Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Statement JULY #U007e SEP 2024 USD 19,055.00.exe

Overview

General Information

Sample name:Statement JULY #U007e SEP 2024 USD 19,055.00.exe
renamed because original name is a hash value
Original sample name:Statement JULY ~ SEP 2024 USD 19,055.00.exe
Analysis ID:1545102
MD5:a528109e5486419098353578bd5e662a
SHA1:597c6324eb2796a81f13d91cd12124734790210c
SHA256:c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c
Tags:exeuser-koluke
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Contains functionality to register a low level keyboard hook
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • adobe.exe (PID: 7916 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: A528109E5486419098353578BD5E662A)
    • adobe.exe (PID: 7960 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: A528109E5486419098353578BD5E662A)
    • adobe.exe (PID: 7968 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: A528109E5486419098353578BD5E662A)
  • adobe.exe (PID: 7292 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: A528109E5486419098353578BD5E662A)
    • adobe.exe (PID: 7320 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: A528109E5486419098353578BD5E662A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.4106544369.000000000302C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.1890171254.000000000321C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000A.00000002.4105974724.000000000345C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 16 entries
              SourceRuleDescriptionAuthorStrings
              7.2.adobe.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                7.2.adobe.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  7.2.adobe.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x33f62:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x33fd4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3405e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x340f0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x3415a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x341cc:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34262:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x342f2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  7.2.adobe.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x312ad:$s2: GetPrivateProfileString
                  • 0x30959:$s3: get_OSFullName
                  • 0x31fab:$s5: remove_Key
                  • 0x32171:$s5: remove_Key
                  • 0x33030:$s6: FtpWebRequest
                  • 0x33f44:$s7: logins
                  • 0x344b6:$s7: logins
                  • 0x37199:$s7: logins
                  • 0x37279:$s7: logins
                  • 0x38bca:$s7: logins
                  • 0x37e13:$s9: 1.85 (Hash, version 2, native byte-order)
                  0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 15 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe, ProcessId: 7568, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-30T05:28:58.978391+010020299271A Network Trojan was detected192.168.2.449733213.189.52.18121TCP
                    2024-10-30T05:29:13.059573+010020299271A Network Trojan was detected192.168.2.449739213.189.52.18121TCP
                    2024-10-30T05:29:22.514824+010020299271A Network Trojan was detected192.168.2.449748213.189.52.18121TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-30T05:28:59.734351+010028555421A Network Trojan was detected192.168.2.449735213.189.52.18163514TCP
                    2024-10-30T05:28:59.740198+010028555421A Network Trojan was detected192.168.2.449735213.189.52.18163514TCP
                    2024-10-30T05:29:13.819998+010028555421A Network Trojan was detected192.168.2.449742213.189.52.18164246TCP
                    2024-10-30T05:29:13.826345+010028555421A Network Trojan was detected192.168.2.449742213.189.52.18164246TCP
                    2024-10-30T05:29:23.264162+010028555421A Network Trojan was detected192.168.2.449749213.189.52.18164747TCP
                    2024-10-30T05:29:23.270198+010028555421A Network Trojan was detected192.168.2.449749213.189.52.18164747TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 7.2.adobe.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeReversingLabs: Detection: 57%
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeReversingLabs: Detection: 57%
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeVirustotal: Detection: 65%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJoe Sandbox ML: detected
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeJoe Sandbox ML: detected
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49747 version: TLS 1.2
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49735 -> 213.189.52.181:63514
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49742 -> 213.189.52.181:64246
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.4:49748 -> 213.189.52.181:21
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.4:49733 -> 213.189.52.181:21
                    Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49749 -> 213.189.52.181:64747
                    Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.4:49739 -> 213.189.52.181:21
                    Source: global trafficTCP traffic: 213.189.52.181 ports 64246,63514,64747,1,2,63829,21
                    Source: global trafficTCP traffic: 192.168.2.4:49735 -> 213.189.52.181:63514
                    Source: Joe Sandbox ViewIP Address: 213.189.52.181 213.189.52.181
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: ECO-ATMAN-PLECO-ATMAN-PL ECO-ATMAN-PLECO-ATMAN-PL
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.4:49733 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:28. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:28. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:28. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                    Source: adobe.exe, 00000005.00000002.1799930314.00000000011A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wkH
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.000000000302C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.000000000321C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.000000000345C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: adobe.exe, 00000005.00000002.1801839278.0000000007592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1658281450.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1654989039.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1658168989.0000000005B3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1654989039.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com~
                    Source: adobe.exe, 00000009.00000002.1892432130.0000000006F62000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000009.00000002.1889045993.0000000001357000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: adobe.exe, 00000009.00000002.1892432130.0000000006F62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: adobe.exe, 00000009.00000002.1892047750.0000000005E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.mic
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49747 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E29AE8 SetWindowsHookExA 0000000D,00000000,?,?,?,?,?,?,?,?,?,06E2A130,00000000,0000000010_2_06E29AE8
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 0_2_0098DED40_2_0098DED4
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 0_2_04B900060_2_04B90006
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 0_2_04B900400_2_04B90040
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_015EB3973_2_015EB397
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_015E4A903_2_015E4A90
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_015E3E783_2_015E3E78
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_015EEEA83_2_015EEEA8
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_015E41C03_2_015E41C0
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06AE28A83_2_06AE28A8
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06AE289A3_2_06AE289A
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B4C0F83_2_06B4C0F8
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B430183_2_06B43018
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B461603_2_06B46160
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B451503_2_06B45150
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B4AD903_2_06B4AD90
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B478F83_2_06B478F8
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B472183_2_06B47218
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B4E3283_2_06B4E328
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B423403_2_06B42340
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B400063_2_06B40006
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B400403_2_06B40040
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06B4584F3_2_06B4584F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_0537DED45_2_0537DED4
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_054900405_2_05490040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_054900065_2_05490006
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_02FF4A907_2_02FF4A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_02FF3E787_2_02FF3E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_02FFAE687_2_02FFAE68
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_02FF41C07_2_02FF41C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D62EA07_2_06D62EA0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D665607_2_06D66560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D6B1A87_2_06D6B1A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D676187_2_06D67618
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D65C607_2_06D65C60
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D600407_2_06D60040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D6003F7_2_06D6003F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 9_2_02C0DED49_2_02C0DED4
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031EA5D010_2_031EA5D0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031E4A9010_2_031E4A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031EE8A810_2_031EE8A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031E3E7810_2_031E3E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031EADA810_2_031EADA8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031E41C010_2_031E41C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E2173410_2_06E21734
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E2246310_2_06E22463
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E2246810_2_06E22468
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E2EF6010_2_06E2EF60
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E2315E10_2_06E2315E
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3275010_2_06E32750
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3656010_2_06E36560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3555010_2_06E35550
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3C0F810_2_06E3C0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3B1A810_2_06E3B1A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E37CF810_2_06E37CF8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3761810_2_06E37618
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3E32810_2_06E3E328
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3004010_2_06E30040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E35C6010_2_06E35C60
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_06E3001F10_2_06E3001F
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSoftwareGame.dll: vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655463889.00000000027C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000000.1650426459.0000000000316000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJanioa.exe. vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1654648982.00000000009BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4104071985.00000000010F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeBinary or memory string: OriginalFilenameJanioa.exe. vs Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: adobe.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.4da0000.3.raw.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.4da0000.3.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/2@2/2
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: NULL
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeReversingLabs: Detection: 57%
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeVirustotal: Detection: 65%
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile read: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, EvenMoreWhimsicalFunctions.cs.Net Code: Polan System.AppDomain.Load(byte[])
                    Source: adobe.exe.3.dr, EvenMoreWhimsicalFunctions.cs.Net Code: Polan System.AppDomain.Load(byte[])
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: 0xEBF8C820 [Wed Jun 15 04:18:40 2095 UTC]
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 0_2_0098E72A push esp; retf 0_2_0098E731
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 0_2_0098EEDA push eax; iretd 0_2_0098EEE1
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 0_2_04B96CD0 push eax; ret 0_2_04B96CF9
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06AE9F31 pushfd ; iretd 3_2_06AE9F32
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06AEBAB0 push es; ret 3_2_06AEBAC0
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeCode function: 3_2_06AE7952 push es; ret 3_2_06AE7960
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_0537E72A push esp; retf 5_2_0537E731
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_0537EEDA push eax; iretd 5_2_0537EEE1
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 5_2_05496CD0 push eax; ret 5_2_05496CF9
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D67FE3 push ebp; ret 7_2_06D67FEA
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D65741 push 1405C32Fh; ret 7_2_06D65855
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D67CF8 push esi; ret 7_2_06D67FE2
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D67CE9 push edx; ret 7_2_06D67CEA
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D6E312 push ss; iretd 7_2_06D6E31A
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D641B3 push ss; ret 7_2_06D641BA
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_06D641B1 push ss; ret 7_2_06D641B2
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 9_2_02C047B1 push ebp; ret 9_2_02C04815
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 9_2_02C0E72A push esp; retf 9_2_02C0E731
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 9_2_02C0EEDA push eax; iretd 9_2_02C0EEE1
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 10_2_031E0C55 push edi; retf 10_2_031E0C7A
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exeStatic PE information: section name: .text entropy: 7.447223065937859
                    Source: adobe.exe.3.drStatic PE information: section name: .text entropy: 7.447223065937859
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.4da0000.3.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.4da0000.3.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: \statement july #u007e sep 2024 usd 19,055.00.exe
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: \statement july #u007e sep 2024 usd 19,055.00.exe
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: \statement july #u007e sep 2024 usd 19,055.00.exe
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: \statement july #u007e sep 2024 usd 19,055.00.exeJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: \statement july #u007e sep 2024 usd 19,055.00.exeJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: \statement july #u007e sep 2024 usd 19,055.00.exeJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: 980000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: 27C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: CB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: 15E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: 4FB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2C10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1600000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 31A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3030000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1260000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2CC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 12B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 31A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 33E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3210000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599125Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598900Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598582Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598233Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597577Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596588Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596480Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596373Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596248Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596134Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596031Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595922Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595593Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595484Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595375Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595265Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595149Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595047Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594922Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594812Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594703Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594592Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599764Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599650Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599433Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599309Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599168Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599061Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598952Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598842Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598624Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598515Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598296Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598187Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598075Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597968Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597859Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597749Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597640Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597421Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597309Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597202Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596983Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596874Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596201Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595862Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595749Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595634Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595530Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595421Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595202Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594874Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594765Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593999Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593852Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599124Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598249Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598139Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597921Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597801Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597555Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597445Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597336Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597199Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596765Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595119Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594858Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594727Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594591Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594436Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594322Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593984Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWindow / User API: threadDelayed 1999Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWindow / User API: threadDelayed 7849Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 6119Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 3721Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 3458Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 6382Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7772Thread sleep count: 1999 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7772Thread sleep count: 7849 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -599015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598900s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598582s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598233s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -598015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597577s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -597031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596588s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596480s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596373s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596248s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596134s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -596031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595149s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -595047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -594922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -594812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -594703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe TID: 7764Thread sleep time: -594592s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep count: 41 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -37815825351104557s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8088Thread sleep count: 6119 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599764s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599650s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8088Thread sleep count: 3721 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599546s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599433s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599309s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599168s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -599061s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598952s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598842s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598734s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598624s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598515s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598406s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598296s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598187s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -598075s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597968s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597859s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597749s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597640s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597531s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597421s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597309s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597202s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -597093s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -596983s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -596874s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -596201s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -596093s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595984s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595862s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595749s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595634s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595530s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595421s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595312s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595202s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -595093s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594984s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594874s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594765s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594656s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594546s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594437s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594328s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -594109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -593999s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 8084Thread sleep time: -593852s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep count: 35 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2568Thread sleep count: 3458 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2568Thread sleep count: 6382 