6fc5cf8-6fc5cfa 2244->2247 2245->2207 2253 6fc5cea 2245->2253 2251 6fc5cfc 2247->2251 2252 6fc5d01-6fc5d04 2247->2252 2249->2239 2251->2252 2252->2206 2254 6fc5d0a-6fc5d13 2252->2254 2253->2244 2275 6fc5b74-6fc5b97 2274->2275 2276 6fc5c22-6fc5c29 2274->2276 2285 6fc5b9f-6fc5ba7 2275->2285 2276->2273 2277 6fc5c2b-6fc5c5e 2276->2277 2289 6fc5c60 2277->2289 2290 6fc5c63-6fc5c90 2277->2290 2287 6fc5bac-6fc5bed 2285->2287 2288 6fc5ba9 2285->2288 2298 6fc5bef-6fc5c00 2287->2298 2299 6fc5c05-6fc5c16 2287->2299 2288->2287 2289->2290 2290->2254 2298->2254 2299->2254
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $
                                              • API String ID: 0-3993045852
                                              • Opcode ID: ba3bda23d0e64552a93d0729311c6518c8a4a49e0bcc2e95b591b0e9ef194230
                                              • Instruction ID: 7b3609d7d7e6860c26100e69e3580158f6a90366a1829ad699316801dfbd315a
                                              • Opcode Fuzzy Hash: ba3bda23d0e64552a93d0729311c6518c8a4a49e0bcc2e95b591b0e9ef194230
                                              • Instruction Fuzzy Hash: EA22F475E0021A9FDF64CB64C6806AEBBB2FF85324F208469D449EB384DB35EC55CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ca8cb87665008f7477f03877390e21eab566d84891ee409cb4e83c377610ef43
                                              • Instruction ID: 8e987efac7405a0b005b3ccef4b0a9ef78a7ec2ff3b37d79ca8e089bdbfe7e26
                                              • Opcode Fuzzy Hash: ca8cb87665008f7477f03877390e21eab566d84891ee409cb4e83c377610ef43
                                              • Instruction Fuzzy Hash: 7F626A34E042068FDB54DB68D694AAEB7B2FF88324F148469E405EB394DB35EC46CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d98b6d7714505bac31abdb146830da4ac5898440de78155c59123799bdb11a2c
                                              • Instruction ID: 6e254895bff5e1c60d15eefef3df28bffc24b093c93f79ab064341ba00581509
                                              • Opcode Fuzzy Hash: d98b6d7714505bac31abdb146830da4ac5898440de78155c59123799bdb11a2c
                                              • Instruction Fuzzy Hash: 34327274E002068FDF54DB68DA90BAEB7B6FB88324F108529E409E7355DB35EC45CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 6fcad18-6fcad36 1 6fcad38-6fcad3b 0->1 2 6fcad3d-6fcad46 1->2 3 6fcad55-6fcad58 1->3 4 6fcad4c-6fcad50 2->4 5 6fcaf4f-6fcaf86 2->5 6 6fcad6c-6fcad6f 3->6 7 6fcad5a-6fcad67 3->7 4->3 15 6fcaf88-6fcaf8b 5->15 8 6fcad79-6fcad7c 6->8 9 6fcad71-6fcad76 6->9 7->6 12 6fcaf35-6fcaf3e 8->12 13 6fcad82-6fcad85 8->13 9->8 12->2 14 6fcaf44-6fcaf4e 12->14 16 6fcad96-6fcad99 13->16 17 6fcad87-6fcad8b 13->17 21 6fcaf8d-6fcafa9 15->21 22 6fcafae-6fcafb1 15->22 19 6fcadbc-6fcadbf 16->19 20 6fcad9b-6fcadb7 16->20 17->14 18 6fcad91 17->18 18->16 25 6fcadd9-6fcaddc 19->25 26 6fcadc1-6fcadd4 19->26 20->19 21->22 23 6fcafbe-6fcafc1 22->23 24 6fcafb3-6fcafbd 22->24 29 6fcafd0-6fcafd3 23->29 30 6fcafc3 23->30 27 6fcadec-6fcadee 25->27 28 6fcadde-6fcade7 25->28 26->25 34 6fcadf5-6fcadf8 27->34 35 6fcadf0 27->35 28->27 36 6fcb23c-6fcb23f 29->36 37 6fcafd9-6fcb014 29->37 124 6fcafc3 call 6fcb26f 30->124 125 6fcafc3 call 6fcb280 30->125 34->1 41 6fcadfe-6fcae22 34->41 35->34 39 6fcb250-6fcb252 36->39 40 6fcb241-6fcb245 36->40 48 6fcb01a-6fcb026 37->48 49 6fcb207-6fcb21a 37->49 46 6fcb259-6fcb25c 39->46 47 6fcb254 39->47 40->37 45 6fcb24b 40->45 58 6fcae28-6fcae37 41->58 59 6fcaf32 41->59 42 6fcafc9-6fcafcb 42->29 45->39 46->15 51 6fcb262-6fcb26c 46->51 47->46 55 6fcb028-6fcb041 48->55 56 6fcb046-6fcb08a 48->56 52 6fcb21c 49->52 57 6fcb21d 52->57 55->52 74 6fcb08c-6fcb09e 56->74 75 6fcb0a6-6fcb0e5 56->75 57->57 62 6fcae4f-6fcae8a call 6fc65e8 58->62 63 6fcae39-6fcae3f 58->63 59->12 82 6fcae8c-6fcae92 62->82 83 6fcaea2-6fcaeb9 62->83 64 6fcae41 63->64 65 6fcae43-6fcae45 63->65 64->62 65->62 74->75 80 6fcb1cc-6fcb1e1 75->80 81 6fcb0eb-6fcb1c6 call 6fc65e8 75->81 80->49 81->80 86 6fcae94 82->86 87 6fcae96-6fcae98 82->87 93 6fcaebb-6fcaec1 83->93 94 6fcaed1-6fcaee2 83->94 86->83 87->83 96 6fcaec5-6fcaec7 93->96 97 6fcaec3 93->97 100 6fcaefa-6fcaf2b 94->100 101 6fcaee4-6fcaeea 94->101 96->94 97->94 100->59 102 6fcaeec 101->102 103 6fcaeee-6fcaef0 101->103 102->100 103->100 124->42 125->42
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-2216122830
                                              • Opcode ID: 5aeb9d067278499b93f0f80de6c1e3bfbf988e93c0328add762b2c606e2823b9
                                              • Instruction ID: 0b5756b44ccfb6f45f6a6578790a096e1c6f186e53a113383bc9344efae48fe6
                                              • Opcode Fuzzy Hash: 5aeb9d067278499b93f0f80de6c1e3bfbf988e93c0328add762b2c606e2823b9
                                              • Instruction Fuzzy Hash: 7DE16D30E1020A8FDF59DB69D6906AEB7B6FF84314F108529E405EB354EB35EC46CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 857 6fc9198-6fc91bd 859 6fc91bf-6fc91c2 857->859 860 6fc91c8-6fc91dd 859->860 861 6fc9a80-6fc9a83 859->861 867 6fc91df-6fc91e5 860->867 868 6fc91f5-6fc920b 860->868 862 6fc9aa9-6fc9aab 861->862 863 6fc9a85-6fc9aa4 861->863 865 6fc9aad 862->865 866 6fc9ab2-6fc9ab5 862->866 863->862 865->866 866->859 870 6fc9abb-6fc9ac5 866->870 871 6fc91e9-6fc91eb 867->871 872 6fc91e7 867->872 875 6fc9216-6fc9218 868->875 871->868 872->868 876 6fc921a-6fc9220 875->876 877 6fc9230-6fc92a1 875->877 878 6fc9224-6fc9226 876->878 879 6fc9222 876->879 888 6fc92cd-6fc92e9 877->888 889 6fc92a3-6fc92c6 877->889 878->877 879->877 894 6fc92eb-6fc930e 888->894 895 6fc9315-6fc9330 888->895 889->888 894->895 900 6fc935b-6fc9376 895->900 901 6fc9332-6fc9354 895->901 906 6fc9378-6fc9394 900->906 907 6fc939b-6fc93a9 900->907 901->900 906->907 908 6fc93b9-6fc9433 907->908 909 6fc93ab-6fc93b4 907->909 915 6fc9435-6fc9453 908->915 916 6fc9480-6fc9495 908->916 909->870 920 6fc946f-6fc947e 915->920 921 6fc9455-6fc9464 915->921 916->861 920->915 920->916 921->920
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: abf3f44b057cf24323fa312d0f37576aa0cd0d60e86bcd86753d95a5cb61d35c
                                              • Instruction ID: 09640668830303cbac14d1a8536fd2f652dd5debc10324b8c7282e3df0246b1e
                                              • Opcode Fuzzy Hash: abf3f44b057cf24323fa312d0f37576aa0cd0d60e86bcd86753d95a5cb61d35c
                                              • Instruction Fuzzy Hash: B9912A70F0021A9BDB54DF64D9507AEB7F6FB88310F10856AC809EB358EA749D468B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 924 6fccfa0-6fccfbb 926 6fccfbd-6fccfc0 924->926 927 6fcd009-6fcd00c 926->927 928 6fccfc2-6fcd004 926->928 929 6fcd00e-6fcd050 927->929 930 6fcd055-6fcd058 927->930 928->927 929->930 931 6fcd05a-6fcd070 930->931 932 6fcd075-6fcd078 930->932 931->932 934 6fcd07a-6fcd089 932->934 935 6fcd0c1-6fcd0c4 932->935 940 6fcd098-6fcd0a4 934->940 941 6fcd08b-6fcd090 934->941 937 6fcd10d-6fcd110 935->937 938 6fcd0c6-6fcd108 935->938 944 6fcd159-6fcd15c 937->944 945 6fcd112-6fcd154 937->945 938->937 946 6fcd9bd-6fcd9d0 940->946 947 6fcd0aa-6fcd0bc 940->947 941->940 951 6fcd48c-6fcd498 944->951 952 6fcd162-6fcd165 944->952 945->944 964 6fcd9de-6fcd9f6 946->964 965 6fcd9d2-6fcd9dd 946->965 947->935 951->934 954 6fcd49e-6fcd78b 951->954 955 6fcd1ae-6fcd1b1 952->955 956 6fcd167-6fcd1a9 952->956 1140 6fcd791-6fcd797 954->1140 1141 6fcd9b2-6fcd9bc 954->1141 962 6fcd1bb-6fcd1be 955->962 963 6fcd1b3-6fcd1b8 955->963 956->955 967 6fcd207-6fcd20a 962->967 968 6fcd1c0-6fcd1cf 962->968 963->962 969 6fcd9f8-6fcd9fb 964->969 965->964 973 6fcd20c-6fcd24e 967->973 974 6fcd253-6fcd256 967->974 977 6fcd1de-6fcd1ea 968->977 978 6fcd1d1-6fcd1d6 968->978 979 6fcd9fd 969->979 980 6fcda0a-6fcda0d 969->980 973->974 984 6fcd258-6fcd274 974->984 985 6fcd279-6fcd27c 974->985 977->946 986 6fcd1f0-6fcd202 977->986 978->977 1187 6fcd9fd call 6fcdb28 979->1187 1188 6fcd9fd call 6fcdb15 979->1188 987 6fcda0f-6fcda2b 980->987 988 6fcda30-6fcda33 980->988 984->985 990 6fcd27e-6fcd280 985->990 991 6fcd28b-6fcd28e 985->991 986->967 987->988 992 6fcda35-6fcda61 988->992 993 6fcda66-6fcda68 988->993 999 6fcd286 990->999 1000 6fcd347-6fcd350 990->1000 1001 6fcd2d7-6fcd2da 991->1001 1002 6fcd290-6fcd2d2 991->1002 992->993 1003 6fcda6f-6fcda72 993->1003 1004 6fcda6a 993->1004 996 6fcda03-6fcda05 996->980 999->991 1009 6fcd35f-6fcd36b 1000->1009 1010 6fcd352-6fcd357 1000->1010 1013 6fcd2dc-6fcd2de 1001->1013 1014 6fcd2e9-6fcd2ec 1001->1014 1002->1001 1003->969 1011 6fcda74-6fcda83 1003->1011 1004->1003 1019 6fcd47c-6fcd481 1009->1019 1020 6fcd371-6fcd385 1009->1020 1010->1009 1036 6fcdaea-6fcdaff 1011->1036 1037 6fcda85-6fcdae8 call 6fc65e8 1011->1037 1022 6fcd489 1013->1022 1023 6fcd2e4 1013->1023 1024 6fcd2ee-6fcd330 1014->1024 1025 6fcd335-6fcd337 1014->1025 1019->1022 1020->1022 1040 6fcd38b-6fcd39d 1020->1040 1022->951 1023->1014 1024->1025 1028 6fcd33e-6fcd341 1025->1028 1029 6fcd339 1025->1029 1028->926 1028->1000 1029->1028 1050 6fcdb00 1036->1050 1037->1036 1052 6fcd39f-6fcd3a5 1040->1052 1053 6fcd3c1-6fcd3c3 1040->1053 1050->1050 1057 6fcd3a9-6fcd3b5 1052->1057 1058 6fcd3a7 1052->1058 1063 6fcd3cd-6fcd3d9 1053->1063 1060 6fcd3b7-6fcd3bf 1057->1060 1058->1060 1060->1063 1071 6fcd3db-6fcd3e5 1063->1071 1072 6fcd3e7 1063->1072 1075 6fcd3ec-6fcd3ee 1071->1075 1072->1075 1075->1022 1076 6fcd3f4-6fcd410 call 6fc65e8 1075->1076 1084 6fcd41f-6fcd42b 1076->1084 1085 6fcd412-6fcd417 1076->1085 1084->1019 1088 6fcd42d-6fcd47a 1084->1088 1085->1084 1088->1022 1142 6fcd799-6fcd79e 1140->1142 1143 6fcd7a6-6fcd7af 1140->1143 1142->1143 1143->946 1144 6fcd7b5-6fcd7c8 1143->1144 1146 6fcd7ce-6fcd7d4 1144->1146 1147 6fcd9a2-6fcd9ac 1144->1147 1148 6fcd7d6-6fcd7db 1146->1148 1149 6fcd7e3-6fcd7ec 1146->1149 1147->1140 1147->1141 1148->1149 1149->946 1150 6fcd7f2-6fcd813 1149->1150 1153 6fcd815-6fcd81a 1150->1153 1154 6fcd822-6fcd82b 1150->1154 1153->1154 1154->946 1155 6fcd831-6fcd84e 1154->1155 1155->1147 1158 6fcd854-6fcd85a 1155->1158 1158->946 1159 6fcd860-6fcd879 1158->1159 1161 6fcd87f-6fcd8a6 1159->1161 1162 6fcd995-6fcd99c 1159->1162 1161->946 1165 6fcd8ac-6fcd8b6 1161->1165 1162->1147 1162->1158 1165->946 1166 6fcd8bc-6fcd8d3 1165->1166 1168 6fcd8d5-6fcd8e0 1166->1168 1169 6fcd8e2-6fcd8fd 1166->1169 1168->1169 1169->1162 1174 6fcd903-6fcd91c call 6fc65e8 1169->1174 1178 6fcd91e-6fcd923 1174->1178 1179 6fcd92b-6fcd934 1174->1179 1178->1179 1179->946 1180 6fcd93a-6fcd98e 1179->1180 1180->1162 1187->996 1188->996
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q
                                              • API String ID: 0-2441406858
                                              • Opcode ID: ea6c3d8e06ee61fcda708f389025b6d3717a9883936d01c2b3ab52de51423dae
                                              • Instruction ID: 70b3ef4d46af4231edb15a9fd37f2aa6545f89849506f1f80b07e74da8a9234a
                                              • Opcode Fuzzy Hash: ea6c3d8e06ee61fcda708f389025b6d3717a9883936d01c2b3ab52de51423dae
                                              • Instruction Fuzzy Hash: EF622C30A0060B9FCB55DB78D691A5EB7A2FF84314B208A69D005DF369DB75FC4ACB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1189 6fc4bb0-6fc4bd4 1190 6fc4bd6-6fc4bd9 1189->1190 1191 6fc4bfa-6fc4bfd 1190->1191 1192 6fc4bdb-6fc4bf5 1190->1192 1193 6fc52dc-6fc52de 1191->1193 1194 6fc4c03-6fc4cfb 1191->1194 1192->1191 1196 6fc52e5-6fc52e8 1193->1196 1197 6fc52e0 1193->1197 1212 6fc4d7e-6fc4d85 1194->1212 1213 6fc4d01-6fc4d49 1194->1213 1196->1190 1198 6fc52ee-6fc52fb 1196->1198 1197->1196 1214 6fc4e09-6fc4e12 1212->1214 1215 6fc4d8b-6fc4dfb 1212->1215 1234 6fc4d4e call 6fc5468 1213->1234 1235 6fc4d4e call 6fc5459 1213->1235 1214->1198 1232 6fc4dfd 1215->1232 1233 6fc4e06 1215->1233 1226 6fc4d54-6fc4d70 1229 6fc4d7b 1226->1229 1230 6fc4d72 1226->1230 1229->1212 1230->1229 1232->1233 1233->1214 1234->1226 1235->1226
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fdq$XPdq$\Odq
                                              • API String ID: 0-727959394
                                              • Opcode ID: e042ee0f41b4a1fbf636da902e6ad1f7a57c686c9ea00d4d9959856cf8148ef5
                                              • Instruction ID: 20f618c9599d139ca9ec945940f3235fd17552bfb23514e0acdb2f80467b9a91
                                              • Opcode Fuzzy Hash: e042ee0f41b4a1fbf636da902e6ad1f7a57c686c9ea00d4d9959856cf8148ef5
                                              • Instruction Fuzzy Hash: 14618E70F0021A9FEF549FB5C9547AEBAF6FB88310F208429E10AEB395DB754C058B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2006 6fc9188-6fc91bd 2008 6fc91bf-6fc91c2 2006->2008 2009 6fc91c8-6fc91dd 2008->2009 2010 6fc9a80-6fc9a83 2008->2010 2016 6fc91df-6fc91e5 2009->2016 2017 6fc91f5-6fc920b 2009->2017 2011 6fc9aa9-6fc9aab 2010->2011 2012 6fc9a85-6fc9aa4 2010->2012 2014 6fc9aad 2011->2014 2015 6fc9ab2-6fc9ab5 2011->2015 2012->2011 2014->2015 2015->2008 2019 6fc9abb-6fc9ac5 2015->2019 2020 6fc91e9-6fc91eb 2016->2020 2021 6fc91e7 2016->2021 2024 6fc9216-6fc9218 2017->2024 2020->2017 2021->2017 2025 6fc921a-6fc9220 2024->2025 2026 6fc9230-6fc92a1 2024->2026 2027 6fc9224-6fc9226 2025->2027 2028 6fc9222 2025->2028 2037 6fc92cd-6fc92e9 2026->2037 2038 6fc92a3-6fc92c6 2026->2038 2027->2026 2028->2026 2043 6fc92eb-6fc930e 2037->2043 2044 6fc9315-6fc9330 2037->2044 2038->2037 2043->2044 2049 6fc935b-6fc9376 2044->2049 2050 6fc9332-6fc9354 2044->2050 2055 6fc9378-6fc9394 2049->2055 2056 6fc939b-6fc93a9 2049->2056 2050->2049 2055->2056 2057 6fc93b9-6fc9433 2056->2057 2058 6fc93ab-6fc93b4 2056->2058 2064 6fc9435-6fc9453 2057->2064 2065 6fc9480-6fc9495 2057->2065 2058->2019 2069 6fc946f-6fc947e 2064->2069 2070 6fc9455-6fc9464 2064->2070 2065->2010 2069->2064 2069->2065 2070->2069
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q
                                              • API String ID: 0-458585787
                                              • Opcode ID: bc2c7566c8be52602da534502ec2f0b4277cf6c62e123edb4ca6a11cf329d888