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599343s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599124s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -599015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598796s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598468s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598249s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598139s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -598031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597921s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597801s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597672s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597555s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597445s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597336s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597199s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -597093s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596984s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596875s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596765s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596656s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596546s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596437s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596328s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -596000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595343s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595119s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -595000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594858s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594727s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594591s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594436s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594322s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594203s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -594093s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1904Thread sleep time: -593984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599125Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598900Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598582Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598233Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597797Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597577Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596588Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596480Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596373Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596248Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596134Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 596031Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595922Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595593Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595484Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595375Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595265Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595149Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 595047Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594922Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594812Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594703Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeThread delayed: delay time: 594592Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599764Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599650Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599433Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599309Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599168Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599061Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598952Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598842Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598624Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598515Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598296Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598187Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598075Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597968Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597859Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597749Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597640Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597421Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597309Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597202Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596983Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596874Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596201Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595862Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595749Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595634Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595530Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595421Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595202Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594874Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594765Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593999Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593852Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599124Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598249Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598139Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597921Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597801Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597672Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597555Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597445Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597336Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597199Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596765Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595119Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594858Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594727Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594591Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594436Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594322Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594093Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 593984Jump to behavior
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4104320850.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
                    Source: adobe.exe, 00000007.00000002.1888089380.000000000138D000.00000004.00000020.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4104072984.000000000143F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, ProcessorArchitecture.csReference to suspicious API methods: Microsoft.Build.Shared.NativeMethods.LoadLibrary("kernel32.dll")
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, ProcessorArchitecture.csReference to suspicious API methods: Microsoft.Build.Shared.NativeMethods.GetProcAddress(intPtr, "IsWow64Process")
                    Source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, WzE.csReference to suspicious API methods: GXmc.OpenProcess(jHxuhfTis5.DuplicateHandle, bInheritHandle: true, (uint)bTRx6NbOE.ProcessID)
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeMemory written: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeProcess created: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe "C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q9<b>[ Program Manager]</b> (30/10/2024 05:48:01)<br>{Win}rTHcqX
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q8<b>[ Program Manager]</b> (30/10/2024 05:48:01)<br>{Win}THcqX
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q><b>[ Program Manager]</b> (30/10/2024 05:48:01)<br>{Win}r{Win}THcqX
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q3<b>[ Program Manager]</b> (30/10/2024 05:48:01)<br>
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003046000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 11/12/2024 22:03:39<br>User Name: user<br>Computer Name: 675052<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 173.254.250.78<br><hr><b>[ Program Manager]</b> (30/10/2024 05:48:01)<br>{Win}r{Win}r</html>
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qT
                    Source: Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000003032000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q?<b>[ Program Manager]</b> (30/10/2024 05:48:01)<br>{Win}r{Win}rTHcqX
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.4106544369.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1890171254.000000000321C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.4105974724.000000000345C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1890171254.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4106544369.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.4105974724.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Statement JULY #U007e SEP 2024 USD 19,055.00.exe PID: 7524, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Statement JULY #U007e SEP 2024 USD 19,055.00.exe PID: 7568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7320, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1890171254.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4106544369.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.4105974724.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Statement JULY #U007e SEP 2024 USD 19,055.00.exe PID: 7524, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Statement JULY #U007e SEP 2024 USD 19,055.00.exe PID: 7568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7320, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 7.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.384d5b0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.3941c80.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Statement JULY #U007e SEP 2024 USD 19,055.00.exe.380b580.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.4106544369.000000000302C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1890171254.000000000321C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.4105974724.000000000345C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1890171254.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4106544369.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.4105974724.0000000003431000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Statement JULY #U007e SEP 2024 USD 19,055.00.exe PID: 7524, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Statement JULY #U007e SEP 2024 USD 19,055.00.exe PID: 7568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7320, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    Registry Run Keys / Startup Folder
                    112
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    31
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model31
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets2
                    Process Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                    Masquerading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                    Virtualization/Sandbox Evasion
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Hidden Files and Directories
                    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1545102 Sample: Statement JULY #U007e SEP 2... Startdate: 30/10/2024 Architecture: WINDOWS Score: 100 33 s4.serv00.com 2->33 35 api.ipify.org 2->35 55 Suricata IDS alerts for network traffic 2->55 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 9 other signatures 2->61 7 Statement JULY #U007e SEP 2024 USD 19,055.00.exe 2 2->7         started        10 adobe.exe 2 2->10         started        12 adobe.exe 2 2->12         started        signatures3 process4 signatures5 63 Injects a PE file into a foreign processes 7->63 14 Statement JULY #U007e SEP 2024 USD 19,055.00.exe 16 4 7->14         started        19 Statement JULY #U007e SEP 2024 USD 19,055.00.exe 7->19         started        21 Statement JULY #U007e SEP 2024 USD 19,055.00.exe 7->21         started        65 Multi AV Scanner detection for dropped file 10->65 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->67 69 Machine Learning detection for dropped file 10->69 71 Contains functionality to register a low level keyboard hook 10->71 23 adobe.exe 14 2 10->23         started        25 adobe.exe 10->25         started        27 adobe.exe 2 12->27         started        process6 dnsIp7 37 s4.serv00.com 213.189.52.181, 21, 49733, 49735 ECO-ATMAN-PLECO-ATMAN-PL Poland 14->37 39 api.ipify.org 172.67.74.152, 443, 49730, 49738 CLOUDFLARENETUS United States 14->39 29 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 14->29 dropped 31 C:\Users\user\...\adobe.exe:Zone.Identifier, ASCII 14->31 dropped 41 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->41 43 Tries to steal Mail credentials (via file / registry access) 14->43 45 Drops executable to a common third party application directory 14->45 47 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->47 49 Tries to harvest and steal ftp login credentials 27->49 51 Tries to harvest and steal browser information (history, passwords, etc) 27->51 53 Installs a global keyboard hook 27->53 file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Statement JULY #U007e SEP 2024 USD 19,055.00.exe58%ReversingLabsWin32.Trojan.GenSteal
                    Statement JULY #U007e SEP 2024 USD 19,055.00.exe66%VirustotalBrowse
                    Statement JULY #U007e SEP 2024 USD 19,055.00.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe58%ReversingLabsWin32.Trojan.GenSteal
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    api.ipify.org0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    s4.serv00.com
                    213.189.52.181
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.typography.netDadobe.exe, 00000009.00000002.1892432130.0000000006F62000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.orgStatement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://account.dyn.com/Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://docs.micadobe.exe, 00000009.00000002.1892047750.0000000005E50000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://www.sajatypeworks.com~Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1654989039.0000000000DA7000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://www.tiro.comadobe.exe, 00000009.00000002.1892432130.0000000006F62000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000009.00000002.1889045993.0000000001357000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fonts.comadobe.exe, 00000005.00000002.1801839278.0000000007592000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://en.wkHadobe.exe, 00000005.00000002.1799930314.00000000011A7000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://api.ipify.org/tStatement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameStatement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.00000000031A1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.00000000033EC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://s4.serv00.comStatement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000003.00000002.4106544369.000000000302C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000007.00000002.1890171254.000000000321C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 0000000A.00000002.4105974724.000000000345C000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.sajatypeworks.comStatement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1658281450.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1654989039.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, Statement JULY #U007e SEP 2024 USD 19,055.00.exe, 00000000.00000002.1658168989.0000000005B3B000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              213.189.52.181
                              s4.serv00.comPoland
                              57367ECO-ATMAN-PLECO-ATMAN-PLtrue
                              172.67.74.152
                              api.ipify.orgUnited States
                              13335CLOUDFLARENETUSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1545102
                              Start date and time:2024-10-30 05:28:04 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 54s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                              renamed because original name is a hash value
                              Original Sample Name:Statement JULY ~ SEP 2024 USD 19,055.00.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@15/2@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 262
                              • Number of non-executed functions: 25
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              00:28:55API Interceptor8169608x Sleep call for process: Statement JULY #U007e SEP 2024 USD 19,055.00.exe modified
                              00:29:09API Interceptor6740986x Sleep call for process: adobe.exe modified
                              04:28:58AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                              04:29:07AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              213.189.52.181Arrival Notice - BL 713410220035.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                BL NBNSA240600050.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                      Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                        172.67.74.15267065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • api.ipify.org/
                                        Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                                        • api.ipify.org/
                                        y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                        • api.ipify.org/
                                        file.exeGet hashmaliciousRDPWrap ToolBrowse
                                        • api.ipify.org/
                                        Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                        • api.ipify.org/
                                        2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        s4.serv00.comArrival Notice - BL 713410220035.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                        • 213.189.52.181
                                        BL NBNSA240600050.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 213.189.52.181
                                        DC74433Y7889021.xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 213.189.52.181
                                        PRE ALERT Docs_PONBOM01577.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                        • 213.189.52.181
                                        Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                        • 213.189.52.181
                                        api.ipify.orgEVER ABILITY V66 PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.13.205
                                        MV. NORDRHONE VSL's PARTICULARS.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.13.205
                                        MUM - VESSEL'S PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.13.205
                                        INVOICE.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.74.152
                                        Bill_Of _Lading.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        Shipping documents 00029399400059.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        z20SWIFT_MT103_Payment_552016_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.12.205
                                        file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                        • 172.67.74.152
                                        Remittance Receipt.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        SecuriteInfo.com.Win64.Malware-gen.4046.15809.exeGet hashmaliciousEICARBrowse
                                        • 104.26.13.205
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ECO-ATMAN-PLECO-ATMAN-PL9zldYT23H2.elfGet hashmaliciousMirai, GafgytBrowse
                                        • 31.186.82.2
                                        RicevutaPagamento_115538206.datGet hashmaliciousUnknownBrowse
                                        • 128.204.223.111
                                        http://bdvenlineabanven.serv00.net/Get hashmaliciousUnknownBrowse
                                        • 85.194.246.69
                                        http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                        • 85.194.246.69
                                        http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                        • 85.194.246.69
                                        http://ahksoch.serv00.net/x92gamy6wh/Get hashmaliciousHTMLPhisherBrowse
                                        • 128.204.218.63
                                        http://intesa-it.serv00.net/it/conto/Get hashmaliciousUnknownBrowse
                                        • 85.194.246.69
                                        https://spofity.serv00.net/spotify/auth/login.phpGet hashmaliciousUnknownBrowse
                                        • 128.204.223.117
                                        http://www.viundodal.serv00.net/Get hashmaliciousUnknownBrowse
                                        • 128.204.218.63
                                        http://nickle-support.serv00.net/redirect.htmlGet hashmaliciousUnknownBrowse
                                        • 128.204.218.63
                                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                        • 188.114.96.3
                                        0JLWNg4Sz1.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • 188.114.96.3
                                        XhYAqi0wi5.exeGet hashmaliciousStealcBrowse
                                        • 172.67.179.207
                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                        • 188.114.97.3
                                        Purchase_Order_pdf.exeGet hashmaliciousFormBookBrowse
                                        • 188.114.97.3
                                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                        • 188.114.97.3
                                        file.exeGet hashmaliciousStealc, VidarBrowse
                                        • 172.64.41.3
                                        z1MRforsteamDRUM-A1_pdf.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        https://eot.lps-china.com/f/a/pQ-JA2nitAQtMB92xwUcGg~~/AAAHUQA~/RgRpAabzP4QTAWh0dHBzOi8vYmVyZW5pY2UuZW9tYWlsOC5jb20vdW5zdWJzY3JpYmU_ZXA9MiZsPTVlNmE0MDU2LWVhZTMtMTFlZS1hNzNjLWM1NDU2ZDI0OGQ3OCZsYz0zMmVlMmQ3Yy0zMjA4LTExZWYtYTFiZS1lYjMwYzAwY2FlZDgmcD05NDM1NjNkYy05Mzc2LTExZWYtYTdkMi00NTk0MDQ5OWMzNTYmcHQ9Y2FtcGFpZ24mcHY9NCZzcGE9MTczMDA5MzQ0NCZ0PTE3MzAwOTM1NTUmcz1mNWE2NDYwZWE1NTFlYzYxZDFiNjJhZTBhNTI2NGFhNjdmYWMxN2I1MzRkNWI4MzdhNTA0MDAwM2ZhNmZmMGUwVwVzcGNldUIKZw7zIR9n2KUgilIeZ2VtbWEubG9yZW56b0BkdWJhaWhvbGRpbmcuY29tWAQAAAL5Get hashmaliciousUnknownBrowse
                                        • 172.67.132.160
                                        Uviv7rEtnt.exeGet hashmaliciousStealc, VidarBrowse
                                        • 172.67.179.207
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousStealc, VidarBrowse
                                        • 172.67.74.152
                                        Ndnownts.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 172.67.74.152
                                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                        • 172.67.74.152
                                        https://docs.google.com/uc?export=download&id=1rG5XITnDsiVQCEMAfg1Ex3pDcYxrlv0NGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.74.152
                                        EVER ABILITY V66 PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.74.152
                                        MV. NORDRHONE VSL's PARTICULARS.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.74.152
                                        MUM - VESSEL'S PARTICULARS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.74.152
                                        https://cp9856.chelokipotlester.icu/Bin/support.Client.exe?h=cp3back96.site&p=8041&k=BgIAAACkAABSU0ExAAgAAAEAAQB9zMUOcnsRaC12buOM5jB%2F0aQdWfMpUKDaWi13yRXoM16W00nLl4p0ZtEhANoxvmcw0wWFEBncKj1h1Sizr06d2epn5Y1la%2FZuAUNQxVB6zV6MkV%2FQ3PQ8O4IKEUzM%2B1uTT6bVi8cjhVOM7wlYYJcudQAB6Dwlh4JaUc5YEBvhT8MaZnAIYPqnbmxNwUw1RDlaRh5YJbZGPTJPIJpusdEO4D%2FCUtP6CZ%2F6LBYCi1k6apr4NFJdoCsgYMmz0ueWApW6fnSWePa0E3G6vxJQsjXUZXU7nn2pC9y84o5L0uqvKTZ239UPNomZv8wnSyaubzULL%2B48fuhT%2FYi9ukTBmorR&s=5999b697-2fc8-47f6-a1dc-4d0d274c363e&i=Untitled%20Session&e=Support&y=Guest&r=Get hashmaliciousScreenConnect ToolBrowse
                                        • 172.67.74.152
                                        FW Complete with Docusign Remittance Advice .pdf.emlGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        No context
                                        Process:C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):471040
                                        Entropy (8bit):7.432986539935041
                                        Encrypted:false
                                        SSDEEP:12288:5kbUgoa8QQGqCwwrgSsfCzSr5Kh4gC1ki0ngHU:5fg7AGewUizSFKCgC14nB
                                        MD5:A528109E5486419098353578BD5E662A
                                        SHA1:597C6324EB2796A81F13D91CD12124734790210C
                                        SHA-256:C5210DCAE2936CA5424A1224DDC519BDED76064115A95E58C722B69E96AC344C
                                        SHA-512:6E4063AD6BEB7F48539CC4590F8F61307CB3AD2415FE31D57919FBCC7E650EC9669108C2E55C474D09643064D550AAB6C2A903AE284E2A7A2C46B2258E166B73
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 58%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... .................0..&...........E... ...`....@.. ....................................`.................................PE..K....`............................................................................... ............... ..H............text....%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc..............................@..B.................E......H..........\............5...N.......................................... ...............................................%.*.?.@.$.(.).;.'...".(R....*.sS........*.s/........*2r...p.(...+*2.{....o_...*.(.........*.sJ........*2r...p.(...+*2.{....o_...*.se........*2r...p.(...+*2.{....o_...*.s.........*2r7..p.(...+*2.{....o_...*&.(R.....*".......*".(m....*Vs....(n...t.........*...sx...}......(y..... ... ....sz...({.....r...po|....*j.(}.....(~....s....(.....*Z......(....(....(....