                                              • Instruction ID: 02121b1ede07c310e2366c42f2652afa65d785d81377f96f537dc92ca2ac5fe4
                                              • Opcode Fuzzy Hash: bc2c7566c8be52602da534502ec2f0b4277cf6c62e123edb4ca6a11cf329d888
                                              • Instruction Fuzzy Hash: 47511A70B002069FDB54DF74D9A1BAE73FAEB88710F10856AC409DB798EA749C46CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2073 6fc4ba0-6fc4bd4 2075 6fc4bd6-6fc4bd9 2073->2075 2076 6fc4bfa-6fc4bfd 2075->2076 2077 6fc4bdb-6fc4bf5 2075->2077 2078 6fc52dc-6fc52de 2076->2078 2079 6fc4c03-6fc4cfb 2076->2079 2077->2076 2081 6fc52e5-6fc52e8 2078->2081 2082 6fc52e0 2078->2082 2097 6fc4d7e-6fc4d85 2079->2097 2098 6fc4d01-6fc4d49 2079->2098 2081->2075 2083 6fc52ee-6fc52fb 2081->2083 2082->2081 2099 6fc4e09-6fc4e12 2097->2099 2100 6fc4d8b-6fc4dfb 2097->2100 2119 6fc4d4e call 6fc5468 2098->2119 2120 6fc4d4e call 6fc5459 2098->2120 2099->2083 2117 6fc4dfd 2100->2117 2118 6fc4e06 2100->2118 2111 6fc4d54-6fc4d70 2114 6fc4d7b 2111->2114 2115 6fc4d72 2111->2115 2114->2097 2115->2114 2117->2118 2118->2099 2119->2111 2120->2111
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fdq$XPdq
                                              • API String ID: 0-3173836435
                                              • Opcode ID: 76988b8f66e51a48e21581f4629bd8617babe6bd99be6e75402ef2863363178e
                                              • Instruction ID: cc7f654238c8dab758ee12a2a39cee0ab72f27a16bcb829e19dfd7033c779745
                                              • Opcode Fuzzy Hash: 76988b8f66e51a48e21581f4629bd8617babe6bd99be6e75402ef2863363178e
                                              • Instruction Fuzzy Hash: 30516D74F002199BEF549FA5C854BAEBAF6FB88700F208529E106EB395DB758C058B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2402 1d4edf0-1d4ee09 2405 1d4ee0f-1d4ee9c GlobalMemoryStatusEx 2402->2405 2406 1d4ee0b-1d4ee0e 2402->2406 2410 1d4eea5-1d4eecd 2405->2410 2411 1d4ee9e-1d4eea4 2405->2411 2411->2410
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 01D4EE8F
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1496746831.0000000001D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 01D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_1d40000_adobe.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 103f9b1200d2590b9e01e05f50584d0635eb23935f3b386173dfe5fe951acad0
                                              • Instruction ID: fae582cb73df0907ebb7b51774ef93ae6d825ab7ef5abb5af3cc81caa18fb2ef
                                              • Opcode Fuzzy Hash: 103f9b1200d2590b9e01e05f50584d0635eb23935f3b386173dfe5fe951acad0
                                              • Instruction Fuzzy Hash: 6C2152B1C0426A9FDB14DFAAD4447EEBBF4AF48310F11856AD818B7240E778A9458BA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2414 1d4ee28-1d4ee9c GlobalMemoryStatusEx 2417 1d4eea5-1d4eecd 2414->2417 2418 1d4ee9e-1d4eea4 2414->2418 2418->2417
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 01D4EE8F
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1496746831.0000000001D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 01D40000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_1d40000_adobe.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 02590a4faa38eb010e27f55d0bbfdf0cf4bc0390a158e9ec271355214ac0dcae
                                              • Instruction ID: e185e51e5851c5c833e69c65a44aa22e83e3f818fba6e8495be2cc8ea4371446
                                              • Opcode Fuzzy Hash: 02590a4faa38eb010e27f55d0bbfdf0cf4bc0390a158e9ec271355214ac0dcae
                                              • Instruction Fuzzy Hash: 6611EFB5C00659ABDB10DFAAC544ADEFBF4BB48320F15816AD818B7240D379A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2566 6fcdb15-6fcdb1c 2567 6fcdb1e-6fcdb2a 2566->2567 2568 6fcdb2b-6fcdb3f 2566->2568 2567->2568 2569 6fcdb41-6fcdb44 2568->2569 2570 6fcdb46-6fcdb72 2569->2570 2571 6fcdb77-6fcdb7a 2569->2571 2570->2571 2572 6fcdb7c 2571->2572 2573 6fcdb89-6fcdb8c 2571->2573 2578 6fcdb82-6fcdb84 2572->2578 2574 6fcdb8e-6fcdbaa 2573->2574 2575 6fcdbaf-6fcdbb1 2573->2575 2574->2575 2576 6fcdbb8-6fcdbbb 2575->2576 2577 6fcdbb3 2575->2577 2576->2569 2579 6fcdbbd-6fcdbcc 2576->2579 2577->2576 2578->2573 2583 6fcdd51-6fcdd7b 2579->2583 2584 6fcdbd2-6fcdc0b 2579->2584 2587 6fcdd7c 2583->2587 2591 6fcdc0d-6fcdc17 2584->2591 2592 6fcdc59-6fcdc7d 2584->2592 2587->2587 2595 6fcdc2f-6fcdc57 2591->2595 2596 6fcdc19-6fcdc1f 2591->2596 2600 6fcdc7f 2592->2600 2601 6fcdc87-6fcdd4b 2592->2601 2595->2591 2595->2592 2598 6fcdc21 2596->2598 2599 6fcdc23-6fcdc25 2596->2599 2598->2595 2599->2595 2600->2601 2601->2583 2601->2584
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 1a4d541f564c55c994aeb2323e299223a1a34ba6725aad946a60a3a272028809
                                              • Instruction ID: 81d1f8b22672ed043062f64e6e1bac5ecaf33772524abd9e4ab8605e7d99e390
                                              • Opcode Fuzzy Hash: 1a4d541f564c55c994aeb2323e299223a1a34ba6725aad946a60a3a272028809
                                              • Instruction Fuzzy Hash: CA41A070E0060A9FDB64DF65C99069EBBB2FF85310F14893DE805E7254EB70E846CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 9bb2af32b94380365b190e3c0f79a1d6474b0584c45ce1546a33432df447bd19
                                              • Instruction ID: b61cbd79ff07ab8e5ce6837691b83d49205581e1fe1518b225243aea3d0d2681
                                              • Opcode Fuzzy Hash: 9bb2af32b94380365b190e3c0f79a1d6474b0584c45ce1546a33432df447bd19
                                              • Instruction Fuzzy Hash: 3D417D70E0060A9FDB64DF65C5946AEBBB2FF85310F10893DE405EB254EB70E846CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 465ee07898f97c1caeff3fb8df6a7296438c8e255056e22ffdc34d7565c94b8b
                                              • Instruction ID: 2741233a988316720319232918373639cdeb85c061996d0657700dd5ba0fa9dc
                                              • Opcode Fuzzy Hash: 465ee07898f97c1caeff3fb8df6a7296438c8e255056e22ffdc34d7565c94b8b
                                              • Instruction Fuzzy Hash: FE319031B002028FEB599B74D2656AE77B2FB88320F14856CD406DB394EF39DE06CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 75a691bc576f0dc09384b3b93f1bea22e44d7ad43efcb31231d16f0bc4efbe0a
                                              • Instruction ID: 3d22d37062845f970d9179cd856d9eb049b9569895b0d34e1be62a4bb6d2f3b8
                                              • Opcode Fuzzy Hash: 75a691bc576f0dc09384b3b93f1bea22e44d7ad43efcb31231d16f0bc4efbe0a
                                              • Instruction Fuzzy Hash: 01319030B002068FEB589B74D66466F7AE6EB88320F10842CD406DB394EF35DE06C791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q
                                              • API String ID: 0-238743419
                                              • Opcode ID: abaf8413d42b9545e5f8b11983aef16f00860e6ddcae6757bf698e063a436df1
                                              • Instruction ID: cc3d7629210579080e1c80cae9464bc2d9facd3b86cdad29a3ebaef6912f3f5f
                                              • Opcode Fuzzy Hash: abaf8413d42b9545e5f8b11983aef16f00860e6ddcae6757bf698e063a436df1
                                              • Instruction Fuzzy Hash: B901D132E002199FDB648E69DA456AABFF9FB803B0F04046ED925E32A0D7709945C790
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Odq
                                              • API String ID: 0-4257893106
                                              • Opcode ID: 8e000a7d8c1b591305d99aecc69d08e6e800ca5216de3ddeafe2d911cd23e65f
                                              • Instruction ID: 44e9f827c09a6b57718ca85d6741ee1daa721ab3f884a9617c4359a36ed3145e
                                              • Opcode Fuzzy Hash: 8e000a7d8c1b591305d99aecc69d08e6e800ca5216de3ddeafe2d911cd23e65f
                                              • Instruction Fuzzy Hash: 99F0FE70E2012ADFDB54DF94E9A9BAE7BB2FF84715F204129E402A7294CB715C01CB80
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e9fed3d3fbb3a836288b6a998dd2f0ebe78c201b93550d46da37e672fc7abd0c
                                              • Instruction ID: 172a04fcb7d935849a6c0d1c9f969231702287ed05a151c06c4810bb67b2a6e1
                                              • Opcode Fuzzy Hash: e9fed3d3fbb3a836288b6a998dd2f0ebe78c201b93550d46da37e672fc7abd0c
                                              • Instruction Fuzzy Hash: A0A19874F0020A9BEF64CA6CD6917AE76F6FB89320F20482DE405DB395DA35DC458B52
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1201ab70c9ce3105357e1062faaa67b8a83cafeb69c66f6063313f501851787b
                                              • Instruction ID: 21281fdb53569b8e911d914afe01c5f1844409389ec44aef53125e14d2d44f85
                                              • Opcode Fuzzy Hash: 1201ab70c9ce3105357e1062faaa67b8a83cafeb69c66f6063313f501851787b
                                              • Instruction Fuzzy Hash: 9C6192B1F401224FDF549A7EC8906AFBAD7AFD4224B154439E80EDB364DE65DD0287C2
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 81c8919ca28eb873bbbd922335a076c6c27ffbc62852c48609aec0be905bb817
                                              • Instruction ID: de30f030b2934d9de15ed66f6ddd450df19b2e63618090532ff85ef0ec859726
                                              • Opcode Fuzzy Hash: 81c8919ca28eb873bbbd922335a076c6c27ffbc62852c48609aec0be905bb817
                                              • Instruction Fuzzy Hash: 25814C70F1020A8BDF54DFA9D5A079EB7F6BB85314F108528E40ADB394EB74DC468B91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5cdcbee14838ec0102f6de5a1c97ad9fec46834e8a152f291e60cb2addec171a
                                              • Instruction ID: f7998607ddb8edcc0c57fb945862a7d4c03272640949ba1a372c09b04e3ca829
                                              • Opcode Fuzzy Hash: 5cdcbee14838ec0102f6de5a1c97ad9fec46834e8a152f291e60cb2addec171a
                                              • Instruction Fuzzy Hash: 28813C70F1020A8BDF44DFA9D5606AEB7F6AF89314F108429E40ADB394EB74DC468B91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 68728aa1e08e1796337460dd76ca08aa9b334c76d3c92266bbb26f360d8193fe
                                              • Instruction ID: d20ba4c8135d005cfca27af66357af3883fcd67598e7f1e996078cabb085d47e
                                              • Opcode Fuzzy Hash: 68728aa1e08e1796337460dd76ca08aa9b334c76d3c92266bbb26f360d8193fe
                                              • Instruction Fuzzy Hash: 20916E30E0061A8FDF60CF64C990B9DB7B1FF89310F208699D449BB295DB70AA85CF91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e2d2ed4d0349cebce5183b0bf28d32e461d1b3e48cc4b4bd30894141568d769d
                                              • Instruction ID: 105a1d387aa520a6caf929c3c820ca221bef54d4c0342e0065564ae45971e9b0
                                              • Opcode Fuzzy Hash: e2d2ed4d0349cebce5183b0bf28d32e461d1b3e48cc4b4bd30894141568d769d
                                              • Instruction Fuzzy Hash: 5E915E30E1061A8BDF60DF68C990B9DB7B1FF89310F208599D44DBB294DB70AA85CF91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f6dd819dee8f0093edbbe281be9e54e2758e4d9a7276f940003151590d3276cf
                                              • Instruction ID: 1bb9ff2901b69b51ff22e146b4bc133c2523e762726e40622d3c77f2884e45cd
                                              • Opcode Fuzzy Hash: f6dd819dee8f0093edbbe281be9e54e2758e4d9a7276f940003151590d3276cf
                                              • Instruction Fuzzy Hash: CF711970E0120A9FDB54DBA9DA90AADFBF6FF84310F248469E005EB254DB30ED46CB51
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1728f8e43f0deefb991b841286b2c68e4b29adb6f84bb642836e600f7c182269
                                              • Instruction ID: 28ad88aaa26984e6e4b245ee2c5a7524f03f41e3df78bc4212c646e652bec7c4
                                              • Opcode Fuzzy Hash: 1728f8e43f0deefb991b841286b2c68e4b29adb6f84bb642836e600f7c182269
                                              • Instruction Fuzzy Hash: 80713B70E0120A9FDB54DBA8DA90AADFBF6FF84310F248469D015EB254DB30ED46CB51
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9464dcb2e0647a55ef8d26d16b3bf56f2ffdbcca5a201f6d11c41649c7acba1b
                                              • Instruction ID: 6774c756d032871e34fcc8bad056d72d36a42edb6897514ce7df938d70c9aacb
                                              • Opcode Fuzzy Hash: 9464dcb2e0647a55ef8d26d16b3bf56f2ffdbcca5a201f6d11c41649c7acba1b
                                              • Instruction Fuzzy Hash: 7551EB70F112179BEF64566CD95477F6A5BEBC9320F20482EF40AC73A8CA29CC4597A3
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac901cdbf8d41b8f84e34c060cfc1dde22b29928253c2ad16cfa1d13db34c5cd
                                              • Instruction ID: d60b277f689aa63a5df3cf76ab55faf6b3fd6065c9e578a3514c80c3d69dd442
                                              • Opcode Fuzzy Hash: ac901cdbf8d41b8f84e34c060cfc1dde22b29928253c2ad16cfa1d13db34c5cd
                                              • Instruction Fuzzy Hash: 4251CE31E0110A9FDF64EB68E5846ADFBB3FF84325F208869E106D7250DB359945CB81
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 359f6a08ad9329e96712bb717ba99a1b12a3a194eff4dffcc3f17e34ae997bd3
                                              • Instruction ID: fe9c8773bc6c16fb1b7c7474861b45ce629fe963575162a00daede43bba8c059
                                              • Opcode Fuzzy Hash: 359f6a08ad9329e96712bb717ba99a1b12a3a194eff4dffcc3f17e34ae997bd3
                                              • Instruction Fuzzy Hash: F4519970F112079BEF64566CDA5476FA65BEBC9320F20482DF40AC73A8CA69CC4597A3
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21b9307415c6c2f331cee59c319b53ed711463180f0f23d26fbb04a68c9859ff
                                              • Instruction ID: 01e4a1f568336cabd87c6c624fbddb37ec6d2c78fab9b22a2dd76d7b6d884c9a