                                        Process:C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.432986539935041
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Windows Screen Saver (13104/52) 0.07%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        File name:Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        File size:471'040 bytes
                                        MD5:a528109e5486419098353578bd5e662a
                                        SHA1:597c6324eb2796a81f13d91cd12124734790210c
                                        SHA256:c5210dcae2936ca5424a1224ddc519bded76064115a95e58c722b69e96ac344c
                                        SHA512:6e4063ad6beb7f48539cc4590f8f61307cb3ad2415fe31d57919fbcc7e650ec9669108c2e55c474d09643064d550aab6c2a903ae284e2a7a2c46b2258e166b73
                                        SSDEEP:12288:5kbUgoa8QQGqCwwrgSsfCzSr5Kh4gC1ki0ngHU:5fg7AGewUizSFKCgC14nB
                                        TLSH:62A4CF24A7EC0722F6FF47BAF8B440029BB5F563EA57D39D699462F90422740C912B37
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... .................0..&...........E... ...`....@.. ....................................`................................
                                        Icon Hash:90cececece8e8eb0
                                        Entrypoint:0x47459e
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0xEBF8C820 [Wed Jun 15 04:18:40 2095 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x745500x4b.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x596.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x780000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x725a40x72600a79d9fd3decd3592ac40f9c01a22cfccFalse0.7419249487704918data7.447223065937859IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x760000x5960x600d81d02459aad624e4c789650ba479e0dFalse0.4127604166666667data4.033174554489017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x780000xc0x200c6f96c28013d066d7858ebe5f076c1f7False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0x760a00x30cdata0.4269230769230769
                                        RT_MANIFEST0x763ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-30T05:28:58.978391+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.449733213.189.52.18121TCP
                                        2024-10-30T05:28:59.734351+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449735213.189.52.18163514TCP
                                        2024-10-30T05:28:59.740198+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449735213.189.52.18163514TCP
                                        2024-10-30T05:29:13.059573+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.449739213.189.52.18121TCP
                                        2024-10-30T05:29:13.819998+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449742213.189.52.18164246TCP
                                        2024-10-30T05:29:13.826345+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449742213.189.52.18164246TCP
                                        2024-10-30T05:29:22.514824+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.449748213.189.52.18121TCP
                                        2024-10-30T05:29:23.264162+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449749213.189.52.18164747TCP
                                        2024-10-30T05:29:23.270198+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449749213.189.52.18164747TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 30, 2024 05:28:54.980757952 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:54.980817080 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:54.980882883 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:54.992459059 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:54.992513895 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.606791973 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.606874943 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:55.610490084 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:55.610505104 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.610713959 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.657433033 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:55.663422108 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:55.711324930 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.845263004 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.845340014 CET44349730172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:28:55.845453978 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:55.854125977 CET49730443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:28:56.563148975 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:56.568541050 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:56.568648100 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:57.324274063 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:57.324632883 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:57.330034971 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:57.585655928 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:57.586002111 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:57.591492891 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:57.916445017 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:57.921746016 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:57.927292109 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.183074951 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.185724020 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:58.191337109 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.447448015 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.447632074 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:58.453613997 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.709135056 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.709364891 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:58.715336084 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.971010923 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.971776009 CET4973563514192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:58.978179932 CET6351449735213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:58.978271961 CET4973563514192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:58.978390932 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:58.983769894 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:59.733849049 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:59.734350920 CET4973563514192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:59.734350920 CET4973563514192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:59.739787102 CET6351449735213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:59.740139961 CET6351449735213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:28:59.740197897 CET4973563514192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:59.782622099 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:28:59.997594118 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:00.048086882 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:09.355942011 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:09.355993986 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:09.356075048 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:09.359735966 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:09.359745026 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:09.968301058 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:09.968405008 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:09.970379114 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:09.970387936 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:09.970630884 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:10.016882896 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:10.046175003 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:10.087343931 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:10.221271992 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:10.221343040 CET44349738172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:10.221421003 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:10.224266052 CET49738443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:10.661974907 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:10.667516947 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:10.667781115 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:11.418526888 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:11.425230026 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:11.430700064 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:11.684963942 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:11.685108900 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:11.691416025 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.016350985 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.016560078 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:12.021935940 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.275110006 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.275356054 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:12.280774117 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.534187078 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.534358978 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:12.540035963 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.794436932 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:12.794589996 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:12.800048113 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.053359032 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.054037094 CET4974264246192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:13.059432030 CET6424649742213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.059504986 CET4974264246192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:13.059572935 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:13.065994978 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.813601971 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.819998026 CET4974264246192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:13.820195913 CET4974264246192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:13.825453043 CET6424649742213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.826294899 CET6424649742213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:13.826344967 CET4974264246192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:13.860621929 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:14.081770897 CET2149739213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:14.126247883 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:18.201704025 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:18.201750994 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:18.201812983 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:18.230106115 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:18.230123997 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:18.837248087 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:18.837518930 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:18.841520071 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:18.841530085 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:18.841778994 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:18.889039040 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:18.935337067 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:18.963211060 CET4973921192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:19.066318989 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:19.066382885 CET44349747172.67.74.152192.168.2.4
                                        Oct 30, 2024 05:29:19.066487074 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:19.069016933 CET49747443192.168.2.4172.67.74.152
                                        Oct 30, 2024 05:29:20.144963980 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:20.150758028 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:20.150861025 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:20.890022039 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:20.890248060 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:20.895761967 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.146019936 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.146197081 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:21.151570082 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.474503040 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.477684975 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:21.483114004 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.735243082 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.735892057 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:21.741338968 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.991244078 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:21.991503000 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:21.996931076 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:22.247018099 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:22.247889042 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:22.253315926 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:22.503412962 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:22.506592989 CET4974964747192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:22.512080908 CET6474749749213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:22.512172937 CET4974964747192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:22.514823914 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:22.520215988 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:23.263711929 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:23.264162064 CET4974964747192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:23.264162064 CET4974964747192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:23.269560099 CET6474749749213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:23.270127058 CET6474749749213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:23.270198107 CET4974964747192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:23.313762903 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:29:23.525142908 CET2149748213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:29:23.579511881 CET4974821192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:24.753387928 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:24.758919954 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.014439106 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.021158934 CET4990063829192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:25.026643038 CET6382949900213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.028970003 CET4990063829192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:25.029051065 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:25.034441948 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.807862043 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.808109999 CET4990063829192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:25.808155060 CET4990063829192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:25.813513994 CET6382949900213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.814093113 CET6382949900213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:25.814148903 CET4990063829192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:25.860781908 CET4973321192.168.2.4213.189.52.181
                                        Oct 30, 2024 05:30:26.080961943 CET2149733213.189.52.181192.168.2.4
                                        Oct 30, 2024 05:30:26.126400948 CET4973321192.168.2.4213.189.52.181
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 30, 2024 05:28:54.965456963 CET6440153192.168.2.41.1.1.1
                                        Oct 30, 2024 05:28:54.973469973 CET53644011.1.1.1192.168.2.4
                                        Oct 30, 2024 05:28:56.553451061 CET4940053192.168.2.41.1.1.1
                                        Oct 30, 2024 05:28:56.562475920 CET53494001.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 30, 2024 05:28:54.965456963 CET192.168.2.41.1.1.10x3ce5Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                        Oct 30, 2024 05:28:56.553451061 CET192.168.2.41.1.1.10xf14fStandard query (0)s4.serv00.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 30, 2024 05:28:54.973469973 CET1.1.1.1192.168.2.40x3ce5No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                        Oct 30, 2024 05:28:54.973469973 CET1.1.1.1192.168.2.40x3ce5No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                        Oct 30, 2024 05:28:54.973469973 CET1.1.1.1192.168.2.40x3ce5No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                        Oct 30, 2024 05:28:56.562475920 CET1.1.1.1192.168.2.40xf14fNo error (0)s4.serv00.com213.189.52.181A (IP address)IN (0x0001)false
                                        • api.ipify.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449730172.67.74.1524437568C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-30 04:28:55 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-10-30 04:28:55 UTC211INHTTP/1.1 200 OK
                                        Date: Wed, 30 Oct 2024 04:28:55 GMT
                                        Content-Type: text/plain
                                        Content-Length: 14
                                        Connection: close
                                        Vary: Origin
                                        cf-cache-status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8da8a9505aa9e9a0-DFW
                                        2024-10-30 04:28:55 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38
                                        Data Ascii: 173.254.250.78


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.449738172.67.74.1524437968C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-30 04:29:10 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-10-30 04:29:10 UTC211INHTTP/1.1 200 OK
                                        Date: Wed, 30 Oct 2024 04:29:10 GMT
                                        Content-Type: text/plain
                                        Content-Length: 14
                                        Connection: close
                                        Vary: Origin
                                        cf-cache-status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8da8a9aa3c963aaf-DFW
                                        2024-10-30 04:29:10 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38
                                        Data Ascii: 173.254.250.78


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.449747172.67.74.1524437320C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-30 04:29:18 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-10-30 04:29:19 UTC211INHTTP/1.1 200 OK
                                        Date: Wed, 30 Oct 2024 04:29:19 GMT
                                        Content-Type: text/plain
                                        Content-Length: 14
                                        Connection: close
                                        Vary: Origin
                                        cf-cache-status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8da8a9e17ec82e6c-DFW
                                        2024-10-30 04:29:19 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 38
                                        Data Ascii: 173.254.250.78


                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Oct 30, 2024 05:28:57.324274063 CET2149733213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:28. Server port: 21.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:28. Server port: 21.220-This is a private system - No anonymous login
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:28. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                        Oct 30, 2024 05:28:57.324632883 CET4973321192.168.2.4213.189.52.181USER f2241_dol
                                        Oct 30, 2024 05:28:57.585655928 CET2149733213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                                        Oct 30, 2024 05:28:57.586002111 CET4973321192.168.2.4213.189.52.181PASS Doll900#@
                                        Oct 30, 2024 05:28:57.916445017 CET2149733213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                                        Oct 30, 2024 05:28:58.183074951 CET2149733213.189.52.181192.168.2.4504 Unknown command
                                        Oct 30, 2024 05:28:58.185724020 CET4973321192.168.2.4213.189.52.181PWD
                                        Oct 30, 2024 05:28:58.447448015 CET2149733213.189.52.181192.168.2.4257 "/" is your current location
                                        Oct 30, 2024 05:28:58.447632074 CET4973321192.168.2.4213.189.52.181TYPE I
                                        Oct 30, 2024 05:28:58.709135056 CET2149733213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                                        Oct 30, 2024 05:28:58.709364891 CET4973321192.168.2.4213.189.52.181PASV
                                        Oct 30, 2024 05:28:58.971010923 CET2149733213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,248,26)
                                        Oct 30, 2024 05:28:58.978390932 CET4973321192.168.2.4213.189.52.181STOR PW_user-675052_2024_10_30_00_28_55.html
                                        Oct 30, 2024 05:28:59.733849049 CET2149733213.189.52.181192.168.2.4150 Accepted data connection
                                        Oct 30, 2024 05:28:59.997594118 CET2149733213.189.52.181192.168.2.4226-File successfully transferred
                                        226-File successfully transferred226 0.264 seconds (measured here), 1.29 Kbytes per second
                                        Oct 30, 2024 05:29:11.418526888 CET2149739213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:29. Server port: 21.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:29. Server port: 21.220-This is a private system - No anonymous login
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:29. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                        Oct 30, 2024 05:29:11.425230026 CET4973921192.168.2.4213.189.52.181USER f2241_dol
                                        Oct 30, 2024 05:29:11.684963942 CET2149739213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                                        Oct 30, 2024 05:29:11.685108900 CET4973921192.168.2.4213.189.52.181PASS Doll900#@
                                        Oct 30, 2024 05:29:12.016350985 CET2149739213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                                        Oct 30, 2024 05:29:12.275110006 CET2149739213.189.52.181192.168.2.4504 Unknown command
                                        Oct 30, 2024 05:29:12.275356054 CET4973921192.168.2.4213.189.52.181PWD
                                        Oct 30, 2024 05:29:12.534187078 CET2149739213.189.52.181192.168.2.4257 "/" is your current location
                                        Oct 30, 2024 05:29:12.534358978 CET4973921192.168.2.4213.189.52.181TYPE I
                                        Oct 30, 2024 05:29:12.794436932 CET2149739213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                                        Oct 30, 2024 05:29:12.794589996 CET4973921192.168.2.4213.189.52.181PASV
                                        Oct 30, 2024 05:29:13.053359032 CET2149739213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,250,246)
                                        Oct 30, 2024 05:29:13.059572935 CET4973921192.168.2.4213.189.52.181STOR PW_user-675052_2024_10_30_00_29_09.html
                                        Oct 30, 2024 05:29:13.813601971 CET2149739213.189.52.181192.168.2.4150 Accepted data connection
                                        Oct 30, 2024 05:29:14.081770897 CET2149739213.189.52.181192.168.2.4226-File successfully transferred
                                        226-File successfully transferred226 0.268 seconds (measured here), 1.27 Kbytes per second
                                        Oct 30, 2024 05:29:20.890022039 CET2149748213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:29. Server port: 21.
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:29. Server port: 21.220-This is a private system - No anonymous login
                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 6 of 150 allowed.220-Local time is now 06:29. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                                        Oct 30, 2024 05:29:20.890248060 CET4974821192.168.2.4213.189.52.181USER f2241_dol
                                        Oct 30, 2024 05:29:21.146019936 CET2149748213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                                        Oct 30, 2024 05:29:21.146197081 CET4974821192.168.2.4213.189.52.181PASS Doll900#@
                                        Oct 30, 2024 05:29:21.474503040 CET2149748213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                                        Oct 30, 2024 05:29:21.735243082 CET2149748213.189.52.181192.168.2.4504 Unknown command
                                        Oct 30, 2024 05:29:21.735892057 CET4974821192.168.2.4213.189.52.181PWD
                                        Oct 30, 2024 05:29:21.991244078 CET2149748213.189.52.181192.168.2.4257 "/" is your current location
                                        Oct 30, 2024 05:29:21.991503000 CET4974821192.168.2.4213.189.52.181TYPE I
                                        Oct 30, 2024 05:29:22.247018099 CET2149748213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                                        Oct 30, 2024 05:29:22.247889042 CET4974821192.168.2.4213.189.52.181PASV
                                        Oct 30, 2024 05:29:22.503412962 CET2149748213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,252,235)
                                        Oct 30, 2024 05:29:22.514823914 CET4974821192.168.2.4213.189.52.181STOR PW_user-675052_2024_10_30_00_29_18.html
                                        Oct 30, 2024 05:29:23.263711929 CET2149748213.189.52.181192.168.2.4150 Accepted data connection
                                        Oct 30, 2024 05:29:23.525142908 CET2149748213.189.52.181192.168.2.4226-File successfully transferred
                                        226-File successfully transferred226 0.261 seconds (measured here), 1.30 Kbytes per second
                                        Oct 30, 2024 05:30:24.753387928 CET4973321192.168.2.4213.189.52.181PASV
                                        Oct 30, 2024 05:30:25.014439106 CET2149733213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,249,85)
                                        Oct 30, 2024 05:30:25.029051065 CET4973321192.168.2.4213.189.52.181STOR KL_user-675052_2024_11_12_22_03_39.html
                                        Oct 30, 2024 05:30:25.807862043 CET2149733213.189.52.181192.168.2.4150 Accepted data connection
                                        Oct 30, 2024 05:30:26.080961943 CET2149733213.189.52.181192.168.2.4226-File successfully transferred
                                        226-File successfully transferred226 0.273 seconds (measured here), 1.04 Kbytes per second

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:00:28:53
                                        Start date:30/10/2024
                                        Path:C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                                        Imagebase:0x2a0000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1655541150.00000000037C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:00:28:53
                                        Start date:30/10/2024
                                        Path:C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                                        Imagebase:0xa0000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:00:28:53
                                        Start date:30/10/2024
                                        Path:C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                                        Imagebase:0x380000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:00:28:53
                                        Start date:30/10/2024
                                        Path:C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Statement JULY #U007e SEP 2024 USD 19,055.00.exe"
                                        Imagebase:0xc40000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4106544369.000000000302C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4106544369.0000000003001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4106544369.0000000003001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:5
                                        Start time:00:29:07
                                        Start date:30/10/2024
                                        Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                        Imagebase:0xb80000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 58%, ReversingLabs
                                        Reputation:low
                                        Has exited:true

                                        Target ID:6
                                        Start time:00:29:07
                                        Start date:30/10/2024
                                        Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                        Imagebase:0x90000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:7
                                        Start time:00:29:07
                                        Start date:30/10/2024
                                        Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                        Imagebase:0xd00000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.1890171254.000000000321C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.1886764234.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.1890171254.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.1890171254.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:9
                                        Start time:00:29:16
                                        Start date:30/10/2024
                                        Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                        Imagebase:0x860000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:10
                                        Start time:00:29:16
                                        Start date:30/10/2024
                                        Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                                        Imagebase:0xf10000
                                        File size:471'040 bytes
                                        MD5 hash:A528109E5486419098353578BD5E662A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.4105974724.000000000345C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.4105974724.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.4105974724.0000000003431000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:10.3%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:291
                                          Total number of Limit Nodes:16
                                          execution_graph 25004 984668 25005 98467a 25004->25005 25006 984686 25005->25006 25010 984779 25005->25010 25015 983e10 25006->25015 25011 98479d 25010->25011 25019 984888 25011->25019 25023 984878 25011->25023 25016 983e1b 25015->25016 25031 985cf8 25016->25031 25018 98703b 25021 9848af 25019->25021 25020 98498c 25020->25020 25021->25020 25027 984248 25021->25027 25025 9848af 25023->25025 25024 98498c 25024->25024 25025->25024 25026 984248 CreateActCtxA 25025->25026 25026->25024 25028 985918 CreateActCtxA 25027->25028 25030 9859db 25028->25030 25032 985d03 25031->25032 25035 985d18 25032->25035 25034 9871dd 25034->25018 25036 985d23 25035->25036 25039 985d48 25036->25039 25038 9872ba 25038->25034 25040 985d53 25039->25040 25043 985d78 25040->25043 25042 9873ad 25042->25038 25044 985d83 25043->25044 25045 9886b0 25044->25045 25052 988958 25044->25052 25047 98890b 25045->25047 25060 98abb1 25045->25060 25046 988949 25046->25042 25047->25046 25065 98cca1 25047->25065 25070 98ccb0 25047->25070 25053 9888e1 25052->25053 25056 98895e 25052->25056 25054 98890b 25053->25054 25059 98abb1 GetModuleHandleW 25053->25059 25055 988949 25054->25055 25057 98ccb0 GetModuleHandleW 25054->25057 25058 98cca1 GetModuleHandleW 25054->25058 25055->25045 25056->25045 25057->25055 25058->25055 25059->25054 25075 98afb8 25060->25075 25079 98afe0 25060->25079 25083 98aff0 25060->25083 25061 98abc6 25061->25047 25066 98ccb0 25065->25066 25067 98ccf5 25066->25067 25092 98d258 25066->25092 25096 98d268 25066->25096 25067->25046 25072 98ccd1 25070->25072 25071 98ccf5 25071->25046 25072->25071 25073 98d258 GetModuleHandleW 25072->25073 25074 98d268 GetModuleHandleW 25072->25074 25073->25071 25074->25071 25076 98afbd 25075->25076 25087 98b0e8 25076->25087 25077 98afff 25077->25061 25080 98aff0 25079->25080 25082 98b0e8 GetModuleHandleW 25080->25082 25081 98afff 25081->25061 25082->25081 25084 98aff4 25083->25084 25086 98b0e8 GetModuleHandleW 25084->25086 25085 98afff 25085->25061 25086->25085 25088 98b11c 25087->25088 25089 98b0f9 25087->25089 25088->25077 25089->25088 25090 98b320 GetModuleHandleW 25089->25090 25091 98b34d 25090->25091 25091->25077 25093 98d275 25092->25093 25094 98d2af 25093->25094 25100 98d090 25093->25100 25094->25067 25098 98d275 25096->25098 25097 98d2af 25097->25067 25098->25097 25099 98d090 GetModuleHandleW 25098->25099 25099->25097 25101 98d095 25100->25101 25103 98dbc0 25101->25103 25104 98d1ac 25101->25104 25103->25103 25105 98d1b7 25104->25105 25106 985d78 GetModuleHandleW 25105->25106 25107 98dc2f 25106->25107 25107->25103 25108 8ed01c 25109 8ed034 25108->25109 25110 8ed08e 25109->25110 25113 4b92bf9 25109->25113 25122 4b9113c 25109->25122 25115 4b92c08 25113->25115 25114 4b92c69 25147 4b91264 25114->25147 25115->25114 25117 4b92c59 25115->25117 25131 4b92d90 25117->25131 25136 4b92e5c 25117->25136 25142 4b92d80 25117->25142 25118 4b92c67 25123 4b91147 25122->25123 25124 4b92c69 25123->25124 25126 4b92c59 25123->25126 25125 4b91264 CallWindowProcW 25124->25125 25127 4b92c67 25125->25127 25128 4b92e5c CallWindowProcW 25126->25128 25129 4b92d90 CallWindowProcW 25126->25129 25130 4b92d80 CallWindowProcW 25126->25130 25128->25127 25129->25127 