                                              • Opcode Fuzzy Hash: 21b9307415c6c2f331cee59c319b53ed711463180f0f23d26fbb04a68c9859ff
                                              • Instruction Fuzzy Hash: 82519474E1050A8FDF718A69C6C077EBBB2EF85320F24882DD059DB681C675F891EB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 931deafb488caaac396733ba3269da8115eb379b152c2a103d2c76a2483be5b4
                                              • Instruction ID: 249d8ed69f04633cbcab4b34e2000bb66e9318f1d4b9995a63af3b1a0fd9d2c4
                                              • Opcode Fuzzy Hash: 931deafb488caaac396733ba3269da8115eb379b152c2a103d2c76a2483be5b4
                                              • Instruction Fuzzy Hash: 7B413E71E0060A8FDF70CEA9D981AAFF7B6FB84324F10492AE116D7650D730F9658B91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 835586b8c488900934ba74987ad8a54a224b50b5fe55ca093636ee56693499b7
                                              • Instruction ID: 1916e0edc81fcef76a3707b0373ca33f53ba5d3efee8cea168c06998bda47da0
                                              • Opcode Fuzzy Hash: 835586b8c488900934ba74987ad8a54a224b50b5fe55ca093636ee56693499b7
                                              • Instruction Fuzzy Hash: 5831B030E1060B9BDF24CF74D99069EBBB6FF85314F108539E405EB255EBB0A946CB81
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 542c94455cd71c9a3732c7ed156849aa218289e94be7dd480ef2f7d6af38bcae
                                              • Instruction ID: 85f05b5d2b4e6a0bb56ee15c05fe67161dfb2e8fce61b20bc090856a26019712
                                              • Opcode Fuzzy Hash: 542c94455cd71c9a3732c7ed156849aa218289e94be7dd480ef2f7d6af38bcae
                                              • Instruction Fuzzy Hash: A3317E30E1060ADFDB54CF68D99569EB7B2FF89310F108929E806E7350DB71AD42CB50
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d94be8c8d5d33bfdbbcfc64175bcd88639ae1931d1ca66b715661509d4bfa60
                                              • Instruction ID: ac948233332f25615652067ff8018ded13bc3771827c5f5b9518d30a95f19be4
                                              • Opcode Fuzzy Hash: 9d94be8c8d5d33bfdbbcfc64175bcd88639ae1931d1ca66b715661509d4bfa60
                                              • Instruction Fuzzy Hash: 13318E30E1060ADFDB58CF69D99569EB7B2FF89310F108929E906EB350DB71AD42CB50
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a2ae0f9dc45120ca29701db811a159acc9e21102eb08c52c42cfa983ba6f0bd
                                              • Instruction ID: 051b6c20364c069d1a3170604af9124789958a3a1abba3c00acf17b44d5f70c2
                                              • Opcode Fuzzy Hash: 3a2ae0f9dc45120ca29701db811a159acc9e21102eb08c52c42cfa983ba6f0bd
                                              • Instruction Fuzzy Hash: 85219AB2F002169FEB44CF69DA80AAEB7F5EB48360F108029E905E7380E735DC05CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0d99619725abde262c16c04938289fa421f25a0b92613480a2c962b1d32081e5
                                              • Instruction ID: 910659b2cb11e8cb44e0fdd48dffb9302dba250091e86d56d16a280249477bcc
                                              • Opcode Fuzzy Hash: 0d99619725abde262c16c04938289fa421f25a0b92613480a2c962b1d32081e5
                                              • Instruction Fuzzy Hash: 0C216DB6F102069FDB44CFA8D940AADB7F5EB48310F108429E905E7350E735D905CB91
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cfc2546331d17a3ae7fa88a3498f94c254d0ecd524ed80dc0e2ea3188312e806
                                              • Instruction ID: c24bade404c89291562181291db4322ea0c94c7bc0a83ed286f6caef887a89d6
                                              • Opcode Fuzzy Hash: cfc2546331d17a3ae7fa88a3498f94c254d0ecd524ed80dc0e2ea3188312e806
                                              • Instruction Fuzzy Hash: 40219D71E0060A8BCF60DEA9CDC16AFFBF6FB88320F504929D116D6690D770B955CB90
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1494313416.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_15ad000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9c7c84e2db78cd4bfe39d9e2a2ab4f1b97aeedd7f0c5366fb69fcca43e5b4049
                                              • Instruction ID: 9277939e988c5f69c6161af3e041922b52222dfec56e5163935b6c7d5d39a4d0
                                              • Opcode Fuzzy Hash: 9c7c84e2db78cd4bfe39d9e2a2ab4f1b97aeedd7f0c5366fb69fcca43e5b4049
                                              • Instruction Fuzzy Hash: 29214575184200DFCB11EF58C980B2ABFB1FB84314F60C56DE8090F656D336D406CA61
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1494313416.00000000015AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015AD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_15ad000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3f90f428e03cd76ffba71d1f24a8c36bc265fb2e61158095158fe3c975aca1c3
                                              • Instruction ID: b7f1ed1b6ddf12153b78523c3d422cc2a6d0c5700f2b9b47e6ddb46b679dee2c
                                              • Opcode Fuzzy Hash: 3f90f428e03cd76ffba71d1f24a8c36bc265fb2e61158095158fe3c975aca1c3
                                              • Instruction Fuzzy Hash: C5216B751493C09FCB03DB64C990715BF71BB46214F29C5EBD8898F6A3D23A981ACB62
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38c24c382c64697bcb06fdf287e4ed4cc31001e5dccf3705ffd28c68c6a4af00
                                              • Instruction ID: 07a16720afaf12997889d7d2b8bf316c7f51c6fa483bf5f99e1d54263c404ce3
                                              • Opcode Fuzzy Hash: 38c24c382c64697bcb06fdf287e4ed4cc31001e5dccf3705ffd28c68c6a4af00
                                              • Instruction Fuzzy Hash: 1011E132B501298FDF54D678D8206AE73EAEBC8321F008439D50AE7344EE65CC068BE2
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9be8a18fff40f1ab4abe32c10eb51d9ac074929987b10fca053dd7d6428f6f39
                                              • Instruction ID: 44abc41fde4da3999ea76ae48ce708e6dbd43acf6413e56c6de0f01c6ae5d4b8
                                              • Opcode Fuzzy Hash: 9be8a18fff40f1ab4abe32c10eb51d9ac074929987b10fca053dd7d6428f6f39
                                              • Instruction Fuzzy Hash: 09012431F000120BEB58C5ADD97279BA2DAEBC4331F20843EE14AC7740EE65DC028390
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5feba2a30aabfd9e1c5fc7114c8d8484c3960f68746b66ee7647cf722ec4dd9
                                              • Instruction ID: 115b7b6d1470d02c082e4414fbaeb5df5b662735ef6ebcb777b51fa12b9eb588
                                              • Opcode Fuzzy Hash: f5feba2a30aabfd9e1c5fc7114c8d8484c3960f68746b66ee7647cf722ec4dd9
                                              • Instruction Fuzzy Hash: BD012F39F110124FDB6186B8A9617ABA7DBDFCA230F10886EF10AC7350EA24DC064391
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e18f4a6e57274cbb3fc26b51b0396c0d3c250ddfc64ec7388fe4e345ad42b149
                                              • Instruction ID: 379affd503230fd318b04fdbe0f7e4c882dac7f3b282c29e42f817a868a31056
                                              • Opcode Fuzzy Hash: e18f4a6e57274cbb3fc26b51b0396c0d3c250ddfc64ec7388fe4e345ad42b149
                                              • Instruction Fuzzy Hash: 2901DF32F501264BEF549668D8206EF76EAEBC8321F005139D54AD3284EE648C0687E2
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 15d6caec7c0d70f809dfce9f6ca787f669a1716db50a2a3cbff9f6781725f178
                                              • Instruction ID: 3b713fddf418dbaf94d62251946d65e778808b021e95f30bf146b0861e8ad8f1
                                              • Opcode Fuzzy Hash: 15d6caec7c0d70f809dfce9f6ca787f669a1716db50a2a3cbff9f6781725f178
                                              • Instruction Fuzzy Hash: 3A018430F1011A8BDB50D978D9A675F73E6E789720F204538E14AC7354EA2BFC028784
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d04d9e206e18c597a6694988cccd4af2dba8d73f6f2e1981f743c8ac69367140
                                              • Instruction ID: 8c3ef2c8b17cb3a9034fdd139cec8e96cae8f9a3ed4bf1953340cf2f9a6dff07
                                              • Opcode Fuzzy Hash: d04d9e206e18c597a6694988cccd4af2dba8d73f6f2e1981f743c8ac69367140
                                              • Instruction Fuzzy Hash: CC11B3B5D01259AFCB00DF9AD984ADEFFB4FB49310F10812AE918B7240D3756954CFA5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1ac40ff04f99c7c03ad1dc913c43307da6df8af85918e170277bf145a9393e51
                                              • Instruction ID: 19ae34aaba6a5b16e98b16dd8d65165a85cdab201dd766484defefe5649b2256
                                              • Opcode Fuzzy Hash: 1ac40ff04f99c7c03ad1dc913c43307da6df8af85918e170277bf145a9393e51
                                              • Instruction Fuzzy Hash: C711D0B5D00219EFCB00DF99D984ADEFBB4BB48310F10812AE918B7210D374A944CFA5
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6d54d5993d4e13f2b89d787abf99aad2ec2bd8b326b474df08efd799f18b7b9d
                                              • Instruction ID: 62229079bab5c13614e2b5444691a41d11dd27cc3d3c8f686a44e4fab1b63277
                                              • Opcode Fuzzy Hash: 6d54d5993d4e13f2b89d787abf99aad2ec2bd8b326b474df08efd799f18b7b9d
                                              • Instruction Fuzzy Hash: 5501D131F104160BEB649ABDE572BAFA6DAEBC9731F10843EE10AC7344EE61DC024395
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5277d433daadd94cf4399251cbcc2cb11ef25c579584528c77587032573a2b2
                                              • Instruction ID: dd43df51ef88c5897a4209caba5b3b600f65686ea07992aa01b54313e52bf1d0
                                              • Opcode Fuzzy Hash: f5277d433daadd94cf4399251cbcc2cb11ef25c579584528c77587032573a2b2
                                              • Instruction Fuzzy Hash: 2601D139F100124BDF6495BDA96076FA6D7DFC9630F10843EE10AC7350EE21DC024385
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5edbeff32fe4ebc48a8b42b1e339a5b3ef866fd1a52aca36567701e607bcad1e
                                              • Instruction ID: 10a5d8396ae3c5be711301d82f7824fc19bea2d123906f90585c8065315a5f95
                                              • Opcode Fuzzy Hash: 5edbeff32fe4ebc48a8b42b1e339a5b3ef866fd1a52aca36567701e607bcad1e
                                              • Instruction Fuzzy Hash: 7F018630F1011A8BDB51DA78D96571F73D6FB89720F10842CE14AC7354EA27FC018785
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b1a54190b28790b87d898e54a03d2340812d3b5a6d56a31d0845bd3d999da3a1
                                              • Instruction ID: cf7de57f57114fef75ed307d4b2105aa77778699c4dd600857ad2c4c521325fe
                                              • Opcode Fuzzy Hash: b1a54190b28790b87d898e54a03d2340812d3b5a6d56a31d0845bd3d999da3a1
                                              • Instruction Fuzzy Hash: F4F0A032E202699BDB54D965EC04A9AB739FB84364F104429EE05E7240DA36AC05CBD0
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 94d124b261bd5f6de9eb3ac609dd1d7fbe9fc6a93b35130c34e1e88ce4c34594
                                              • Instruction ID: b13e63a743e83ec5de4edf55a27e8a1b4d45f656d835d012541105ced4dc562c
                                              • Opcode Fuzzy Hash: 94d124b261bd5f6de9eb3ac609dd1d7fbe9fc6a93b35130c34e1e88ce4c34594
                                              • Instruction Fuzzy Hash: 1CE01271E1810EABDF60DEB4DB5575FB7ADFB02224F2088A9E408D7241E176DE018780
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d693673ca222e119d5c53870e9b0dc7c42ebff8e8ebf2a4f63332dd7724fb0fa
                                              • Instruction ID: 048e6fcb3c16c914f4d7e67fe5ecc67b26a3e449357f471432b5d95e78b18350
                                              • Opcode Fuzzy Hash: d693673ca222e119d5c53870e9b0dc7c42ebff8e8ebf2a4f63332dd7724fb0fa
                                              • Instruction Fuzzy Hash: BAE02031D1D39A5BEB51CB64C6153597764EB03238F1485DFE854CB182C179CF06CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-698649689
                                              • Opcode ID: 985fb6f8c5a35dbfc5a38a4f2ba455f6a1344009542c2c1df1f4b696b8495c5e
                                              • Instruction ID: 8681a7aae0804be5eebd1fd87abe2c66d7b07fdcc87a30a93c2996956dc843c0
                                              • Opcode Fuzzy Hash: 985fb6f8c5a35dbfc5a38a4f2ba455f6a1344009542c2c1df1f4b696b8495c5e
                                              • Instruction Fuzzy Hash: 4D122C30E0021ACFDB68EF65C994A9EB7F6FF84314F208569D409AB264EB319D45CF81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-2216122830
                                              • Opcode ID: 86b98e77c756f781b04db569d552f480fcfeadb6c3b560c44933179569084ae6
                                              • Instruction ID: c185fe1b12f6295c61f0f1ce3c27c5b99e2bbb7d087000fd2733f4827744c881
                                              • Opcode Fuzzy Hash: 86b98e77c756f781b04db569d552f480fcfeadb6c3b560c44933179569084ae6
                                              • Instruction Fuzzy Hash: CD913870E0020EDFEB68DB64DA94BAE77B6FB84314F10852DE40297294DB75ED45CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .5wq$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-3129995876
                                              • Opcode ID: eafafe1a4a9d25cfd6796bba7e778062879cbd0b8b8f6ee398abf3f5844fe819
                                              • Instruction ID: 9096d62104da5ca8fbddea41f4c11e06fb04493028b83134de8855f7370b3f39
                                              • Opcode Fuzzy Hash: eafafe1a4a9d25cfd6796bba7e778062879cbd0b8b8f6ee398abf3f5844fe819
                                              • Instruction Fuzzy Hash: 13F14D70B00206DFDB58EF68C594AAEB7B6FF84310F248569D4059B3A8DB35AC46CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: b6be0536439dfc87da30ec67722c21c3a11743c59007f2439ac1e4a4eff01f53