25130->25127 25133 4b92da4 25131->25133 25132 4b92e30 25132->25118 25151 4b92e48 25133->25151 25154 4b92e37 25133->25154 25137 4b92e1a 25136->25137 25138 4b92e6a 25136->25138 25140 4b92e48 CallWindowProcW 25137->25140 25141 4b92e37 CallWindowProcW 25137->25141 25139 4b92e30 25139->25118 25140->25139 25141->25139 25144 4b92da4 25142->25144 25143 4b92e30 25143->25118 25145 4b92e48 CallWindowProcW 25144->25145 25146 4b92e37 CallWindowProcW 25144->25146 25145->25143 25146->25143 25148 4b9126f 25147->25148 25149 4b9434a CallWindowProcW 25148->25149 25150 4b942f9 25148->25150 25149->25150 25150->25118 25152 4b92e59 25151->25152 25158 4b94282 25151->25158 25152->25132 25155 4b92e4a 25154->25155 25156 4b92e59 25155->25156 25157 4b94282 CallWindowProcW 25155->25157 25156->25132 25157->25156 25159 4b91264 CallWindowProcW 25158->25159 25160 4b9429a 25159->25160 25160->25152 25161 98d380 25162 98d3c6 25161->25162 25166 98d550 25162->25166 25170 98d560 25162->25170 25163 98d4b3 25167 98d560 25166->25167 25173 98afd4 25167->25173 25171 98afd4 DuplicateHandle 25170->25171 25172 98d58e 25171->25172 25172->25163 25174 98d5c8 DuplicateHandle 25173->25174 25175 98d58e 25174->25175 25175->25163 24792 4b96d30 24793 4b96d4a 24792->24793 24794 4b96d73 24793->24794 24797 4b96db9 24793->24797 24802 4b96dc8 24793->24802 24798 4b96dd4 24797->24798 24807 4b96df8 24798->24807 24811 4b96de8 24798->24811 24799 4b96de0 24799->24793 24803 4b96dd4 24802->24803 24805 4b96df8 12 API calls 24803->24805 24806 4b96de8 12 API calls 24803->24806 24804 4b96de0 24804->24793 24805->24804 24806->24804 24809 4b96e14 24807->24809 24808 4b96e3d 24808->24799 24809->24808 24815 4b95a2c 24809->24815 24813 4b96e14 24811->24813 24812 4b96e3d 24812->24799 24813->24812 24814 4b95a2c 12 API calls 24813->24814 24814->24813 24816 4b95a37 24815->24816 24817 4b9717a 24816->24817 24834 4b9ab86 24816->24834 24839 4b9a0c7 24816->24839 24843 4b9a507 24816->24843 24847 4b99dc2 24816->24847 24851 4b9a643 24816->24851 24855 4b9ab03 24816->24855 24863 4b9aa2c 24816->24863 24867 4b9a549 24816->24867 24871 4b99e76 24816->24871 24879 4b9a735 24816->24879 24883 4b9a012 24816->24883 24887 4b99d31 24816->24887 24894 4b99fbe 24816->24894 24898 4b9a7f8 24816->24898 24906 4b99dd8 24816->24906 24910 4b9a6a6 24816->24910 24817->24809 24836 4b99da1 24834->24836 24835 4b9abf6 24835->24816 24836->24835 24915 4b9b2b0 24836->24915 24920 4b9b2a0 24836->24920 24840 4b99da1 24839->24840 24841 4b9b2b0 2 API calls 24840->24841 24842 4b9b2a0 2 API calls 24840->24842 24841->24840 24842->24840 24933 4b9b268 24843->24933 24938 4b9b258 24843->24938 24844 4b9a51f 24848 4b99da1 24847->24848 24849 4b9b2b0 2 API calls 24848->24849 24850 4b9b2a0 2 API calls 24848->24850 24849->24848 24850->24848 24951 4b99690 24851->24951 24955 4b99674 24851->24955 24852 4b9a667 24857 4b99e79 24855->24857 24856 4b9ab17 24857->24855 24857->24856 24858 4b99da1 24857->24858 24960 4b9ba09 24857->24960 24965 4b9ba18 24857->24965 24861 4b9b2b0 2 API calls 24858->24861 24862 4b9b2a0 2 API calls 24858->24862 24861->24858 24862->24858 24864 4b99da1 24863->24864 24865 4b9b2b0 2 API calls 24864->24865 24866 4b9b2a0 2 API calls 24864->24866 24865->24864 24866->24864 24978 4b9b9d0 24867->24978 24983 4b9b9c0 24867->24983 24868 4b9a561 24872 4b99e79 24871->24872 24873 4b99da1 24872->24873 24874 4b9ab17 24872->24874 24875 4b9ba09 2 API calls 24872->24875 24876 4b9ba18 2 API calls 24872->24876 24877 4b9b2b0 2 API calls 24873->24877 24878 4b9b2a0 2 API calls 24873->24878 24875->24872 24876->24872 24877->24873 24878->24873 24988 4b99778 24879->24988 24992 4b99780 24879->24992 24880 4b9a757 24884 4b99da1 24883->24884 24885 4b9b2b0 2 API calls 24884->24885 24886 4b9b2a0 2 API calls 24884->24886 24885->24884 24886->24884 24888 4b99d4d 24887->24888 24996 4b99918 24888->24996 25000 4b9990c 24888->25000 24895 4b99da1 24894->24895 24896 4b9b2b0 2 API calls 24895->24896 24897 4b9b2a0 2 API calls 24895->24897 24896->24895 24897->24895 24899 4b9a7fe 24898->24899 24900 4b99da1 24899->24900 24902 4b99690 WriteProcessMemory 24899->24902 24903 4b99674 WriteProcessMemory 24899->24903 24901 4b9a8cd 24900->24901 24904 4b9b2b0 2 API calls 24900->24904 24905 4b9b2a0 2 API calls 24900->24905 24902->24900 24903->24900 24904->24900 24905->24900 24908 4b9b2b0 2 API calls 24906->24908 24909 4b9b2a0 2 API calls 24906->24909 24907 4b99da1 24907->24906 24908->24907 24909->24907 24911 4b9a6d2 24910->24911 24913 4b99690 WriteProcessMemory 24911->24913 24914 4b99674 WriteProcessMemory 24911->24914 24912 4b9a70c 24913->24912 24914->24912 24916 4b9b2c5 24915->24916 24925 4b991ca 24916->24925 24929 4b991d0 24916->24929 24917 4b9b2e4 24917->24836 24921 4b9b2c5 24920->24921 24923 4b991ca VirtualAllocEx 24921->24923 24924 4b991d0 VirtualAllocEx 24921->24924 24922 4b9b2e4 24922->24836 24923->24922 24924->24922 24926 4b99210 VirtualAllocEx 24925->24926 24928 4b9924d 24926->24928 24928->24917 24930 4b99210 VirtualAllocEx 24929->24930 24932 4b9924d 24930->24932 24932->24917 24934 4b9b27d 24933->24934 24943 4b990f8 24934->24943 24947 4b990f2 24934->24947 24935 4b9b293 24935->24844 24939 4b9b268 24938->24939 24941 4b990f8 Wow64SetThreadContext 24939->24941 24942 4b990f2 Wow64SetThreadContext 24939->24942 24940 4b9b293 24940->24844 24941->24940 24942->24940 24944 4b9913d Wow64SetThreadContext 24943->24944 24946 4b99185 24944->24946 24946->24935 24948 4b9913d Wow64SetThreadContext 24947->24948 24950 4b99185 24948->24950 24950->24935 24952 4b996d8 WriteProcessMemory 24951->24952 24954 4b9972f 24952->24954 24954->24852 24956 4b9968b WriteProcessMemory 24955->24956 24957 4b99643 24955->24957 24959 4b9972f 24956->24959 24959->24852 24961 4b9ba2d 24960->24961 24970 4b99048 24961->24970 24974 4b99042 24961->24974 24962 4b9ba40 24962->24857 24966 4b9ba2d 24965->24966 24968 4b99048 ResumeThread 24966->24968 24969 4b99042 ResumeThread 24966->24969 24967 4b9ba40 24967->24857 24968->24967 24969->24967 24971 4b99088 ResumeThread 24970->24971 24973 4b990b9 24971->24973 24973->24962 24975 4b99088 ResumeThread 24974->24975 24977 4b990b9 24975->24977 24977->24962 24979 4b9b9e5 24978->24979 24981 4b990f8 Wow64SetThreadContext 24979->24981 24982 4b990f2 Wow64SetThreadContext 24979->24982 24980 4b9b9fb 24980->24868 24981->24980 24982->24980 24984 4b9b9c5 24983->24984 24986 4b990f8 Wow64SetThreadContext 24984->24986 24987 4b990f2 Wow64SetThreadContext 24984->24987 24985 4b9b9fb 24985->24868 24986->24985 24987->24985 24989 4b997cb ReadProcessMemory 24988->24989 24991 4b9980f 24989->24991 24991->24880 24993 4b997cb ReadProcessMemory 24992->24993 24995 4b9980f 24993->24995 24995->24880 24997 4b999a1 CreateProcessA 24996->24997 24999 4b99b63 24997->24999 25001 4b999a1 CreateProcessA 25000->25001 25003 4b99b63 25001->25003

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 342 4b9990c-4b999ad 344 4b999af-4b999b9 342->344 345 4b999e6-4b99a06 342->345 344->345 346 4b999bb-4b999bd 344->346 352 4b99a08-4b99a12 345->352 353 4b99a3f-4b99a6e 345->353 347 4b999bf-4b999c9 346->347 348 4b999e0-4b999e3 346->348 350 4b999cb 347->350 351 4b999cd-4b999dc 347->351 348->345 350->351 351->351 354 4b999de 351->354 352->353 355 4b99a14-4b99a16 352->355 359 4b99a70-4b99a7a 353->359 360 4b99aa7-4b99b61 CreateProcessA 353->360 354->348 357 4b99a39-4b99a3c 355->357 358 4b99a18-4b99a22 355->358 357->353 361 4b99a24 358->361 362 4b99a26-4b99a35 358->362 359->360 363 4b99a7c-4b99a7e 359->363 373 4b99b6a-4b99bf0 360->373 374 4b99b63-4b99b69 360->374 361->362 362->362 364 4b99a37 362->364 365 4b99aa1-4b99aa4 363->365 366 4b99a80-4b99a8a 363->366 364->357 365->360 368 4b99a8c 366->368 369 4b99a8e-4b99a9d 366->369 368->369 369->369 370 4b99a9f 369->370 370->365 384 4b99c00-4b99c04 373->384 385 4b99bf2-4b99bf6 373->385 374->373 387 4b99c14-4b99c18 384->387 388 4b99c06-4b99c0a 384->388 385->384 386 4b99bf8 385->386 386->384 390 4b99c28-4b99c2c 387->390 391 4b99c1a-4b99c1e 387->391 388->387 389 4b99c0c 388->389 389->387 393 4b99c3e-4b99c45 390->393 394 4b99c2e-4b99c34 390->394 391->390 392 4b99c20 391->392 392->390 395 4b99c5c 393->395 396 4b99c47-4b99c56 393->396 394->393 398 4b99c5d 395->398 396->395 398->398
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04B99B4E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 9dfd4e911f607ff220db55edfbe2418cb312fdb6fb757f9d0fe487b690879dd5
                                          • Instruction ID: 79c43419fd62845b90a6cab6259069a54409146dcb7a512a94bcd024ca3c92c5
                                          • Opcode Fuzzy Hash: 9dfd4e911f607ff220db55edfbe2418cb312fdb6fb757f9d0fe487b690879dd5
                                          • Instruction Fuzzy Hash: 2FA149B1D00219DFEF60DFA9C84179DBBF2EF48314F1485A9E818A7240DB74A985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 399 4b99918-4b999ad 401 4b999af-4b999b9 399->401 402 4b999e6-4b99a06 399->402 401->402 403 4b999bb-4b999bd 401->403 409 4b99a08-4b99a12 402->409 410 4b99a3f-4b99a6e 402->410 404 4b999bf-4b999c9 403->404 405 4b999e0-4b999e3 403->405 407 4b999cb 404->407 408 4b999cd-4b999dc 404->408 405->402 407->408 408->408 411 4b999de 408->411 409->410 412 4b99a14-4b99a16 409->412 416 4b99a70-4b99a7a 410->416 417 4b99aa7-4b99b61 CreateProcessA 410->417 411->405 414 4b99a39-4b99a3c 412->414 415 4b99a18-4b99a22 412->415 414->410 418 4b99a24 415->418 419 4b99a26-4b99a35 415->419 416->417 420 4b99a7c-4b99a7e 416->420 430 4b99b6a-4b99bf0 417->430 431 4b99b63-4b99b69 417->431 418->419 419->419 421 4b99a37 419->421 422 4b99aa1-4b99aa4 420->422 423 4b99a80-4b99a8a 420->423 421->414 422->417 425 4b99a8c 423->425 426 4b99a8e-4b99a9d 423->426 425->426 426->426 427 4b99a9f 426->427 427->422 441 4b99c00-4b99c04 430->441 442 4b99bf2-4b99bf6 430->442 431->430 444 4b99c14-4b99c18 441->444 445 4b99c06-4b99c0a 441->445 442->441 443 4b99bf8 442->443 443->441 447 4b99c28-4b99c2c 444->447 448 4b99c1a-4b99c1e 444->448 445->444 446 4b99c0c 445->446 446->444 450 4b99c3e-4b99c45 447->450 451 4b99c2e-4b99c34 447->451 448->447 449 4b99c20 448->449 449->447 452 4b99c5c 450->452 453 4b99c47-4b99c56 450->453 451->450 455 4b99c5d 452->455 453->452 455->455
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04B99B4E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 46766510205e4d2c7c2252e856814594c94ebdf0940fe3a2a183aa1bfc1edb5b
                                          • Instruction ID: 2bc58281d81be082d7273bc430978136a8f5f0e6a39e27c65a3ec86da685dca3
                                          • Opcode Fuzzy Hash: 46766510205e4d2c7c2252e856814594c94ebdf0940fe3a2a183aa1bfc1edb5b
                                          • Instruction Fuzzy Hash: CA913AB1D00219DFEF50DFA9C84179DBBF2EF44314F1485A9E818A7250DB74A985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 456 98b0e8-98b0f7 457 98b0f9-98b106 call 989b58 456->457 458 98b123-98b127 456->458 465 98b108 457->465 466 98b11c 457->466 460 98b129-98b133 458->460 461 98b13b-98b17c 458->461 460->461 467 98b189-98b197 461->467 468 98b17e-98b186 461->468 512 98b10e call 98b380 465->512 513 98b10e call 98b370 465->513 466->458 469 98b199-98b19e 467->469 470 98b1bb-98b1bd 467->470 468->467 472 98b1a9 469->472 473 98b1a0-98b1a7 call 98ada0 469->473 475 98b1c0-98b1c7 470->475 471 98b114-98b116 471->466 474 98b258-98b318 471->474 477 98b1ab-98b1b9 472->477 473->477 507 98b31a-98b31d 474->507 508 98b320-98b34b GetModuleHandleW 474->508 478 98b1c9-98b1d1 475->478 479 98b1d4-98b1db 475->479 477->475 478->479 480 98b1e8-98b1f1 call 98adb0 479->480 481 98b1dd-98b1e5 479->481 487 98b1fe-98b203 480->487 488 98b1f3-98b1fb 480->488 481->480 489 98b221-98b22e 487->489 490 98b205-98b20c 487->490 488->487 496 98b230-98b24e 489->496 497 98b251-98b257 489->497 490->489 492 98b20e-98b21e call 98adc0 call 98add0 490->492 492->489 496->497 507->508 509 98b34d-98b353 508->509 510 98b354-98b368 508->510 509->510 512->471 513->471
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0098B33E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: ce817bc44f37c6c08442abeda1b5d37afbe6004f9c7a92fd0169bd575634ffee
                                          • Instruction ID: a78c1944e1bd10a72c43e4d79a3bac5a049a7b31a4d25b7e74b98d2fedd40035
                                          • Opcode Fuzzy Hash: ce817bc44f37c6c08442abeda1b5d37afbe6004f9c7a92fd0169bd575634ffee
                                          • Instruction Fuzzy Hash: 57714070A00B458FDB24EF6AD45475ABBF5FF88300F048A2AD48ADBB50D774E949CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 514 98590d-9859d9 CreateActCtxA 516 9859db-9859e1 514->516 517 9859e2-985a3c 514->517 516->517 524 985a4b-985a4f 517->524 525 985a3e-985a41 517->525 526 985a60 524->526 527 985a51-985a5d 524->527 525->524 528 985a61 526->528 527->526 528->528
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 009859C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 64a1289c1da9e048ca7c35c91f7d86cd573d3369a539a6598458134ad3fbaac3
                                          • Instruction ID: 9695d6b2779028e281e78df0662c1f3a96129e2d0a14381aba8c10c67728fa67
                                          • Opcode Fuzzy Hash: 64a1289c1da9e048ca7c35c91f7d86cd573d3369a539a6598458134ad3fbaac3
                                          • Instruction Fuzzy Hash: 4541E3B0C00619CFDB24DFA9C8847DEBBF5BF48304F6481AAD409AB255DB75694ACF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 530 4b91264-4b942ec 533 4b9439c-4b943bc call 4b9113c 530->533 534 4b942f2-4b942f7 530->534 542 4b943bf-4b943cc 533->542 536 4b942f9-4b94330 534->536 537 4b9434a-4b94382 CallWindowProcW 534->537 543 4b94339-4b94348 536->543 544 4b94332-4b94338 536->544 538 4b9438b-4b9439a 537->538 539 4b94384-4b9438a 537->539 538->542 539->538 543->542 544->543
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04B94371
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: 64853591bcf8aaec83255850eb7699b8aa795e99343e53cc2f31f21ade7cb786
                                          • Instruction ID: bbc001c525d64853f2ba0483704c855e6fd43c333b364539cca38a7012d2da11
                                          • Opcode Fuzzy Hash: 64853591bcf8aaec83255850eb7699b8aa795e99343e53cc2f31f21ade7cb786
                                          • Instruction Fuzzy Hash: 444129B5904205DFDB14CFA9C448AAABBF5FB88314F24C4A9D519AB321D374A841CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 547 984248-9859d9 CreateActCtxA 550 9859db-9859e1 547->550 551 9859e2-985a3c 547->551 550->551 558 985a4b-985a4f 551->558 559 985a3e-985a41 551->559 560 985a60 558->560 561 985a51-985a5d 558->561 559->558 562 985a61 560->562 561->560 562->562
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 009859C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 94438551556742c51b68c50470e0d97a70747b98c3b90a6dd921f77e8513d5bd
                                          • Instruction ID: b99c5ea8f6102aa9f4a38a0236ff8b6479716e966d5757796c0b346e980f4229
                                          • Opcode Fuzzy Hash: 94438551556742c51b68c50470e0d97a70747b98c3b90a6dd921f77e8513d5bd
                                          • Instruction Fuzzy Hash: A841C2B0C00719CBDB24DFA9C884B9EBBF5BF48304F65819AD408AB265DB756949CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 564 4b99674-4b99689 565 4b9968b-4b996de 564->565 566 4b99643 564->566 568 4b996ee-4b9972d WriteProcessMemory 565->568 569 4b996e0-4b996ec 565->569 571 4b9972f-4b99735 568->571 572 4b99736-4b99766 568->572 569->568 571->572
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04B99720
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 708ca63baa8bd2b551df35d3160206871839d03d19f7daf04602fd58737af280
                                          • Instruction ID: 606761623a97ed92c295c03bf22e44bf95b28c83b13c2dbb45760fd5be05cd49
                                          • Opcode Fuzzy Hash: 708ca63baa8bd2b551df35d3160206871839d03d19f7daf04602fd58737af280
                                          • Instruction Fuzzy Hash: F43144B2D002599FDF54CFA9C885BDEBBF0FF48314F10842AE958A7240C778A944CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 576 4b99690-4b996de 578 4b996ee-4b9972d WriteProcessMemory 576->578 579 4b996e0-4b996ec 576->579 581 4b9972f-4b99735 578->581 582 4b99736-4b99766 578->582 579->578 581->582
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04B99720
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 34248bd2987c6bf116f5ce8693133534f2f1f201454e565c38db0d9c7b00b102
                                          • Instruction ID: 26b0e2145fdfe7c0a63e36475206f66b7ad48aed5ab10f40ff9740edc057c872
                                          • Opcode Fuzzy Hash: 34248bd2987c6bf116f5ce8693133534f2f1f201454e565c38db0d9c7b00b102
                                          • Instruction Fuzzy Hash: 502127B19003599FCF10CFA9C885BDEBBF5FF48310F108429E959A7250C778A954CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 598 4b99778-4b9980d ReadProcessMemory 601 4b9980f-4b99815 598->601 602 4b99816-4b99846 598->602 601->602
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04B99800
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 04b58dff2b7935a681e5f21b1687cd889e2aac3e4e753b9dfd381701ca96c7e3
                                          • Instruction ID: 8751fe2b2248317b8a1402c129aa510f7d0706de947ee8a781829648c62ab7c1
                                          • Opcode Fuzzy Hash: 04b58dff2b7935a681e5f21b1687cd889e2aac3e4e753b9dfd381701ca96c7e3
                                          • Instruction Fuzzy Hash: 912136B1C002499FCF10CFAAC881AEEBBF4FF48320F10842DE958A7250C7389941CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 586 98afd4-98d65c DuplicateHandle 588 98d65e-98d664 586->588 589 98d665-98d682 586->589 588->589
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0098D58E,?,?,?,?,?), ref: 0098D64F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: ff8b5e8bee5d33bba4b675e563006ec6debc8d3ee200114f0de7b0cdd4fd5315
                                          • Instruction ID: 9a1dfc0d1d8bf2e4428d4a7c111192ed864f177b792a0f0a1c2f03b42ddea113
                                          • Opcode Fuzzy Hash: ff8b5e8bee5d33bba4b675e563006ec6debc8d3ee200114f0de7b0cdd4fd5315
                                          • Instruction Fuzzy Hash: A021E4B5901248AFDB10DF9AD584ADEBFF8FB48324F14841AE918A7350D378A950CFA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 592 98d5c0-98d5c6 593 98d5c8-98d65c DuplicateHandle 592->593 594 98d65e-98d664 593->594 595 98d665-98d682 593->595 594->595
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0098D58E,?,?,?,?,?), ref: 0098D64F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 0786c522e0e8c46e192f97bc835b0e06719de0d98dacb258bfeded6ca1c333e2
                                          • Instruction ID: 568e2666dc95a3c9f066c72cbc6929fbe3c0cd7e8fc89bdc8a42cbe9fe82e71e
                                          • Opcode Fuzzy Hash: 0786c522e0e8c46e192f97bc835b0e06719de0d98dacb258bfeded6ca1c333e2
                                          • Instruction Fuzzy Hash: 5E21E4B59013589FDB10CF9AD584ADEBFF8FB48324F14841AE918A7350D378A940CFA4
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04B99176
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 5f6117dd990faf9d35d2202ee067a4d48d3756a635e9e8dad56519748abb0847
                                          • Instruction ID: a9a1d95bb6379d554a14c03c91123c040c1fc395c09028f45f0b175d06565a83
                                          • Opcode Fuzzy Hash: 5f6117dd990faf9d35d2202ee067a4d48d3756a635e9e8dad56519748abb0847
                                          • Instruction Fuzzy Hash: 622157B19002099FDB10DFAAC4847EEBBF0EB88320F10842AD559A7240C778A945CFA1
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04B99800
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: ae6dc328a782370a331dcafabf93e82bff2678bec7b1f0638d48438696f2db6d
                                          • Instruction ID: 8d9ee14c379df2cc00110b847e433678b87dfd43df6f0c53c4b50c134d80500a
                                          • Opcode Fuzzy Hash: ae6dc328a782370a331dcafabf93e82bff2678bec7b1f0638d48438696f2db6d
                                          • Instruction Fuzzy Hash: CE2116B18002599FDB10DFAAC881ADEBBF5FF48320F10842DE559A7250C778A944CBA5
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04B99176
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 3ed6859c1c6e3b85ff650920c385b90ad80b46834805f043c08f55eb1eb1a10d
                                          • Instruction ID: 11435b75f830557b364e56156257b36228862359853f5b30a3dd9b43070025e3
                                          • Opcode Fuzzy Hash: 3ed6859c1c6e3b85ff650920c385b90ad80b46834805f043c08f55eb1eb1a10d
                                          • Instruction Fuzzy Hash: 922137B19002199FDB10DFAAC4857EEBBF4EB88324F14842AD559A7240C778A945CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04B9923E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 63c5d2c365635bc297a54ff229bbbdb410518a870b28f40b76fbaba540fe568e