                                              • Instruction ID: b9bc332b49076989d33fdc94fbe631024b7bca3d9005bf9c2ff27a40053e4f4e
                                              • Opcode Fuzzy Hash: b6be0536439dfc87da30ec67722c21c3a11743c59007f2439ac1e4a4eff01f53
                                              • Instruction Fuzzy Hash: 1CB13A30E1020ACFDB58DF68C6946AEBBB6FF84350F248569D4169B3A4DB74DC46CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: 136fc996040171ae10dbdf0072dfee34b9fb44532d1f69f6274881a821d201d2
                                              • Instruction ID: 649d7b2734ff490c349a5f0b723aabad7bc76edfed981cf2959dc973849a51b3
                                              • Opcode Fuzzy Hash: 136fc996040171ae10dbdf0072dfee34b9fb44532d1f69f6274881a821d201d2
                                              • Instruction Fuzzy Hash: 89518030E1020ACFDF65DB68DA806AEB7B6FB84321F14856AE805DB354DB35EC45CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 0000000C.00000002.1503133014.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_12_2_6fc0000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LR_q$LR_q$$_q$$_q
                                              • API String ID: 0-2912794808
                                              • Opcode ID: 0e40ca290d74cdd7396b16d84e50eae5654af81d7acb75552783b2115c2c7f66
                                              • Instruction ID: 709a6d44f9b66c2f7185ee912cba2790164d00e0cdcebbfafe3e895f0ea683f8
                                              • Opcode Fuzzy Hash: 0e40ca290d74cdd7396b16d84e50eae5654af81d7acb75552783b2115c2c7f66
                                              • Instruction Fuzzy Hash: E151A030B002039FDB58DB28CA90A6A7BE6FF84354F14856DE416DB3A9DB35EC05CB91

                                              Execution Graph

                                              Execution Coverage:8.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:47
                                              Total number of Limit Nodes:5
                                              execution_graph 23012 57090c0 23013 57090e6 23012->23013 23014 570924b 23012->23014 23013->23014 23016 5707438 23013->23016 23017 5709340 PostMessageW 23016->23017 23018 57093ac 23017->23018 23018->23013 22988 5706d91 22989 5706d98 CloseHandle 22988->22989 22990 5706dff 22989->22990 22991 1634668 22992 163467a 22991->22992 22993 1634686 22992->22993 22995 1634779 22992->22995 22996 163479d 22995->22996 23000 1634878 22996->23000 23004 1634888 22996->23004 23002 16348af 23000->23002 23001 163498c 23001->23001 23002->23001 23008 1634248 23002->23008 23006 16348af 23004->23006 23005 163498c 23005->23005 23006->23005 23007 1634248 CreateActCtxA 23006->23007 23007->23005 23009 1635918 CreateActCtxA 23008->23009 23011 16359db 23009->23011 23019 163d358 23020 163d39e 23019->23020 23024 163d527 23020->23024 23027 163d538 23020->23027 23021 163d48b 23030 163cc30 23024->23030 23028 163d566 23027->23028 23029 163cc30 DuplicateHandle 23027->23029 23028->23021 23029->23028 23031 163d5a0 DuplicateHandle 23030->23031 23032 163d566 23031->23032 23032->23021 23033 163afd8 23034 163afd9 23033->23034 23038 163b0d0 23034->23038 23043 163b0bf 23034->23043 23035 163afe7 23039 163b0d1 23038->23039 23040 163b104 23039->23040 23041 163b308 GetModuleHandleW 23039->23041 23040->23035 23042 163b335 23041->23042 23042->23035 23045 163b0d0 23043->23045 23044 163b104 23044->23035 23045->23044 23046 163b308 GetModuleHandleW 23045->23046 23047 163b335 23046->23047 23047->23035

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 350 163b0d0-163b0df 352 163b0e1-163b0ee call 163aaa4 350->352 353 163b10b-163b10f 350->353 358 163b0f0 352->358 359 163b104 352->359 354 163b123-163b164 353->354 355 163b111-163b11b 353->355 362 163b171-163b17f 354->362 363 163b166-163b16e 354->363 355->354 406 163b0f6 call 163b368 358->406 407 163b0f6 call 163b358 358->407 359->353 365 163b1a3-163b1a5 362->365 366 163b181-163b186 362->366 363->362 364 163b0fc-163b0fe 364->359 367 163b240-163b300 364->367 368 163b1a8-163b1af 365->368 369 163b191 366->369 370 163b188-163b18f call 163aab0 366->370 401 163b302-163b305 367->401 402 163b308-163b333 GetModuleHandleW 367->402 373 163b1b1-163b1b9 368->373 374 163b1bc-163b1c3 368->374 372 163b193-163b1a1 369->372 370->372 372->368 373->374 376 163b1d0-163b1d9 call 163aac0 374->376 377 163b1c5-163b1cd 374->377 382 163b1e6-163b1eb 376->382 383 163b1db-163b1e3 376->383 377->376 384 163b209-163b216 382->384 385 163b1ed-163b1f4 382->385 383->382 392 163b239-163b23f 384->392 393 163b218-163b236 384->393 385->384 387 163b1f6-163b206 call 163aad0 call 163aae0 385->387 387->384 393->392 401->402 403 163b335-163b33b 402->403 404 163b33c-163b350 402->404 403->404 406->364 407->364
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0163B326
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495868332.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_1630000_adobe.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 3c810205728e834e92190b4646a32201e2232a907b34e98a37f14dd84640475e
                                              • Instruction ID: fbc1390a8997350ef89833b93d634538ca559b140c924a5424af5ce1a6db60b2
                                              • Opcode Fuzzy Hash: 3c810205728e834e92190b4646a32201e2232a907b34e98a37f14dd84640475e
                                              • Instruction Fuzzy Hash: 98710070A00B058FD724DF69D99476ABBF1BF88300F108A2DD48ADBB50DB74E949CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 408 1634248-16359d9 CreateActCtxA 411 16359e2-1635a3c 408->411 412 16359db-16359e1 408->412 419 1635a4b-1635a4f 411->419 420 1635a3e-1635a41 411->420 412->411 421 1635a51-1635a5d 419->421 422 1635a60 419->422 420->419 421->422 424 1635a61 422->424 424->424
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 016359C9
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495868332.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_1630000_adobe.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 510e9ac5bfa24aff73c5a5a9217a121eab605e6d3d79905ecf85480eefa5b492
                                              • Instruction ID: 18f5df1fcc7c72244890a9fb037e28bb446e969f84d26e778179a1fd896ce3df
                                              • Opcode Fuzzy Hash: 510e9ac5bfa24aff73c5a5a9217a121eab605e6d3d79905ecf85480eefa5b492
                                              • Instruction Fuzzy Hash: 3E41C1B0C0071DCBDB24DFA9C884B9EBBB5BF89304F60816AD409AB255DB756946CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 425 163590d-16359d9 CreateActCtxA 427 16359e2-1635a3c 425->427 428 16359db-16359e1 425->428 435 1635a4b-1635a4f 427->435 436 1635a3e-1635a41 427->436 428->427 437 1635a51-1635a5d 435->437 438 1635a60 435->438 436->435 437->438 440 1635a61 438->440 440->440
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 016359C9
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495868332.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_1630000_adobe.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: b172de1ddd977b897984728c5417e490ae54aa2d58ca900aa8ae48e6b1204137
                                              • Instruction ID: 11e44566c22103e58511bdc8b3695d98fbe0fe73a686d40c707a4f4bad6063a1
                                              • Opcode Fuzzy Hash: b172de1ddd977b897984728c5417e490ae54aa2d58ca900aa8ae48e6b1204137
                                              • Instruction Fuzzy Hash: 3341E0B1C0071DCBDB24CFA9C9847CEBBB5BF49308F20806AD409AB265DB756946CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 441 163cc30-163d634 DuplicateHandle 443 163d636-163d63c 441->443 444 163d63d-163d65a 441->444 443->444
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0163D566,?,?,?,?,?), ref: 0163D627
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495868332.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_1630000_adobe.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 340e00d43e64c1668ceb1afb46f2589f82684a2153fc0b61c60b43add747250a
                                              • Instruction ID: 02a57777af598134de2cb1c1bcde92a363b96da36f7351545e3c54f49645203d
                                              • Opcode Fuzzy Hash: 340e00d43e64c1668ceb1afb46f2589f82684a2153fc0b61c60b43add747250a
                                              • Instruction Fuzzy Hash: AC21E4B5D00258AFDB10CFAAD984ADEBFF4EB48310F54845AE918B3350D374A954CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 447 163d599-163d634 DuplicateHandle 448 163d636-163d63c 447->448 449 163d63d-163d65a 447->449 448->449
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0163D566,?,?,?,?,?), ref: 0163D627
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495868332.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_1630000_adobe.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 773a706cf15f7cecf29c3170b6c8885daedb0565b2d531ceddb79956c4d4ab51
                                              • Instruction ID: ec975994f76bec8f827edb681e53da16383f6d769f8fb7b42e59fd30bb5ee33d
                                              • Opcode Fuzzy Hash: 773a706cf15f7cecf29c3170b6c8885daedb0565b2d531ceddb79956c4d4ab51
                                              • Instruction Fuzzy Hash: C521E2B6D00208DFDB10CFAAD985ADEBBF4FB48310F14845AE918A3310D378A944CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 452 163b2c0-163b300 453 163b302-163b305 452->453 454 163b308-163b333 GetModuleHandleW 452->454 453->454 455 163b335-163b33b 454->455 456 163b33c-163b350 454->456 455->456
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0163B326
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495868332.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_1630000_adobe.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 786f9375bbad83465411e6fb9f51943c870c894313268e5cec55f31b1a4f0ca6
                                              • Instruction ID: e716e67f3a2935f6b83b5f9472be2f048ead9913fde92778f1bb411790c06f6c
                                              • Opcode Fuzzy Hash: 786f9375bbad83465411e6fb9f51943c870c894313268e5cec55f31b1a4f0ca6
                                              • Instruction Fuzzy Hash: 0311FAB68003498BDB10DF9AD844A9EFBF4AB88320F10856AD929B7210C379A545CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 458 5707438-57093aa PostMessageW 460 57093b3-57093c7 458->460 461 57093ac-57093b2 458->461 461->460
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0570939D
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1498771925.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_5700000_adobe.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 55609b5c42e6161d826f792ca76feaef9460a186bb79bdd5dafe29609eccf821
                                              • Instruction ID: 05a31cd868dc31c4808eb505e0f3cf8b396256cda8b442954c582d780314dc98
                                              • Opcode Fuzzy Hash: 55609b5c42e6161d826f792ca76feaef9460a186bb79bdd5dafe29609eccf821
                                              • Instruction Fuzzy Hash: A011F2B5804348DFCB10DF9AD884BDEFBF8EB48310F108459EA19A7281C375A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 463 570933a-57093aa PostMessageW 465 57093b3-57093c7 463->465 466 57093ac-57093b2 463->466 466->465
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0570939D
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1498771925.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_5700000_adobe.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 800d67daa43cb237f6b859c0e333542fe23800415584b860d59e5f0a922556ef
                                              • Instruction ID: d881a3a83acb7bf0e9e94ab44abbe935f0c49a2672db167742042117f133482b
                                              • Opcode Fuzzy Hash: 800d67daa43cb237f6b859c0e333542fe23800415584b860d59e5f0a922556ef
                                              • Instruction Fuzzy Hash: 7C11F2B58042489FDB10DF9AD885BDEFBF8EB48310F10845AE918A3241C375A944CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 540 570629c-5706dfd CloseHandle 542 5706e06-5706e2e 540->542 543 5706dff-5706e05 540->543 543->542
                                              APIs
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,05706C49,?,?), ref: 05706DF0
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1498771925.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_5700000_adobe.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 713febdd9bf00b0674c22a1b48d4ef59b5004d3c189a22f979141937f18a92ca
                                              • Instruction ID: 9ab12b1f71d2f32b1f9e2bd1cc07fc3b2d460176aa6621cba2e797037b39790f
                                              • Opcode Fuzzy Hash: 713febdd9bf00b0674c22a1b48d4ef59b5004d3c189a22f979141937f18a92ca
                                              • Instruction Fuzzy Hash: 8B1125B1804359CFCB20DF99C585BDEBBF4EB48320F108469D559A7240D378A954CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 546 5706d91-5706dfd CloseHandle 548 5706e06-5706e2e 546->548 549 5706dff-5706e05 546->549 549->548
                                              APIs
                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,05706C49,?,?), ref: 05706DF0
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1498771925.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_5700000_adobe.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: b13a1f912591f11af4b0df997094ea743f5a2ffa5784dcf5034778b68b1f4adc
                                              • Instruction ID: e41ab4e5fce8e8925bfed8ee0f5a17d362a34fb5786c0e18de99ed05521c1b59
                                              • Opcode Fuzzy Hash: b13a1f912591f11af4b0df997094ea743f5a2ffa5784dcf5034778b68b1f4adc
                                              • Instruction Fuzzy Hash: 461136B2804349CFDB10DF99C585BDEBBF4EB48320F108469D559A7340D338A944CFA5
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1494911299.00000000015BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_15bd000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f96426af4a7c8ca707c63ca333b46ea7af5bc1362e7f13b24d8695ebf73ca0cf