                                          • Instruction ID: 9ffcb482bb4c06a87dd0ad743f03552d73b693d3a140a4fa651312690dfa20c9
                                          • Opcode Fuzzy Hash: 63c5d2c365635bc297a54ff229bbbdb410518a870b28f40b76fbaba540fe568e
                                          • Instruction Fuzzy Hash: 3C1156B29002489FCF10DFA9C844BDEBFF5EF88320F208429E519A7250C735A944CFA1
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04B9923E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: d06f0ddc0463d4d3f559ed572cf894cc0b0e553bf7ff4f399c6e559bae5cd757
                                          • Instruction ID: f30a43558e1a6bf0662da14d54355f01c28a5244e0c3dcf390dc6a50d458b72d
                                          • Opcode Fuzzy Hash: d06f0ddc0463d4d3f559ed572cf894cc0b0e553bf7ff4f399c6e559bae5cd757
                                          • Instruction Fuzzy Hash: FE1156B28002488FCF10DFAAC844ADEBFF5EF88320F208429E519A7250C735A944CFA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: d20b90d9d1da58f6cc47230aea6b062a7a1f4869fe70ef646e164775ff53c410
                                          • Instruction ID: e612ac77706afcfeb6007274736a2951f1ffcc621d31821ae2deca742d369df1
                                          • Opcode Fuzzy Hash: d20b90d9d1da58f6cc47230aea6b062a7a1f4869fe70ef646e164775ff53c410
                                          • Instruction Fuzzy Hash: 531166B1D002488FCB20DFAAC4447DEFFF4EB88324F20842AD529A7250CB39A944CF94
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: b235bb4ed5059b4606879598358a66f5ef2b3a162569f85722379524a0908460
                                          • Instruction ID: 36fe1c1a1e6470c2f89afb6b1fcb79d3a8868c5db6cba69a34218ecc5fce14d0
                                          • Opcode Fuzzy Hash: b235bb4ed5059b4606879598358a66f5ef2b3a162569f85722379524a0908460
                                          • Instruction Fuzzy Hash: 5C1136B19002488FDB20DFAAC4457DEFBF4EB88324F24842AD559A7250CB79A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0098B33E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 5c2f29a20e0828429b01ae372b50260fcd6c80af11a2a62da9b6abb3f7c21431
                                          • Instruction ID: 9b4a294851ccf6bd32776879d23cf90a73cf71be976816951919620002898498
                                          • Opcode Fuzzy Hash: 5c2f29a20e0828429b01ae372b50260fcd6c80af11a2a62da9b6abb3f7c21431
                                          • Instruction Fuzzy Hash: B61110B6C003498FCB20DF9AC444ADEFBF8AB88324F14842AD419A7310C379A545CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654243497.00000000008DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_8dd000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac5215b79b75e45b70e5410f741187af25fe5180e0a1f2b60d13f9644789811d
                                          • Instruction ID: 3d39af11fc44a7f622b61802d9e0367a0d5463a933f87e96d4f424383ec8872d
                                          • Opcode Fuzzy Hash: ac5215b79b75e45b70e5410f741187af25fe5180e0a1f2b60d13f9644789811d
                                          • Instruction Fuzzy Hash: 8721F171540344DFCB05DF14E980B26BF75FB98318F20C66AE8098A356C336D856CAA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654294107.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_8ed000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e786e0b96b3bcdefb41e36a9f8e086f1dffcd74e28347fc6399ece7ccd87c35f
                                          • Instruction ID: 4c545bed4f601ea1d26976df8b51f70235ccc3f4dad90b1a8b88dad84f2419e1
                                          • Opcode Fuzzy Hash: e786e0b96b3bcdefb41e36a9f8e086f1dffcd74e28347fc6399ece7ccd87c35f
                                          • Instruction Fuzzy Hash: DA21F271604784DFCB14DF15D984B26BBA5FB85318F28C569D80A8B296C33AD84BCA61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654294107.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_8ed000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 800ac14a21edcc82eddb32aa5a2f8d9aaec8509955ac67b1f4cae810dea4b44a
                                          • Instruction ID: dba6c656d7d51d0370f94f229fc2b313db7e77eba9317e2d61f349a6ebd86e97
                                          • Opcode Fuzzy Hash: 800ac14a21edcc82eddb32aa5a2f8d9aaec8509955ac67b1f4cae810dea4b44a
                                          • Instruction Fuzzy Hash: 49214F755087809FCB02CF14D994711BF71FB56314F28C5EAD8498F2A6C33A985ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654243497.00000000008DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_8dd000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 1dd1bf3cd830e8f5f6a4671b471840034b495ea0f507ff4aa18e8b933a9e8956
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 5111B176504380DFCB16CF14D5C4B16BF71FB94328F24C6AAD8494B656C336D85ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c77da9235e44b6adf2752f2ff5fb57c08ba60461102f8908baf2fb4e01e2b4c8
                                          • Instruction ID: f61796041ae64dc0741db19be8ac9b77d21e87caea07ff7d63e8d5faddd1baeb
                                          • Opcode Fuzzy Hash: c77da9235e44b6adf2752f2ff5fb57c08ba60461102f8908baf2fb4e01e2b4c8
                                          • Instruction Fuzzy Hash: 0A12A5B0401F468AD712CF65FD4C1893BB1BB81318B90432AD265AB7F9D7B8154ACFA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1654575320.0000000000980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_980000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3043e2636e09aba21f3e3111bc7b8c59550d9822f82bcbfa531be40ae2a32b41
                                          • Instruction ID: fe5911c56ac2056a68736f57ca59af3d24020950101aeb15433b9091ca0bf4e6
                                          • Opcode Fuzzy Hash: 3043e2636e09aba21f3e3111bc7b8c59550d9822f82bcbfa531be40ae2a32b41
                                          • Instruction Fuzzy Hash: D1A17F32E102098FCF05EFB5D8509AEB7B6FF84300B15857AE906AB3A5DB31D945CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1656614136.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c810faac26bc4b049e87e0208c84baf442b23d866370c2099e5bce54a8053288
                                          • Instruction ID: f03323136e44f18cd779410647230789ce66b6536dc17d1feaab91d7b600d7d8
                                          • Opcode Fuzzy Hash: c810faac26bc4b049e87e0208c84baf442b23d866370c2099e5bce54a8053288
                                          • Instruction Fuzzy Hash: B4C1F9B0801B468BD712CF65FC481897BB1BB85318F55432BD261AB3F9DBB8154ACF64

                                          Execution Graph

                                          Execution Coverage:10.9%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:168
                                          Total number of Limit Nodes:18
                                          execution_graph 39863 6ae6b28 39864 6ae6b29 GetCurrentProcess 39863->39864 39866 6ae6bb9 39864->39866 39867 6ae6bc0 GetCurrentThread 39864->39867 39866->39867 39868 6ae6bfd GetCurrentProcess 39867->39868 39869 6ae6bf6 39867->39869 39870 6ae6c33 39868->39870 39869->39868 39871 6ae6c5b GetCurrentThreadId 39870->39871 39872 6ae6c8c 39871->39872 39923 6ae3298 39924 6ae3300 CreateWindowExW 39923->39924 39926 6ae33bc 39924->39926 39926->39926 39927 15e0848 39930 15e084e 39927->39930 39928 15e091b 39930->39928 39931 15e1352 39930->39931 39935 15e1366 39931->39935 39932 15e147a 39932->39930 39935->39932 39940 15e8110 39935->39940 39945 15e8120 39935->39945 39949 6ae0210 39935->39949 39957 6ae0202 39935->39957 39965 15e86f0 39935->39965 39969 15e8819 39935->39969 39941 15e8104 39940->39941 39943 15e811f 39940->39943 39941->39935 39942 15e81fa 39942->39935 39943->39942 39974 15e77f8 39943->39974 39946 15e813f 39945->39946 39947 15e77f8 MoveFileA 39946->39947 39948 15e81fa 39946->39948 39947->39948 39948->39935 39950 6ae0222 39949->39950 39952 6ae02d3 39950->39952 39978 6ae0838 39950->39978 39983 6ae0858 39950->39983 39952->39935 39958 6ae0222 39957->39958 39960 6ae02d3 39958->39960 39961 6ae0838 GetModuleHandleW 39958->39961 39962 6ae0858 GetModuleHandleW 39958->39962 39959 6ae0299 39963 6ae82f0 KiUserCallbackDispatcher 39959->39963 39964 6ae8300 KiUserCallbackDispatcher 39959->39964 39960->39935 39961->39959 39962->39959 39963->39960 39964->39960 39966 15e869f MoveFileA 39965->39966 39968 15e86fa 39965->39968 39967 15e86cf 39966->39967 39967->39935 39968->39935 39970 15e8823 39969->39970 39971 15e88d9 39970->39971 40037 6b4f4e0 39970->40037 40042 6b4f4d0 39970->40042 39971->39935 39975 15e8630 MoveFileA 39974->39975 39977 15e86cf 39975->39977 39977->39942 39980 6ae083d 39978->39980 39996 6ae13bb 39980->39996 40002 6ae13d0 39980->40002 39984 6ae0865 39983->39984 39986 6ae13bb GetModuleHandleW 39984->39986 39987 6ae13d0 GetModuleHandleW 39984->39987 39985 6ae0299 39988 6ae82f0 39985->39988 39992 6ae8300 39985->39992 39986->39985 39987->39985 39989 6ae8300 39988->39989 39991 6ae832b 39989->39991 40033 6ae7d7c 39989->40033 39991->39952 39994 6ae8308 39992->39994 39993 6ae7d7c KiUserCallbackDispatcher 39993->39994 39994->39993 39995 6ae832b 39994->39995 39995->39952 39997 6ae13d0 39996->39997 40008 6ae1931 39997->40008 39998 6ae147e 39999 6ae0804 GetModuleHandleW 39998->39999 40000 6ae14aa 39998->40000 39999->40000 40003 6ae13fb 40002->40003 40007 6ae1931 GetModuleHandleW 40003->40007 40004 6ae147e 40005 6ae14aa 40004->40005 40006 6ae0804 GetModuleHandleW 40004->40006 40005->40005 40006->40005 40007->40004 40009 6ae196d 40008->40009 40010 6ae19ee 40009->40010 40013 6ae1fa6 40009->40013 40021 6ae1f17 40009->40021 40014 6ae1fdb 40013->40014 40029 6ae0804 40014->40029 40016 6ae2042 40017 6ae0804 GetModuleHandleW 40016->40017 40020 6ae20bc 40016->40020 40018 6ae2090 40017->40018 40019 6ae0804 GetModuleHandleW 40018->40019 40018->40020 40019->40020 40020->40010 40022 6ae1f22 40021->40022 40023 6ae0804 GetModuleHandleW 40022->40023 40024 6ae2042 40023->40024 40025 6ae0804 GetModuleHandleW 40024->40025 40028 6ae20bc 40024->40028 40026 6ae2090 40025->40026 40027 6ae0804 GetModuleHandleW 40026->40027 40026->40028 40027->40028 40028->40010 40030 6ae21f0 GetModuleHandleW 40029->40030 40032 6ae2265 40030->40032 40032->40016 40034 6ae8340 KiUserCallbackDispatcher 40033->40034 40036 6ae83ae 40034->40036 40036->39989 40039 6b4f4f5 40037->40039 