                                              • Instruction ID: e81118485c787faa1a959ae35a7836b8c52c5b6d0616656bb9792cb958dd1888
                                              • Opcode Fuzzy Hash: f96426af4a7c8ca707c63ca333b46ea7af5bc1362e7f13b24d8695ebf73ca0cf
                                              • Instruction Fuzzy Hash: A821E2725042809FDB05DF98D9C0B6AFFB5FB88328F208569E9090E256C336D416CBA1
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495022092.00000000015CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_15cd000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 61f04f344ad2d6fc58dfb7eab32a9f36901a90b6cf0cfa38eb6e0de8d1f8d273
                                              • Instruction ID: 522faa1e9cc5b23b31190032b483e57eb050a36e4630bece3db2e2f1efeea674
                                              • Opcode Fuzzy Hash: 61f04f344ad2d6fc58dfb7eab32a9f36901a90b6cf0cfa38eb6e0de8d1f8d273
                                              • Instruction Fuzzy Hash: 1421F1755042049FCB15DF9CD580B26BBB5FB84714F20C97DE80A9F256D33AD406CAA1
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1495022092.00000000015CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_15cd000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 47770725511828683d556fa3ffb441634aaa9d9b60e781f7a456aa2873d1ee12
                                              • Instruction ID: c08a7402d4137aa2a1b6f28cf35e3a04623f740a04b74744715830d990c4c2cc
                                              • Opcode Fuzzy Hash: 47770725511828683d556fa3ffb441634aaa9d9b60e781f7a456aa2873d1ee12
                                              • Instruction Fuzzy Hash: D521AF355083808FCB02CF68C594715BF71FB46214F28C1EAD8498F6A3C33A980ACBA2
                                              Memory Dump Source
                                              • Source File: 0000000E.00000002.1494911299.00000000015BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_14_2_15bd000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21e913fbe4a6093fe52002ebff3728cbe293fe76fa7d723964536c1d21f6342d
                                              • Instruction ID: 2109a0231af8e615ba89e55d81e3ee3e2d94d7c9bb190d2bbf89a1571c592cb8
                                              • Opcode Fuzzy Hash: 21e913fbe4a6093fe52002ebff3728cbe293fe76fa7d723964536c1d21f6342d
                                              • Instruction Fuzzy Hash: 9F219D76504284DFDB06CF54D9C4B5AFF72FB84324F24C5A9ED090A656C33AD42ACBA1

                                              Execution Graph

                                              Execution Coverage:13.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:21
                                              Total number of Limit Nodes:4
                                              execution_graph 27492 c20848 27493 c2084e 27492->27493 27494 c2091b 27493->27494 27496 c21350 27493->27496 27498 c2134e 27496->27498 27497 c2147a 27497->27493 27498->27496 27498->27497 27500 c28221 27498->27500 27501 c2822b 27500->27501 27502 c282e1 27501->27502 27505 644f9c1 27501->27505 27511 644f9d0 27501->27511 27502->27498 27507 644f9e5 27505->27507 27506 644fbfa 27506->27502 27507->27506 27508 644fc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 27507->27508 27509 644fe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 27507->27509 27510 644fc20 GlobalMemoryStatusEx GlobalMemoryStatusEx 27507->27510 27508->27507 27509->27507 27510->27507 27513 644f9e5 27511->27513 27512 644fbfa 27512->27502 27513->27512 27514 644fc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 27513->27514 27515 644fe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 27513->27515 27516 644fc20 GlobalMemoryStatusEx GlobalMemoryStatusEx 27513->27516 27514->27513 27515->27513 27516->27513
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-155944776
                                              • Opcode ID: 99d18b93664587286e0778a3f336ceab95de544062486913751bebf0f607e2d0
                                              • Instruction ID: 999536ccd234ce0938a0d814ff41973f9ae65b824e66d38450eca687d1dd194c
                                              • Opcode Fuzzy Hash: 99d18b93664587286e0778a3f336ceab95de544062486913751bebf0f607e2d0
                                              • Instruction Fuzzy Hash: 47D26B34E006058FDB65EF65C485A9EB7F2FF89300F5485AAE409AB365DB70ED85CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-155944776
                                              • Opcode ID: 877bca5ded7c8503353a87f0c09f223f6cbe6872f967bd82cf1c02bd43ae2581
                                              • Instruction ID: a9b247a856e2d864ddc20ebd53a6c93e66bd066fb1bee3061e7d22d6ff63ea16
                                              • Opcode Fuzzy Hash: 877bca5ded7c8503353a87f0c09f223f6cbe6872f967bd82cf1c02bd43ae2581
                                              • Instruction Fuzzy Hash: CE526D30E102098BEF65EB68D5817AEB7F2FB45310F24886AE405EB395DB35DC85CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1758 6447dc8-6447de6 1759 6447de8-6447deb 1758->1759 1760 6447ded-6447df7 1759->1760 1761 6447df8-6447dfb 1759->1761 1762 6447dfd-6447e19 1761->1762 1763 6447e1e-6447e21 1761->1763 1762->1763 1764 6447e42-6447e45 1763->1764 1765 6447e23-6447e3d 1763->1765 1766 6447e47-6447e55 1764->1766 1767 6447e5c-6447e5e 1764->1767 1765->1764 1773 6447e6e-6447e84 1766->1773 1776 6447e57 1766->1776 1770 6447e65-6447e68 1767->1770 1771 6447e60 1767->1771 1770->1759 1770->1773 1771->1770 1778 644809f-64480a9 1773->1778 1779 6447e8a-6447e93 1773->1779 1776->1767 1780 6447e99-6447eb6 1779->1780 1781 64480aa-64480b4 1779->1781 1790 644808c-6448099 1780->1790 1791 6447ebc-6447ee4 1780->1791 1784 64480b6-64480df 1781->1784 1785 644810b 1781->1785 1787 64480e1-64480e4 1784->1787 1788 644810d 1785->1788 1789 644810f-6448111 1785->1789 1792 6448197-644819a 1787->1792 1793 64480ea-64480f6 1787->1793 1794 644811b-6448122 1788->1794 1789->1794 1790->1778 1790->1779 1791->1790 1816 6447eea-6447ef3 1791->1816 1795 64483c6-64483c9 1792->1795 1796 64481a0-64481af 1792->1796 1803 6448101-6448103 1793->1803 1797 6448124-6448131 1794->1797 1798 6448133 1794->1798 1800 64483ec-64483ee 1795->1800 1801 64483cb-64483e7 1795->1801 1810 64481b1-64481cc 1796->1810 1811 64481ce-6448209 1796->1811 1799 6448138-644813a 1797->1799 1798->1799 1805 6448151-644818a 1799->1805 1806 644813c-644813f 1799->1806 1807 64483f5-64483f8 1800->1807 1808 64483f0 1800->1808 1801->1800 1803->1794 1809 6448105 1803->1809 1805->1796 1838 644818c-6448196 1805->1838 1812 64483fe-6448407 1806->1812 1807->1787 1807->1812 1808->1807 1809->1785 1810->1811 1822 644820f-6448220 1811->1822 1823 644839a-64483b0 1811->1823 1816->1781 1820 6447ef9-6447f15 1816->1820 1829 644807a-6448086 1820->1829 1830 6447f1b-6447f45 1820->1830 1832 6448385-6448394 1822->1832 1833 6448226-6448243 1822->1833 1823->1795 1829->1790 1829->1816 1843 6448070-6448075 1830->1843 1844 6447f4b-6447f73 1830->1844 1832->1822 1832->1823 1833->1832 1841 6448249-644833f call 64465e8 1833->1841 1893 6448341-644834b 1841->1893 1894 644834d 1841->1894 1843->1829 1844->1843 1851 6447f79-6447fa7 1844->1851 1851->1843 1856 6447fad-6447fb6 1851->1856 1856->1843 1858 6447fbc-6447fee 1856->1858 1865 6447ff0-6447ff4 1858->1865 1866 6447ff9-6448015 1858->1866 1865->1843 1868 6447ff6 1865->1868 1866->1829 1869 6448017-644806e call 64465e8 1866->1869 1868->1866 1869->1829 1895 6448352-6448354 1893->1895 1894->1895 1895->1832 1896 6448356-644835b 1895->1896 1897 644835d-6448367 1896->1897 1898 6448369 1896->1898 1899 644836e-6448370 1897->1899 1898->1899 1899->1832 1900 6448372-644837e 1899->1900 1900->1832
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q
                                              • API String ID: 0-458585787
                                              • Opcode ID: 461a7de577572cae315862699b5750a746b9b63a1d2f9429c782882f2cac2a81
                                              • Instruction ID: 056eab01111d49ae217a39130960ae21ed339a594f4e6cda5d4d4bbc08eee387
                                              • Opcode Fuzzy Hash: 461a7de577572cae315862699b5750a746b9b63a1d2f9429c782882f2cac2a81
                                              • Instruction Fuzzy Hash: 0102BD30B002058FEB59EB64D9957AEB7E2FF84304F25856AE409DB795DB31EC46CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2116 64455e8-6445605 2117 6445607-644560a 2116->2117 2118 6445612-6445615 2117->2118 2119 644560c-644560d 2117->2119 2120 6445617-644561e 2118->2120 2121 6445623-6445626 2118->2121 2119->2118 2120->2121 2122 6445635-6445638 2121->2122 2123 6445628-644562e 2121->2123 2125 644563a-644563d 2122->2125 2126 6445642-6445645 2122->2126 2124 6445630-6445633 2123->2124 2123->2125 2124->2122 2125->2126 2128 6445647-6445659 2126->2128 2129 644565e-6445661 2126->2129 2128->2129 2130 6445687-644568a 2129->2130 2131 6445663-6445682 2129->2131 2133 6445694-6445697 2130->2133 2134 644568c-644568f 2130->2134 2131->2130 2136 6445721-6445727 2133->2136 2137 644569d-64456a0 2133->2137 2134->2133 2138 6445733-6445739 2136->2138 2139 6445729 2136->2139 2140 64456a2-64456a8 2137->2140 2141 64456b3-64456b6 2137->2141 2143 64457b3-64457e3 2138->2143 2144 644573b-6445743 2138->2144 2142 644572e-6445731 2139->2142 2146 6445762-644576c 2140->2146 2147 64456ae 2140->2147 2141->2140 2148 64456b8-64456bb 2141->2148 2142->2138 2151 644575d-6445760 2142->2151 2164 64457ed-64457f0 2143->2164 2144->2143 2152 6445745-6445752 2144->2152 2158 6445773-6445775 2146->2158 2147->2141 2149 64456bd-64456ca 2148->2149 2150 64456cf-64456d2 2148->2150 2149->2150 2153 64456d4-64456d8 2150->2153 2154 64456e3-64456e6 2150->2154 2151->2146 2157 644577a-644577d 2151->2157 2152->2143 2155 6445754-6445758 2152->2155 2160 64457a5-64457b2 2153->2160 2161 64456de 2153->2161 2162 6445703-6445706 2154->2162 2163 64456e8-64456fe 2154->2163 2155->2151 2165 644577f-6445788 2157->2165 2166 6445789-644578c 2157->2166 2158->2157 2161->2154 2167 644571c-644571f 2162->2167 2168 6445708-6445717 2162->2168 2163->2162 2169 64457f2-64457f9 2164->2169 2170 64457fa-64457fd 2164->2170 2171 6445793-6445795 2166->2171 2172 644578e-6445790 2166->2172 2167->2136 2167->2142 2168->2167 2176 6445811-6445814 2170->2176 2177 64457ff-6445806 2170->2177 2173 6445797 2171->2173 2174 644579c-644579f 2171->2174 2172->2171 2173->2174 2174->2117 2174->2160 2181 6445836-6445839 2176->2181 2182 6445816-644581a 2176->2182 2178 644580c 2177->2178 2179 64458ce-64458d5 2177->2179 2178->2176 2183 6445851-6445854 2181->2183 2184 644583b-644584c 2181->2184 2185 64458d6-64458e8 2182->2185 2186 6445820-6445828 2182->2186 2188 6445856-644585a 2183->2188 2189 644586e-6445871 2183->2189 2184->2183 2196 6445918-6445919 2185->2196 2197 64458ea-6445914 2185->2197 2186->2185 2187 644582e-6445831 2186->2187 2187->2181 2188->2185 2191 644585c-6445864 2188->2191 2192 6445882-6445885 2189->2192 2193 6445873-644587d 2189->2193 2191->2185 2195 6445866-6445869 2191->2195 2198 6445887-644588b 2192->2198 2199 644589f-64458a2 2192->2199 2193->2192 2195->2189 2204 6445927-644592a 2196->2204 2205 644591b-6445922 2196->2205 2203 6445916 2197->2203 2198->2185 2206 644588d-6445895 2198->2206 2200 64458a4-64458a8 2199->2200 2201 64458bc-64458be 2199->2201 2200->2185 2210 64458aa-64458b2 2200->2210 2211 64458c5-64458c8 2201->2211 2212 64458c0 2201->2212 2203->2196 2208 6445934-6445937 2204->2208 2209 644592c-6445931 2204->2209 2205->2204 2206->2185 2207 6445897-644589a 2206->2207 2207->2199 2213 6445945-6445948 2208->2213 2214 6445939-6445940 2208->2214 2209->2208 2210->2185 2215 64458b4-64458b7 2210->2215 2211->2164 2211->2179 2212->2211 2216 64459cd-6445b61 2213->2216 2217 644594e-6445951 2213->2217 2214->2213 2215->2201 2268 6445c97-6445caa 2216->2268 2269 6445b67-6445b6e 2216->2269 2218 6445953-6445964 2217->2218 2219 644596b-644596e 2217->2219 2223 644598d-644599e 2218->2223 2228 6445966 2218->2228 2220 6445970-6445981 2219->2220 2221 6445988-644598b 2219->2221 2227 64459ae-64459c1 2220->2227 2233 6445983 2220->2233 2221->2223 2224 64459a9-64459ac 2221->2224 2223->2205 2234 64459a4 2223->2234 2226 64459c4-64459c7 2224->2226 2224->2227 2226->2216 2232 6445cad-6445cb0 2226->2232 2228->2219 2235 6445cb2-6445cc3 2232->2235 2236 6445cce-6445cd1 2232->2236 2233->2221 2234->2224 2235->2205 2246 6445cc9 2235->2246 2239 6445cd3-6445ce4 2236->2239 2240 6445cef-6445cf2 2236->2240 2239->2205 2250 6445cea 2239->2250 2240->2216 2241 6445cf8-6445cfa 2240->2241 2244 6445d01-6445d04 2241->2244 2245 6445cfc 2241->2245 2244->2203 2248 6445d0a-6445d13 2244->2248 2245->2244 2246->2236 2250->2240 2270 6445b74-6445b97 2269->2270 2271 6445c22-6445c29 2269->2271 2280 6445b9f-6445ba7 2270->2280 2271->2268 2272 6445c2b-6445c5e 2271->2272 2284 6445c60 2272->2284 2285 6445c63-6445c90 2272->2285 2281 6445bac-6445bed 2280->2281 2282 6445ba9 2280->2282 2293 6445c05-6445c16 2281->2293 2294 6445bef-6445c00 2281->2294 2282->2281 2284->2285 2285->2248 2293->2248 2294->2248
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $
                                              • API String ID: 0-3993045852
                                              • Opcode ID: 099379aab524a22ae893e56819074cef606bb2dcdf486d14efb00c707e7fce89
                                              • Instruction ID: 12b7b0826e814fa71018980934a160146fa83083cf1bf8423d471661177c7af3
                                              • Opcode Fuzzy Hash: 099379aab524a22ae893e56819074cef606bb2dcdf486d14efb00c707e7fce89
                                              • Instruction Fuzzy Hash: 4C22E275E002049FEF69EBA4C4816AFBBF2EF84314F24846AD409EB344DA35DD46CB91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 690c98811c67d18ef91466ca45783be16a510a35c6657b0abb0c83ee6e7a25ec
                                              • Instruction ID: 37cd453fbb54fae468e4c6ee9e8825fd69b1dd612a53140f796bfede2be11d5c
                                              • Opcode Fuzzy Hash: 690c98811c67d18ef91466ca45783be16a510a35c6657b0abb0c83ee6e7a25ec
                                              • Instruction Fuzzy Hash: B562AF34B002048FEB55EB68D585BAEB7F2EF89314F25846AE405EB354DB35ED46CB80
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 90fd401c53d2f0dec0b520d715aa0c935910a121f87f1c56ae90eb7851121346
                                              • Instruction ID: 15365b232d01f51b54c89db92f8a0b955548aa14460a6c1afe220a15ab1ea75c
                                              • Opcode Fuzzy Hash: 90fd401c53d2f0dec0b520d715aa0c935910a121f87f1c56ae90eb7851121346
                                              • Instruction Fuzzy Hash: 19329D30A112059FEB55EB68D9C1BAEB7B2FB88310F14856AE405EB355DB35EC42CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 644ad18-644ad36 1 644ad38-644ad3b 0->1 2 644ad55-644ad58 1->2 3 644ad3d-644ad46 1->3 6 644ad6c-644ad6f 2->6 7 644ad5a-644ad67 2->7 4 644ad47-644ad50 3->4 5 644af4f-644af86 3->5 4->2 15 644af88-644af8b 5->15 9 644ad71-644ad76 6->9 10 644ad79-644ad7c 6->10 7->6 9->10 13 644af35-644af3e 10->13 14 644ad82-644ad85 10->14 13->3 16 644af44-644af4e 13->16 17 644ad96-644ad99 14->17 18 644ad87-644ad8b 14->18 19 644af8d-644afa9 15->19 20 644afae-644afb1 15->20 22 644adbc-644adbf 17->22 23 644ad9b-644adb7 17->23 18->16 21 644ad8c-644ad92 18->21 19->20 26 644afb3-644afbd 20->26 27 644afbe-644afc1 20->27 21->17 24 644adc1-644add4 22->24 25 644add9-644addc 22->25 23->22 24->25 28 644adec-644adee 25->28 29 644adde-644ade7 25->29 31 644afd0-644afd3 27->31 32 644afc3 27->32 37 644adf5-644adf8 28->37 38 644adf0 28->38 29->28 34 644b23c-644b23f 31->34 35 644afd9-644b014 31->35 125 644afc3 call 644b280 32->125 126 644afc3 call 644b26f 32->126 41 644b250-644b252 34->41 42 644b241-644b245 34->42 49 644b207-644b21a 35->49 50 644b01a-644b026 35->50 37->1 44 644adfe-644ae22 37->44 38->37 39 644afc9-644afcb 39->31 47 644b254 41->47 48 644b259-644b25c 41->48 42->35 46 644b24b 42->46 56 644af32 44->56 57 644ae28-644ae37 44->57 46->41 47->48 48->15 51 644b262-644b26c 48->51 53 644b21c 49->53 59 644b046-644b08a 50->59 60 644b028-644b041 50->60 58 644b21d 53->58 56->13 63 644ae4f-644ae8a call 64465e8 57->63 64 644ae39-644ae3f 57->64 58->58 75 644b0a6-644b0e5 59->75 76 644b08c-644b09e 59->76 60->53 81 644aea2-644aeb9 63->81 82 644ae8c-644ae92 63->82 65 644ae41 64->65 66 644ae43-644ae45 64->66 65->63 66->63 83 644b1cc-644b1e1 75->83 84 644b0eb-644b1c6 call 64465e8 75->84 76->75 94 644aed1-644aee2 81->94 95 644aebb-644aec1 81->95 85 644ae94 82->85 86 644ae96-644ae98 82->86 83->49 84->83 85->81 86->81 101 644aee4-644aeea 94->101 102 644aefa-644af2b 94->102 97 644aec5-644aec7 95->97 98 644aec3 95->98 97->94 98->94 103 644aeec 101->103 104 644aeee-644aef0 101->104 102->56 103->102 104->102 125->39 126->39
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-2216122830
                                              • Opcode ID: acaeda5d25a1ff6b36f1ae66db0a0050c1466a0daa52cfe29b8ae793ef9c84b8
                                              • Instruction ID: 227c818ae09f50852b358c46739dd082eba660325b367b7b85b9a6ab07947b3e
                                              • Opcode Fuzzy Hash: acaeda5d25a1ff6b36f1ae66db0a0050c1466a0daa52cfe29b8ae793ef9c84b8
                                              • Instruction Fuzzy Hash: D3E16030E5020A8FEB69EB65D5856AEB7F2FF85304F20852AE4159B359DF30DC46CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 859 6449198-64491bd 860 64491bf-64491c2 859->860 861 6449a80-6449a83 860->861 862 64491c8-64491dd 860->862 863 6449a85-6449aa4 861->863 864 6449aa9-6449aab 861->864 870 64491f5-644920b 862->870 871 64491df-64491e5 862->871 863->864 865 6449ab2-6449ab5 864->865 866 6449aad 864->866 865->860 869 6449abb-6449ac5 865->869 866->865 876 6449216-6449218 870->876 872 64491e7 871->872 873 64491e9-64491eb 871->873 872->870 873->870 877 6449230-64492a1 876->877 878 644921a-6449220 876->878 889 64492a3-64492c6 877->889 890 64492cd-64492e9 877->890 879 6449224-6449226 878->879 880 6449222 878->880 879->877 880->877 889->890 895 6449315-6449330 890->895 896 64492eb-644930e 890->896 901 6449332-6449354 895->901 902 644935b-6449376 895->902 896->895 901->902 907 6449378-6449394 902->907 908 644939b-64493a9 902->908 907->908 909 64493b9-6449433 908->909 910 64493ab-64493b4 908->910 916 6449435-6449453 909->916 917 6449480-6449495 909->917 910->869 921 6449455-6449464 916->921 922 644946f-644947e 916->922 917->861 921->922 922->916 922->917
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: cfce0d73c55c0bd0619e93eeb12f58d2a12ea9a554da30adc4775a8ceba520d0
                                              • Instruction ID: 8b700aad539ef3be3dd244fdbcb70068c695c4867503ffd979df45366e7bbb2f
                                              • Opcode Fuzzy Hash: cfce0d73c55c0bd0619e93eeb12f58d2a12ea9a554da30adc4775a8ceba520d0
                                              • Instruction Fuzzy Hash: E2915D70B0061A9FEB54EF64D9517AFB7F6BF88300F10856AD419EB348EA309D46CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 925 644cfa0-644cfbb 926 644cfbd-644cfc0 925->926 927 644cfc2-644d004 926->927 928 644d009-644d00c 926->928 927->928 929 644d055-644d058 928->929 930 644d00e-644d050 928->930 931 644d075-644d078 929->931 932 644d05a-644d070 929->932 930->929 934 644d0c1-644d0c4 931->934 935 644d07a-644d089 931->935 932->931 941 644d0c6-644d108 934->941 942 644d10d-644d110 934->942 938 644d098-644d0a4 935->938 939 644d08b-644d090 935->939 944 644d9bd-644d9d0 938->944 945 644d0aa-644d0bc 938->945 939->938 941->942 946 644d112-644d154 942->946 947 644d159-644d15c 942->947 964 644d9d2-644d9dd 944->964 965 644d9de-644d9f6 944->965 945->934 946->947 950 644d162-644d165 947->950 951 644d48c-644d498 947->951 954 644d167-644d1a9 950->954 955 644d1ae-644d1b1 950->955 951->935 956 644d49e-644d78b 951->956 954->955 962 644d1b3-644d1b8 955->962 963 644d1bb-644d1be 955->963 1140 644d791-644d797 956->1140 1141 644d9b2-644d9bc 956->1141 962->963 966 644d207-644d20a 963->966 967 644d1c0-644d1cf 963->967 964->965 968 644d9f8-644d9fb 965->968 979 644d253-644d256 966->979 980 644d20c-644d24e 966->980 975 644d1d1-644d1d6 967->975 976 644d1de-644d1ea 967->976 977 644d9fd 968->977 978 644da0a-644da0d 968->978 975->976 976->944 982 644d1f0-644d202 976->982 1187 644d9fd call 644db15 977->1187 1188 644d9fd call 644db28 977->1188 986 644da30-644da33 978->986 987 644da0f-644da2b 978->987 983 644d258-644d274 979->983 984 644d279-644d27c 979->984 980->979 982->966 983->984 993 644d27e-644d280 984->993 994 644d28b-644d28e 984->994 991 644da35-644da61 986->991 992 644da66-644da68 986->992 987->986 991->992 999 644da6f-644da72 992->999 1000 644da6a 992->1000 1003 644d286 993->1003 1004 644d347-644d350 993->1004 1005 644d2d7-644d2da 994->1005 1006 644d290-644d2d2 994->1006 996 644da03-644da05 996->978 999->968 1010 644da74-644da83 999->1010 1000->999 1003->994 1011 644d352-644d357 1004->1011 1012 644d35f-644d36b 1004->1012 1014 644d2dc-644d2de 1005->1014 1015 644d2e9-644d2ec 1005->1015 1006->1005 1034 644da85-644dae8 call 64465e8 1010->1034 1035 644daea-644daff 1010->1035 1011->1012 1025 644d371-644d385 1012->1025 1026 644d47c-644d481 1012->1026 1016 644d2e4 1014->1016 1017 644d489 1014->1017 1019 644d335-644d337 1015->1019 1020 644d2ee-644d330 1015->1020 1016->1015 1017->951 1030 644d33e-644d341 1019->1030 1031 644d339 1019->1031 1020->1019 1025->1017 1041 644d38b-644d39d 1025->1041 1026->1017 1030->926 1030->1004 1031->1030 1034->1035 1050 644db00 1035->1050 1054 644d3c1-644d3c3 1041->1054 1055 644d39f-644d3a5 1041->1055 1050->1050 1057 644d3cd-644d3d9 1054->1057 1058 644d3a7 1055->1058 1059 644d3a9-644d3b5 1055->1059 1067 644d3e7 1057->1067 1068 644d3db-644d3e5 1057->1068 1063 644d3b7-644d3bf 1058->1063 1059->1063 1063->1057 1073 644d3ec-644d3ee 1067->1073 1068->1073 1073->1017 1074 644d3f4-644d410 call 64465e8 1073->1074 1084 644d412-644d417 1074->1084 1085 644d41f-644d42b 1074->1085 1084->1085 1085->1026 1086 644d42d-644d47a 1085->1086 1086->1017 1142 644d7a6-644d7af 1140->1142 1143 644d799-644d79e 1140->1143 1142->944 1144 644d7b5-644d7c8 1142->1144 1143->1142 1146 644d9a2-644d9ac 1144->1146 1147 644d7ce-644d7d4 1144->1147 1146->1140 1146->1141 1148 644d7d6-644d7db 1147->1148 1149 644d7e3-644d7ec 1147->1149 1148->1149 1149->944 1150 644d7f2-644d813 1149->1150 1153 644d815-644d81a 1150->1153 1154 644d822-644d82b 1150->1154 1153->1154 1154->944 1155 644d831-644d84e 1154->1155 1155->1146 1158 644d854-644d85a 1155->1158 1158->944 1159 644d860-644d879 1158->1159 1161 644d995-644d99c 1159->1161 1162 644d87f-644d8a6 1159->1162 1161->1146 1161->1158 1162->944 1165 644d8ac-644d8b6 1162->1165 1165->944 1166 644d8bc-644d8d3 1165->1166 1168 644d8d5-644d8e0 1166->1168 1169 644d8e2-644d8fd 1166->1169 1168->1169 1169->1161 1174 644d903-644d91c call 64465e8 1169->1174 1178 644d91e-644d923 1174->1178 1179 644d92b-644d934 1174->1179 1178->1179 1179->944 1180 644d93a-644d98e 1179->1180 1180->1161 1187->996 1188->996
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q
                                              • API String ID: 0-2441406858
                                              • Opcode ID: 3aaf4a0c3382f091fd5c12dd86e69c680f177f0b5275b4a2b615fd0e93f2bfe3
                                              • Instruction ID: 5c018a4dc775537c3593683c13cff6ccd93504c98c1fe6a0e515459011c44a6a
                                              • Opcode Fuzzy Hash: 3aaf4a0c3382f091fd5c12dd86e69c680f177f0b5275b4a2b615fd0e93f2bfe3
                                              • Instruction Fuzzy Hash: 63624F30A106068FDB55EF68D591A5EB7F2FF84304F248AA9D0059F369DB71ED4ACB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1189 6444bb0-6444bd4 1190 6444bd6-6444bd9 1189->1190 1191 6444bfa-6444bfd 1190->1191 1192 6444bdb-6444bf5 1190->1192 1193 6444c03-6444cfb 1191->1193 1194 64452dc-64452de 1191->1194 1192->1191 1212 6444d01-6444d49 1193->1212 1213 6444d7e-6444d85 1193->1213 1195 64452e5-64452e8 1194->1195 1196 64452e0 1194->1196 1195->1190 1198 64452ee-64452fb 1195->1198 1196->1195 1235 6444d4e call 6445468 1212->1235 1236 6444d4e call 644545a 1212->1236 1214 6444e09-6444e12 1213->1214 1215 6444d8b-6444dfb 1213->1215 1214->1198 1232 6444e06 1215->1232 1233 6444dfd 1215->1233 1226 6444d54-6444d70 1230 6444d72 1226->1230 1231 6444d7b-6444d7c 1226->1231 1230->1231 1231->1213 1232->1214 1233->1232 1235->1226 1236->1226
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fdq$XPdq$\Odq
                                              • API String ID: 0-727959394
                                              • Opcode ID: 1364009fb1392a7c4664fbd696ccee20524ae60a516c3b35a80f7c9959271b86
                                              • Instruction ID: 5589f37b7f4775b5e6f93ba64ccc1caaeba70dcd0cd25f5b1784dc6c5aced680
                                              • Opcode Fuzzy Hash: 1364009fb1392a7c4664fbd696ccee20524ae60a516c3b35a80f7c9959271b86
                                              • Instruction Fuzzy Hash: 90617E70F002189FEB54AFA4C8557AEBBF6FB88700F20842AE106EB395DF754D458B91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2002 6449188-64491bd 2003 64491bf-64491c2 2002->2003 2004 6449a80-6449a83 2003->2004 2005 64491c8-64491dd 2003->2005 2006 6449a85-6449aa4 2004->2006 2007 6449aa9-6449aab 2004->2007 2013 64491f5-644920b 2005->2013 2014 64491df-64491e5 2005->2014 2006->2007 2008 6449ab2-6449ab5 2007->2008 2009 6449aad 2007->2009 2008->2003 2012 6449abb-6449ac5 2008->2012 2009->2008 2019 6449216-6449218 2013->2019 2015 64491e7 2014->2015 2016 64491e9-64491eb 2014->2016 2015->2013 2016->2013 2020 6449230-64492a1 2019->2020 2021 644921a-6449220 2019->2021 2032 64492a3-64492c6 2020->2032 2033 64492cd-64492e9 2020->2033 2022 6449224-6449226 2021->2022 2023 6449222 2021->2023 2022->2020 2023->2020 2032->2033 2038 6449315-6449330 2033->2038 2039 64492eb-644930e 2033->2039 2044 6449332-6449354 2038->2044 2045 644935b-6449376 2038->2045 2039->2038 2044->2045 2050 6449378-6449394 2045->2050 2051 644939b-64493a9 2045->2051 2050->2051 2052 64493b9-6449433 2051->2052 2053 64493ab-64493b4 2051->2053 2059 6449435-6449453 2052->2059 2060 6449480-6449495 2052->2060 2053->2012 2064 6449455-6449464 2059->2064 2065 644946f-644947e 2059->2065 2060->2004 2064->2065 2065->2059 2065->2060
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q
                                              • API String ID: 0-458585787
                                              • Opcode ID: 7904fc9edcbca5c3d3d2763386e43fc41837db797e7305226c606b09ed7febd5
                                              • Instruction ID: 35c9f530fe1ec5aaf38aab5b10d333f114a09158f0ecd75dd4207cd6b94e244b
                                              • Opcode Fuzzy Hash: 7904fc9edcbca5c3d3d2763386e43fc41837db797e7305226c606b09ed7febd5
                                              • Instruction Fuzzy Hash: 87516170B006069FEB54EB74D9A17AF73F6BB88310F10856AD419DB398EA30DD02CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2068 6444ba0-6444bd4 2069 6444bd6-6444bd9 2068->2069 2070 6444bfa-6444bfd 2069->2070 2071 6444bdb-6444bf5 2069->2071 2072 6444c03-6444cfb 2070->2072 2073 64452dc-64452de 2070->2073 2071->2070 2091 6444d01-6444d49 2072->2091 2092 6444d7e-6444d85 2072->2092 2074 64452e5-64452e8 2073->2074 2075 64452e0 2073->2075 2074->2069 2077 64452ee-64452fb 2074->2077 2075->2074 2114 6444d4e call 6445468 2091->2114 2115 6444d4e call 644545a 2091->2115 2093 6444e09-6444e12 2092->2093 2094 6444d8b-6444dfb 2092->2094 2093->2077 2111 6444e06 2094->2111 2112 6444dfd 2094->2112 2105 6444d54-6444d70 2109 6444d72 2105->2109 2110 6444d7b-6444d7c 2105->2110 2109->2110 2110->2092 2111->2093 2112->2111 2114->2105 2115->2105
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fdq$XPdq
                                              • API String ID: 0-3173836435
                                              • Opcode ID: 331ad37e17d8a646d066df806bee9760b0a3d2f4fc57c7afa1ad8ac92a226eef
                                              • Instruction ID: 41d942607bb5fc6d6369a4faf1d7185f34548c9562e4fef6bec938cf3c5733e1
                                              • Opcode Fuzzy Hash: 331ad37e17d8a646d066df806bee9760b0a3d2f4fc57c7afa1ad8ac92a226eef
                                              • Instruction Fuzzy Hash: 60518374F002089FEB589FA4C85579EBBF2EF88700F20842AE105EB395DF758D058B51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2397 c2ee04-c2ee09 2398 c2ee0b-c2ee0e 2397->2398 2399 c2ee0f-c2ee9c GlobalMemoryStatusEx 2397->2399 2403 c2eea5-c2eecd 2399->2403 2404 c2ee9e-c2eea4 2399->2404 2404->2403
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 00C2EE8F
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3742891028.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_c20000_adobe.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: f9415c9e38644aa829f8aae96d48357e945d0eb921fa7e53ecd77d1f83dea728
                                              • Instruction ID: f82248431559b7755c0936458fa711190a00397cd1d7a46b8cde52a901b22809
                                              • Opcode Fuzzy Hash: f9415c9e38644aa829f8aae96d48357e945d0eb921fa7e53ecd77d1f83dea728
                                              • Instruction Fuzzy Hash: 3A2134B1C046599FCB10DFAAD44879EBBF4AB08310F12856AD818B7640D378A945CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2407 c2ee28-c2ee9c GlobalMemoryStatusEx 2409 c2eea5-c2eecd 2407->2409 2410 c2ee9e-c2eea4 2407->2410 2410->2409
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 00C2EE8F
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3742891028.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_c20000_adobe.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 9f8cd8fc5ab689157130c05ddd260813e5178852919039f985e379f0e9e9e7de
                                              • Instruction ID: c17eca0639db0a4b76fabbe983144e60a824fbceece63722e9a3a2f61fd90214
                                              • Opcode Fuzzy Hash: 9f8cd8fc5ab689157130c05ddd260813e5178852919039f985e379f0e9e9e7de
                                              • Instruction Fuzzy Hash: 8811EFB1C006699BCB10DFAAD544ADEFBF4AB48320F15856AE818B7640D378A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2556 644db28-644db3f 2557 644db41-644db44 2556->2557 2558 644db46-644db72 2557->2558 2559 644db77-644db7a 2557->2559 2558->2559 2560 644db7c 2559->2560 2561 644db89-644db8c 2559->2561 2566 644db82-644db84 2560->2566 2562 644db8e-644dbaa 2561->2562 2563 644dbaf-644dbb1 2561->2563 2562->2563 2564 644dbb3 2563->2564 2565 644dbb8-644dbbb 2563->2565 2564->2565 2565->2557 2568 644dbbd-644dbcc 2565->2568 2566->2561 2571 644dd51-644dd7b 2568->2571 2572 644dbd2-644dc0b 2568->2572 2575 644dd7c 2571->2575 2579 644dc0d-644dc17 2572->2579 2580 644dc59-644dc7d 2572->2580 2575->2575 2584 644dc2f-644dc57 2579->2584 2585 644dc19-644dc1f 2579->2585 2586 644dc87-644dd4b 2580->2586 2587 644dc7f 2580->2587 2584->2579 2584->2580 2588 644dc21 2585->2588 2589 644dc23-644dc25 2585->2589 2586->2571 2586->2572 2587->2586 2588->2584 2589->2584
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 6ff8524067850132ab3651a1aca6c291b0c68e2c3f293c0cc80d19ca81ff7203
                                              • Instruction ID: ffdacf95eb82cc08b6886fe217f2fb5914c059d967cc07f5130dd95e4f2fd734
                                              • Opcode Fuzzy Hash: 6ff8524067850132ab3651a1aca6c291b0c68e2c3f293c0cc80d19ca81ff7203
                                              • Instruction Fuzzy Hash: 8B418070E106099FEB55EF65C89579FBBB2AF85300F20492AE405E7344DFB49946CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: d6bb4dfc8fddcf3c7b71308e0c8c7d2ffc7976d75130b31642e87fa4d4979068
                                              • Instruction ID: 4714f362cc885825b32a291565c3810ffed5721de10f37619874bbc2e34a4c93
                                              • Opcode Fuzzy Hash: d6bb4dfc8fddcf3c7b71308e0c8c7d2ffc7976d75130b31642e87fa4d4979068
                                              • Instruction Fuzzy Hash: 7741B230E106099FEB65EF65C89169FBBB2FF85300F24492AE405E7350DBB4D842CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 652565d603b8be0bf54a3270bfddaa6bf9032da598f816748889b3bbfe6a3201
                                              • Instruction ID: 4fc8655aedef0dc2c2f8da83dbad3fa7cf1ef7d7291f88b80ed415a3ef2656ff
                                              • Opcode Fuzzy Hash: 652565d603b8be0bf54a3270bfddaa6bf9032da598f816748889b3bbfe6a3201
                                              • Instruction Fuzzy Hash: A231F230B102018FEB5AAB74C5557AF7BE2AF88300F24456AE406DB395DFB9DE06C791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PH_q
                                              • API String ID: 0-2397113591
                                              • Opcode ID: 88120955410e896ea48ccd58a4c6c0fb6af25edb9d304e60840e29d3eb60b72a
                                              • Instruction ID: 992668357848edaa1db91dabaaa271e06d9b0cf2f4854ccdc1954aa9c30511b1
                                              • Opcode Fuzzy Hash: 88120955410e896ea48ccd58a4c6c0fb6af25edb9d304e60840e29d3eb60b72a
                                              • Instruction Fuzzy Hash: 92310430B102059FEB59AB74C55576F77E2BF88300F244429E406DB394DEB9DE06C791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Odq
                                              • API String ID: 0-4257893106
                                              • Opcode ID: f819b883c20217b627d55693550b7c580356a2c68fea65ebd19f345ccd7314bc
                                              • Instruction ID: c6441b9b4cce2fda7dfc19d6424aac36064931aec17cd7c4edf7b3c2d150699f
                                              • Opcode Fuzzy Hash: f819b883c20217b627d55693550b7c580356a2c68fea65ebd19f345ccd7314bc
                                              • Instruction Fuzzy Hash: 20F0F430A64119DFDB14DF94E85A7AE7BF2FF44705F200116E402A7294CB751D01CB80
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 29174ea28bc00abaca434795c27bab700d2acc1985c378900b92e9c31ab523f3
                                              • Instruction ID: 9c1c95aabc57369a9f9ba743aa5d98978c8a0f98960bf5a04d5dc1854e34a427
                                              • Opcode Fuzzy Hash: 29174ea28bc00abaca434795c27bab700d2acc1985c378900b92e9c31ab523f3
                                              • Instruction Fuzzy Hash: E7B18634F002099BFF65EA68D5957AFB7F6EB89310F20882AE405EB395CA34DC45C752
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0f838816a866e26e564ed12779330fcc3ca887309af7274edd1bb7da656ab2b3
                                              • Instruction ID: feab3367c19bb662cc1265bab2c60fa25adcfd475703bb4ca020ee80bd93df2a
                                              • Opcode Fuzzy Hash: 0f838816a866e26e564ed12779330fcc3ca887309af7274edd1bb7da656ab2b3
                                              • Instruction Fuzzy Hash: 2F61B0B1F400114FDF55AA7DC8806AFBADBAFD5224B26443AE80EDB364DE65DD0287C1
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21d658af9d71cb88651b11f9d18f6e08a056c4a581b0a09daebee0c059888c77
                                              • Instruction ID: 917a4db05eb0b138174fa1ecc90864385b609d1532271f0ee347ab98db1a2922
                                              • Opcode Fuzzy Hash: 21d658af9d71cb88651b11f9d18f6e08a056c4a581b0a09daebee0c059888c77
                                              • Instruction Fuzzy Hash: 2C813B30B106098FEF55EFA4D5557AEB7F2EB84304F108529E40AEB798EB70DC468B91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b495749657ce113c8475514cae80a477068bcb86166669fc464b58a46310acdb
                                              • Instruction ID: 28521d7156be09dc0c406af6c8d3cb04543d28f6bf8d480d74df3799b57a79a3
                                              • Opcode Fuzzy Hash: b495749657ce113c8475514cae80a477068bcb86166669fc464b58a46310acdb
                                              • Instruction Fuzzy Hash: 95812B30B106098BEF55EFA5D45579EB7F2EB84304F108529E40AEB398EB74DC46CB91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1a834b3cfab5953c0045268c12644da24eb60ae03812771e15bdbee34d03e67b
                                              • Instruction ID: 0f7d7402fc40bc7bd86859c3161245a784189eb218a7125dc8708965d62a5bf8
                                              • Opcode Fuzzy Hash: 1a834b3cfab5953c0045268c12644da24eb60ae03812771e15bdbee34d03e67b
                                              • Instruction Fuzzy Hash: 2E914D34E106198BDF51DF64C880B9EB7B1FF89310F208696D449BB395DB70AA85CF91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 47f6241483a3fec96c26a57ad328d34212a87868c35f70517cb9f0d91db77887
                                              • Instruction ID: d9cfe2fbeb6c59d701e8a28fff32d0196d823e38ad2cef0e6626969c87d8d9ba
                                              • Opcode Fuzzy Hash: 47f6241483a3fec96c26a57ad328d34212a87868c35f70517cb9f0d91db77887
                                              • Instruction Fuzzy Hash: 6B913034E106198BDF64DF64C880B9EB7B1FF89310F208596D549BB355DB70AA85CF90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a7e6ed2675ba0cf1af340de2a6a7e313ff7ce662ff092cac78fae88249d0b592
                                              • Instruction ID: 17e3e6c271f3263b27351c7dfc2e6a30868652eefe01a0646e4eab3bc985d182
                                              • Opcode Fuzzy Hash: a7e6ed2675ba0cf1af340de2a6a7e313ff7ce662ff092cac78fae88249d0b592
                                              • Instruction Fuzzy Hash: 08712F70A001099FEB54EFA9D991A9EBBF6FF84304F24856AE005EB355DB30ED46CB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0627cdd334d05435fac882951167502a028261bbdaa9630aecd56d9639097ac7
                                              • Instruction ID: c84a6dd7950c2fde118f92b6b9d98afcfe70b26d8eb86c079da282cad5c09c7c
                                              • Opcode Fuzzy Hash: 0627cdd334d05435fac882951167502a028261bbdaa9630aecd56d9639097ac7
                                              • Instruction Fuzzy Hash: FB712F70A001099FDB54EFA9D991A9EBBF6FF88300F24856AE005EB355DB30ED46CB40
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 12d5f9743a275bc13388149b7e5624e28e9c425bff83a38b51757119b994c498
                                              • Instruction ID: 90931145bd3559e8cd2d8cbf65d4fc654979ad4af4ea6ca53df04d2d490ff68a
                                              • Opcode Fuzzy Hash: 12d5f9743a275bc13388149b7e5624e28e9c425bff83a38b51757119b994c498
                                              • Instruction Fuzzy Hash: 4251D331E001059FEF94FB78E4866AEB7B2FB84315F20886AD106D7351DF359849CB81
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 09c9dc67bbe7094d2c926c48e24a8749695f20b7cdb9eb76478fd275306930f3
                                              • Instruction ID: d6856741cce8f7179bf8ca6897c69666f13d0d6ef17cfde3e136ac86d121771f
                                              • Opcode Fuzzy Hash: 09c9dc67bbe7094d2c926c48e24a8749695f20b7cdb9eb76478fd275306930f3
                                              • Instruction Fuzzy Hash: 2B511A30B202419BFFA5666CD855B2F3A56D7C9300F20486BF00AD73E9CA38CC4983A2
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7ab7c2364b7927457abf0b4a7acc2dc380f1ec53a02bf029a0581acae032d36a
                                              • Instruction ID: 3cda705731d79caad48835b1c13998cad5c02ff7bc22f20f71cf1ad371f20bc7
                                              • Opcode Fuzzy Hash: 7ab7c2364b7927457abf0b4a7acc2dc380f1ec53a02bf029a0581acae032d36a
                                              • Instruction Fuzzy Hash: E151E830B202059BFFA5766CD955B2F365AD7C9310F20486AF40AD37E9DA79CC4943A2
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3239fd9c7e35788871bd4f8ec1831186611a35aafe26b0b4190ee0cbb598e3a5
                                              • Instruction ID: 662d747e19becd715b0d56126d2e4d9d4d7b675b7d4d2c26497782941fc0a306
                                              • Opcode Fuzzy Hash: 3239fd9c7e35788871bd4f8ec1831186611a35aafe26b0b4190ee0cbb598e3a5
                                              • Instruction Fuzzy Hash: 28517574E142058FEF7AAA68C58177FBBB2EB45310F24882BD059DB395C635D842CB91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 444c53b27467311b3fd75b9f0e4d0a768aabc17ff8ebbe02595d4d5b6a943353
                                              • Instruction ID: 13ffd190f66b66bcba26ea17f195beb735937cb2ae1435121ad2c6a67a3e6668
                                              • Opcode Fuzzy Hash: 444c53b27467311b3fd75b9f0e4d0a768aabc17ff8ebbe02595d4d5b6a943353
                                              • Instruction Fuzzy Hash: 67412A71E006098FEF65DEA9D882ABFBBF2FB84310F10492AE116D6654D330E955CB90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40d2182b023b5564b8bfb0f52807f7b8548db4797ebd444c050134205fb4de21
                                              • Instruction ID: acee6dd34a5cb72286814f4355a787e2b9e3cda9bf410ec5f356ad99be55c02f
                                              • Opcode Fuzzy Hash: 40d2182b023b5564b8bfb0f52807f7b8548db4797ebd444c050134205fb4de21
                                              • Instruction Fuzzy Hash: 81318F34E106099FDB19DF64D89569FBBF2AF89300F10891AE81AEB354DB71AD42CB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fd301250492501ad0ede4893d992658728b6a1f3526d35340b07e4d72923f40c
                                              • Instruction ID: 23f901f54226c590ef2984b017b2281695f65376d9e0e7a68718cf99b4d0da2f
                                              • Opcode Fuzzy Hash: fd301250492501ad0ede4893d992658728b6a1f3526d35340b07e4d72923f40c
                                              • Instruction Fuzzy Hash: AB31A330E1060A8BDF25EF64D98169EB7B6FF84304F14896AE405FB354EB70A946CB80
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e110e855b87726474b5a278d3aaf181d68517a892a5eabf540470ed21c891714
                                              • Instruction ID: 199a510cb1973ef05a204a4e3a0b485ea016b1da5b32bfdb9756bbae9e39fec1
                                              • Opcode Fuzzy Hash: e110e855b87726474b5a278d3aaf181d68517a892a5eabf540470ed21c891714
                                              • Instruction Fuzzy Hash: 7B318030E106099FDB59DF64D89569FFBF2AF89300F10892AE816EB354DB71AD42CB50
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9454dbf00444a2496e6f2145d56425120ba4d16e7fdc81d947317a276e1e47d0
                                              • Instruction ID: 3f90eb00f8d2b344a0882b3cd6fd7deee8a5ff01af14cde1066792b8838a32bf
                                              • Opcode Fuzzy Hash: 9454dbf00444a2496e6f2145d56425120ba4d16e7fdc81d947317a276e1e47d0
                                              • Instruction Fuzzy Hash: A021A075F156059FEB11DF6AE841AAEBBF6AB48710F108026E905E7354D734DC018B91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f5f2be79645c6439b904707eb8d2c568863af1d82452dbc410b087c4a9f1bad
                                              • Instruction ID: ee258868368a10b356918a7512ed61af8435240f3496613475038c06ed20280c
                                              • Opcode Fuzzy Hash: 1f5f2be79645c6439b904707eb8d2c568863af1d82452dbc410b087c4a9f1bad
                                              • Instruction Fuzzy Hash: D7219F75E056159FEB51EF6AE941AAEBBF2EB48710F108026E905E7344E730DC01CB91
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: af37404f1819acbde1d663bc4aa44cb8ebb47f40fa6818dc4433c76c3d67a282
                                              • Instruction ID: 834fec947a06785683af3c2542806f0bddb1977e33e340a90b78b7b113ffc65c
                                              • Opcode Fuzzy Hash: af37404f1819acbde1d663bc4aa44cb8ebb47f40fa6818dc4433c76c3d67a282
                                              • Instruction Fuzzy Hash: BC219031A006099FDF65DFA9C8826AFBBF2FF85310F10492AD115DB254D370A945CB90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3742031328.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_b5d000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8dd3650c1750cfc004a5236c1fb9e50f958fd1618b502002607264361cfcfbb9
                                              • Instruction ID: 1bbbf74c559e39dee76f7877348dbea0e89581cc8e0fbe5a4e5f2b2af10820f8
                                              • Opcode Fuzzy Hash: 8dd3650c1750cfc004a5236c1fb9e50f958fd1618b502002607264361cfcfbb9
                                              • Instruction Fuzzy Hash: 18212571504204DFDB20DF14D9D0B26BBA5EB84314F28C6EDED094B296C33AD84BCA61
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3742031328.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_b5d000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fac3b894549699959a8ed3f0f36da9f9b7a71a8068f57913d7e58f029f641bf4
                                              • Instruction ID: db697180568fd18741acef1adba325b2c1495b24485adf38aefeedac16418eca
                                              • Opcode Fuzzy Hash: fac3b894549699959a8ed3f0f36da9f9b7a71a8068f57913d7e58f029f641bf4
                                              • Instruction Fuzzy Hash: 2E2151715093C49FD713CB24D994711BF71EB46214F29C5DBD8898F2A7C23A981AC762
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d54b747a9825631468d7a7e528879555d3cd6fb3d57b3afbc5577ef0e8bfd6a
                                              • Instruction ID: 3c582e701a507c9ec283b31d210121a3a79be4fadb05c3f2d8494cdfb0f0ce69
                                              • Opcode Fuzzy Hash: 9d54b747a9825631468d7a7e528879555d3cd6fb3d57b3afbc5577ef0e8bfd6a
                                              • Instruction Fuzzy Hash: 6B21E430F101189FEF44EB69E55169EB7F7EB85310F24842AE405DB344DB31AD428B80
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 89762a3f42b22061bd1ee041f3aec5c1d35d1811e4c10e9a6db8845c05164d3e
                                              • Instruction ID: c46e421d67af42abbaea0ce24abf7245285f5be216feff7bfbfb6842cf41765f
                                              • Opcode Fuzzy Hash: 89762a3f42b22061bd1ee041f3aec5c1d35d1811e4c10e9a6db8845c05164d3e
                                              • Instruction Fuzzy Hash: 8A118171E002289BDB59EF6AD8826DEB7F5EB89710F14856AE009E7344DA31D941CF90
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 704f48dcaf940567d9742cc51fa03b168b4c44cc84007e9c59c791f18ce1717f
                                              • Instruction ID: 74eda981e10048834eacb152316aa8a733ae85190947b76ce28e3b284653534f
                                              • Opcode Fuzzy Hash: 704f48dcaf940567d9742cc51fa03b168b4c44cc84007e9c59c791f18ce1717f
                                              • Instruction Fuzzy Hash: 13110835B144259FEF58A678D8116AF73E6EBC9311F00813AD406EB344EE71CC0287D2
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 83c19d231c9215a39d3664d07fee9f81174ed0df93b7d5f4146819020cb35e1b
                                              • Instruction ID: 63f69d5684cdf77ad4836f5b976097b686273485c7a7657245367ca17fc25e25
                                              • Opcode Fuzzy Hash: 83c19d231c9215a39d3664d07fee9f81174ed0df93b7d5f4146819020cb35e1b
                                              • Instruction Fuzzy Hash: 46012475B004110FEB9AAABC94527EB67D7EBC9721F20842BE10AC7395EE20DC0347A5
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5ff603aa782bbb45baa7d42c7188db2f69c97692b55dcd92157193e1f1947d60
                                              • Instruction ID: 661ae4d0d40d9c9ae9417351a5aaf7e55e02cd6dca3bc31079ac79ae1601448f
                                              • Opcode Fuzzy Hash: 5ff603aa782bbb45baa7d42c7188db2f69c97692b55dcd92157193e1f1947d60
                                              • Instruction Fuzzy Hash: 0401D436B144255BEFA9A668E8117EF77E7EBC9301F04413AD119E7394EE618C0387E2
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 585338f94208d3a65e7b2b7006d6da4d99a0edb422d7aae9b00aea516434174d
                                              • Instruction ID: e3dcb02adb620cf0c5755fabdf090b7332e613c1d9244e154ef6ce5f804ab80b
                                              • Opcode Fuzzy Hash: 585338f94208d3a65e7b2b7006d6da4d99a0edb422d7aae9b00aea516434174d
                                              • Instruction Fuzzy Hash: 7821D3B5D01259AFDB00DF9AD985ADEFBB8FB08314F10812AE918B7310C3746554CFA5
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0d5bda2bfd1ebd4d3a66a6b5a3ee70476b393a49a283ddadc4bd3c1d2f479eca
                                              • Instruction ID: 963df4506513e39615f8c31a730116cb407392863e5dea661410ec835d7bc444
                                              • Opcode Fuzzy Hash: 0d5bda2bfd1ebd4d3a66a6b5a3ee70476b393a49a283ddadc4bd3c1d2f479eca
                                              • Instruction Fuzzy Hash: 3501D471B545004FEBA6EA3CD85279F77D2EB85710F10463AF00ACB758EA21DC438781
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ce237b0a44e20facab05cceba1ba5baa0c44e93df184dbaa9e2ba0097f984873
                                              • Instruction ID: b72a763607852450aba9456856d72ac842ff4c8d538ef9b71094f6f45c64df22
                                              • Opcode Fuzzy Hash: ce237b0a44e20facab05cceba1ba5baa0c44e93df184dbaa9e2ba0097f984873
                                              • Instruction Fuzzy Hash: 8511D0B5D01259AFCB00DF9AD885ACEFBB4FB48710F10812AE918B7200C375A954CFA5
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 43f27df6403cbb36189d1fdbef1bb8283e08382ce2d2bc05388aa0c5fdb7c961
                                              • Instruction ID: 47d008a72f16785a35056045ebe749f2fb83c7ec548b5b24f850a0b1face639a
                                              • Opcode Fuzzy Hash: 43f27df6403cbb36189d1fdbef1bb8283e08382ce2d2bc05388aa0c5fdb7c961
                                              • Instruction Fuzzy Hash: ED01D130B104150BEB69A6ADD452BEFB6DAEBC9721F20843BF10EC7394EE61DC024394
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cf31404bacd36db146039ce3b8f537134010fb82edbb0cb198fb92b2cbf6d2ef
                                              • Instruction ID: 9eae6587778ba7413bb3981e844b09b40512132eb0562c87e73f75b6d0b6e361
                                              • Opcode Fuzzy Hash: cf31404bacd36db146039ce3b8f537134010fb82edbb0cb198fb92b2cbf6d2ef
                                              • Instruction Fuzzy Hash: 51012B79F144514FDB96E6B8A85276F77C6DBC8620F14C42BF00AC7364EE25CC024391
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5aa348c663a37a2c02e0fa61f5d7c7053d418174504e42823ecccde35041b2a7
                                              • Instruction ID: 8e05a11ccecaff4521006a4f2b839e5cfa9227eb415b93957dfe1ec2ee2dcfd5
                                              • Opcode Fuzzy Hash: 5aa348c663a37a2c02e0fa61f5d7c7053d418174504e42823ecccde35041b2a7
                                              • Instruction Fuzzy Hash: C801D138B104100BDBA9E5BCA85276F77D6EBC8620F10843AF10AC7364EE62DC024785
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eaed8da8dbc41af30c289a7e99ff14b2607f981101b5062f3feb5cd66f324ead
                                              • Instruction ID: cc522e25ccbc22248204d1fca20b9f08a077a76a35c53e0c6e0a73a9c56e4c6a
                                              • Opcode Fuzzy Hash: eaed8da8dbc41af30c289a7e99ff14b2607f981101b5062f3feb5cd66f324ead
                                              • Instruction Fuzzy Hash: 15018130B105158FEB65EA78D456B1F73D6EB89B10F10852AF10ACB758EA21DC428780
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f6b53d5e1409f9fa4f210ace22c2c329b03b190f6e808b6e8f5087e0e2d339c8
                                              • Instruction ID: 98dbd2b5fbabd235b8fe2ba513632271c27e9e8e886ef983ada821d4ef6c3bea
                                              • Opcode Fuzzy Hash: f6b53d5e1409f9fa4f210ace22c2c329b03b190f6e808b6e8f5087e0e2d339c8
                                              • Instruction Fuzzy Hash: 65E0D871E181485BFF61DAB0CB5635B3764EB03214F2049F7D804D7202D179CE01C780
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 94d124b261bd5f6de9eb3ac609dd1d7fbe9fc6a93b35130c34e1e88ce4c34594
                                              • Instruction ID: c64c60c0240e4165ae3bf007827a1c26ce1f96cdfb51181064f6d68c0cd7a3de
                                              • Opcode Fuzzy Hash: 94d124b261bd5f6de9eb3ac609dd1d7fbe9fc6a93b35130c34e1e88ce4c34594
                                              • Instruction Fuzzy Hash: 66E08C70E1020CABFF60EAA0CA1675B73ACE702244F2188A6D408C7201E1B6CA018380
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-698649689
                                              • Opcode ID: 24aa154c7d76876cf4f33a281503ae9a4086541180018847f6b4d56bc8173dcc
                                              • Instruction ID: 38377cd2c758dd5f94f991021cf2f97afe80c89983fc38e0a9e66317031822fb
                                              • Opcode Fuzzy Hash: 24aa154c7d76876cf4f33a281503ae9a4086541180018847f6b4d56bc8173dcc
                                              • Instruction Fuzzy Hash: F9122F30E00619CFEB65EF65C955A9EB7F2BF88304F20856AD409AB365DB309D46CF81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-2216122830
                                              • Opcode ID: 5fe5b234ce038dc00cf9631a9ef70b58b8bf6d83a9b84b658da570bed5f11835
                                              • Instruction ID: e0f81099386576197c011ffde68a35752edebd34c896e815ae87ac86c8b2e186
                                              • Opcode Fuzzy Hash: 5fe5b234ce038dc00cf9631a9ef70b58b8bf6d83a9b84b658da570bed5f11835
                                              • Instruction Fuzzy Hash: 90918230A44209DFEBA9EF65D586B6F77F2BF44300F20852AE401AB359DB749D85CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .5wq$$_q$$_q$$_q$$_q$$_q$$_q
                                              • API String ID: 0-3129995876
                                              • Opcode ID: db94f88c4b805e002f9a8266372b68d4c36d946365b09caaeea5158385b7dfcb
                                              • Instruction ID: c00025ff81b1496496408f6231fbd29bcd91eb07800c39db6b4bf9ab9e3f0847
                                              • Opcode Fuzzy Hash: db94f88c4b805e002f9a8266372b68d4c36d946365b09caaeea5158385b7dfcb
                                              • Instruction Fuzzy Hash: 88F15E30B05605DFEB59EF68D595A6EBBB3BF84300F24856AE4059B769CF349C42CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: f2eee5436ecfe44f6739f4abbfde3dc246c2470e8e72509559f4220e0370d3d0
                                              • Instruction ID: 14e86d84f57fd2911961fb6cce2cc4fd25162828a3eef5c23a079b65fdcd0327
                                              • Opcode Fuzzy Hash: f2eee5436ecfe44f6739f4abbfde3dc246c2470e8e72509559f4220e0370d3d0
                                              • Instruction Fuzzy Hash: 6EB16B30E10219CFEB69EF68D99566EB7F2BF84300F24846AD4059B359DB74DC82CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $_q$$_q$$_q$$_q
                                              • API String ID: 0-1171383116
                                              • Opcode ID: 6fd1c04cfabb6f24c84a60ca6c23d242afc17233f2d44dd02342af382745ab55
                                              • Instruction ID: 63e211d9b72ffd939e3081cc37f4846b3c75b1712ac7a5a81635a573a55dd273
                                              • Opcode Fuzzy Hash: 6fd1c04cfabb6f24c84a60ca6c23d242afc17233f2d44dd02342af382745ab55
                                              • Instruction Fuzzy Hash: AF51A470A512058FEF66EB64D4826AEB7F3FB48301F24856BE8159B359DB30DC82CB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000010.00000002.3760133056.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_16_2_6440000_adobe.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: LR_q$LR_q$$_q$$_q
                                              • API String ID: 0-2912794808
                                              • Opcode ID: 72caef63f66ddb7a281986c8180b2b278cd0eaa9804f7c8a943e4b2a14f2ab4c
                                              • Instruction ID: 4910f2333b0bfd05ae3ff0535201664512c0986340663b16d500f2b5a4d99093
                                              • Opcode Fuzzy Hash: 72caef63f66ddb7a281986c8180b2b278cd0eaa9804f7c8a943e4b2a14f2ab4c
                                              • Instruction Fuzzy Hash: E151B430B006029FEB59EB24C992B6A77F6FF84700F14856AE4159F3A9DB71EC05CB91