40038 6b4f70a 40038->39971 40039->40038 40040 6b4f720 GlobalMemoryStatusEx GlobalMemoryStatusEx 40039->40040 40041 6b4f97c GlobalMemoryStatusEx GlobalMemoryStatusEx 40039->40041 40040->40039 40041->40039 40044 6b4f4f5 40042->40044 40043 6b4f70a 40043->39971 40044->40043 40045 6b4f720 GlobalMemoryStatusEx GlobalMemoryStatusEx 40044->40045 40046 6b4f97c GlobalMemoryStatusEx GlobalMemoryStatusEx 40044->40046 40045->40044 40046->40044 40047 6ae87b8 40048 6ae87c3 40047->40048 40049 6ae87d3 40048->40049 40051 6ae7fb4 40048->40051 40052 6ae8808 OleInitialize 40051->40052 40053 6ae886c 40052->40053 40053->40049 39873 159d030 39874 159d048 39873->39874 39875 159d0a2 39874->39875 39881 6ae1b9c 39874->39881 39889 6ae3450 39874->39889 39893 6ae3440 39874->39893 39897 6ae34a2 39874->39897 39902 6ae7952 39874->39902 39882 6ae1ba7 39881->39882 39883 6ae79e1 39882->39883 39885 6ae79d1 39882->39885 39919 6ae6adc 39883->39919 39911 6ae7b08 39885->39911 39915 6ae7af8 39885->39915 39886 6ae79df 39890 6ae3476 39889->39890 39891 6ae1b9c CallWindowProcW 39890->39891 39892 6ae3497 39891->39892 39892->39875 39894 6ae3476 39893->39894 39895 6ae1b9c CallWindowProcW 39894->39895 39896 6ae3497 39895->39896 39896->39875 39898 6ae34aa 39897->39898 39899 6ae3474 39897->39899 39898->39875 39900 6ae1b9c CallWindowProcW 39899->39900 39901 6ae3497 39900->39901 39901->39875 39903 6ae795a 39902->39903 39904 6ae796a 39902->39904 39903->39875 39905 6ae79e1 39904->39905 39907 6ae79d1 39904->39907 39906 6ae6adc CallWindowProcW 39905->39906 39908 6ae79df 39906->39908 39909 6ae7af8 CallWindowProcW 39907->39909 39910 6ae7b08 CallWindowProcW 39907->39910 39909->39908 39910->39908 39912 6ae7b16 39911->39912 39913 6ae6adc CallWindowProcW 39912->39913 39914 6ae7bee 39912->39914 39913->39912 39914->39886 39917 6ae7b08 39915->39917 39916 6ae6adc CallWindowProcW 39916->39917 39917->39916 39918 6ae7bee 39917->39918 39918->39886 39920 6ae6ae7 39919->39920 39921 6ae7ca2 CallWindowProcW 39920->39921 39922 6ae7c51 39920->39922 39921->39922 39922->39886 40054 6ae21d3 40055 6ae21f0 GetModuleHandleW 40054->40055 40057 6ae2265 40055->40057 40058 15e8060 40059 15e80a6 DeleteFileW 40058->40059 40061 15e80df 40059->40061 40062 6aea710 40063 6aea754 SetWindowsHookExA 40062->40063 40065 6aea79a 40063->40065 40066 6ae6d70 DuplicateHandle 40067 6ae6e06 40066->40067 40068 6ae8950 40069 6ae89aa OleGetClipboard 40068->40069 40070 6ae89ea 40069->40070

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 125 6b43018-6b43039 126 6b4303b-6b4303e 125->126 127 6b43064-6b43067 126->127 128 6b43040-6b4305f 126->128 129 6b4306d-6b4308c 127->129 130 6b43808-6b4380a 127->130 128->127 138 6b430a5-6b430af 129->138 139 6b4308e-6b43091 129->139 132 6b43811-6b43814 130->132 133 6b4380c 130->133 132->126 135 6b4381a-6b43823 132->135 133->132 143 6b430b5-6b430c4 138->143 139->138 140 6b43093-6b430a3 139->140 140->143 251 6b430c6 call 6b43831 143->251 252 6b430c6 call 6b43838 143->252 144 6b430cb-6b430d0 145 6b430d2-6b430d8 144->145 146 6b430dd-6b433ba 144->146 145->135 167 6b433c0-6b4346f 146->167 168 6b437fa-6b43807 146->168 177 6b43471-6b43496 167->177 178 6b43498 167->178 180 6b434a1-6b434b4 177->180 178->180 182 6b437e1-6b437ed 180->182 183 6b434ba-6b434dc 180->183 182->167 184 6b437f3 182->184 183->182 186 6b434e2-6b434ec 183->186 184->168 186->182 187 6b434f2-6b434fd 186->187 187->182 188 6b43503-6b435d9 187->188 200 6b435e7-6b43617 188->200 201 6b435db-6b435dd 188->201 205 6b43625-6b43631 200->205 206 6b43619-6b4361b 200->206 201->200 207 6b43691-6b43695 205->207 208 6b43633-6b43637 205->208 206->205 210 6b437d2-6b437db 207->210 211 6b4369b-6b436d7 207->211 208->207 209 6b43639-6b43663 208->209 218 6b43665-6b43667 209->218 219 6b43671-6b4368e 209->219 210->182 210->188 221 6b436e5-6b436f3 211->221 222 6b436d9-6b436db 211->222 218->219 219->207 225 6b436f5-6b43700 221->225 226 6b4370a-6b43715 221->226 222->221 225->226 229 6b43702 225->229 230 6b43717-6b4371d 226->230 231 6b4372d-6b4373e 226->231 229->226 232 6b43721-6b43723 230->232 233 6b4371f 230->233 235 6b43756-6b43762 231->235 236 6b43740-6b43746 231->236 232->231 233->231 240 6b43764-6b4376a 235->240 241 6b4377a-6b437cb 235->241 237 6b43748 236->237 238 6b4374a-6b4374c 236->238 237->235 238->235 242 6b4376c 240->242 243 6b4376e-6b43770 240->243 241->210 242->241 243->241 251->144 252->144
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: d8587e73eaa38775faeb24de94c68bd0cb1362a2e7d2a68658caefc0f178e158
                                          • Instruction ID: 43157a513587abba5a010c0d328fb6204e7cd4673bc95682255a96661c857aa2
                                          • Opcode Fuzzy Hash: d8587e73eaa38775faeb24de94c68bd0cb1362a2e7d2a68658caefc0f178e158
                                          • Instruction Fuzzy Hash: 32322F31E1061ACFDB14EF75C85499DB7F6FF89300F1486A9D449AB264EB30D985CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 712 6b478f8-6b47916 713 6b47918-6b4791b 712->713 714 6b4791d-6b47939 713->714 715 6b4793e-6b47941 713->715 714->715 717 6b47943-6b4794d 715->717 718 6b4794e-6b47951 715->718 720 6b47953-6b47961 718->720 721 6b47968-6b4796b 718->721 728 6b4799e-6b479b4 720->728 729 6b47963 720->729 723 6b4798c-6b4798e 721->723 724 6b4796d-6b47987 721->724 725 6b47995-6b47998 723->725 726 6b47990 723->726 724->723 725->713 725->728 726->725 733 6b47bcf-6b47bd9 728->733 734 6b479ba-6b479c3 728->734 729->721 735 6b479c9-6b479e6 734->735 736 6b47bda-6b47c0f 734->736 745 6b47bbc-6b47bc9 735->745 746 6b479ec-6b47a14 735->746 739 6b47c11-6b47c14 736->739 741 6b47cc1-6b47cc4 739->741 742 6b47c1a-6b47c26 739->742 743 6b47cc6-6b47ce2 741->743 744 6b47ce7-6b47cea 741->744 747 6b47c31-6b47c33 742->747 743->744 748 6b47cf0-6b47cff 744->748 749 6b47f1f-6b47f21 744->749 745->733 745->734 746->745 767 6b47a1a-6b47a23 746->767 750 6b47c35-6b47c3b 747->750 751 6b47c4b-6b47c4f 747->751 764 6b47d01-6b47d1c 748->764 765 6b47d1e-6b47d62 748->765 753 6b47f23 749->753 754 6b47f28-6b47f2b 749->754 756 6b47c3d 750->756 757 6b47c3f-6b47c41 750->757 758 6b47c51-6b47c5b 751->758 759 6b47c5d 751->759 753->754 754->739 760 6b47f31-6b47f3a 754->760 756->751 757->751 762 6b47c62-6b47c64 758->762 759->762 768 6b47c66-6b47c69 762->768 769 6b47c7b-6b47cb4 762->769 764->765 773 6b47ef3-6b47f09 765->773 774 6b47d68-6b47d79 765->774 767->736 771 6b47a29-6b47a45 767->771 768->760 769->748 792 6b47cb6-6b47cc0 769->792 779 6b47baa-6b47bb6 771->779 780 6b47a4b-6b47a75 771->780 773->749 783 6b47ede-6b47eed 774->783 784 6b47d7f-6b47d9c 774->784 779->745 779->767 796 6b47ba0-6b47ba5 780->796 797 6b47a7b-6b47aa3 780->797 783->773 783->774 784->783 795 6b47da2-6b47e98 call 6b46110 784->795 846 6b47ea6 795->846 847 6b47e9a-6b47ea4 795->847 796->779 797->796 803 6b47aa9-6b47ad7 797->803 803->796 809 6b47add-6b47ae6 803->809 809->796 810 6b47aec-6b47b1e 809->810 818 6b47b20-6b47b24 810->818 819 6b47b29-6b47b45 810->819 818->796 822 6b47b26 818->822 819->779 820 6b47b47-6b47b9e call 6b46110 819->820 820->779 822->819 848 6b47eab-6b47ead 846->848 847->848 848->783 849 6b47eaf-6b47eb4 848->849 850 6b47eb6-6b47ec0 849->850 851 6b47ec2 849->851 852 6b47ec7-6b47ec9 850->852 851->852 852->783 853 6b47ecb-6b47ed7 852->853 853->783
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: e327418e8edc04aa6be7aaa7e314333328a015a4be05c6677cc1239b1ad5cbe0
                                          • Instruction ID: b5cacdf71052e9978992ed2e22b644ff94f86265707179767493740e8f7a5b64
                                          • Opcode Fuzzy Hash: e327418e8edc04aa6be7aaa7e314333328a015a4be05c6677cc1239b1ad5cbe0
                                          • Instruction Fuzzy Hash: F1029D70B102169FDB54EF68D490AAEB7E2FF84204F1485B9D40AAB395DF35EC42CB91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 13656e1ee81d1ec1028b179bd441428162d34443f2c5f9c00bd5b6f7a3a8a4e0
                                          • Instruction ID: 40aa4dbecd3e039926e9a60100256d456de4a52d76c2e735c5f614383baf6083
                                          • Opcode Fuzzy Hash: 13656e1ee81d1ec1028b179bd441428162d34443f2c5f9c00bd5b6f7a3a8a4e0
                                          • Instruction Fuzzy Hash: 27927774A00204CFDB64EB68C184A5DBBF2FF45314F5494A9E849AB361DB35ED86EB80
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8c11f1ecb524ad27b3ef376aa9473214756e7c96d9add1d33c299ac37caf610
                                          • Instruction ID: 103adef6b2304c88438682fe0775073ab9b571398f90068c6d52725a5d972b5e
                                          • Opcode Fuzzy Hash: d8c11f1ecb524ad27b3ef376aa9473214756e7c96d9add1d33c299ac37caf610
                                          • Instruction Fuzzy Hash: CD62BF70B002058FDB54EB68D594BADB7F2EF85314F1494A9E40AEB361EB35EC46DB80
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b7292f0ee8fbc2ccf359bc70f36bc62d29b7057b7854e7d1c0c5b87ded25cea
                                          • Instruction ID: 5b7a75b1b916d94e09a7d5d4bfc65b75c999d67ddf45ffb64de1ad5580cb3ee5
                                          • Opcode Fuzzy Hash: 1b7292f0ee8fbc2ccf359bc70f36bc62d29b7057b7854e7d1c0c5b87ded25cea
                                          • Instruction Fuzzy Hash: 7232DE74B012099FDB54EF68D890BAEBBB2FB88710F109465D405EB365DB34EC42DB91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9cc0645e050c76ab044f9ea315980c4252acf71f2ef7ab163395f1afbba9bcb1
                                          • Instruction ID: 6509eeeb3ea46d357f51c2405cc0fa0dee312387ba2c17c5c92296a71c515601
                                          • Opcode Fuzzy Hash: 9cc0645e050c76ab044f9ea315980c4252acf71f2ef7ab163395f1afbba9bcb1
                                          • Instruction Fuzzy Hash: E6121472F006159FDB70EF64C8907AEB7B2EB85310F1084AAD84ADB345DA34EC46DB91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ec036fa8b96eb6181710a2754d0a3bcd4dd0d447d6550cb57149f554e45a9b0
                                          • Instruction ID: 33677839f8689025fd2611028e593c09754c9dcd1c2affebbe787548fdfff138
                                          • Opcode Fuzzy Hash: 4ec036fa8b96eb6181710a2754d0a3bcd4dd0d447d6550cb57149f554e45a9b0
                                          • Instruction Fuzzy Hash: 0122B6B0E101099FDF64EB68C4907AEB7B1FB85310F209866E519EB355CB35DC82DB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 6b4a838-6b4a856 1 6b4a858-6b4a85b 0->1 2 6b4a85d-6b4a866 1->2 3 6b4a86b-6b4a86e 1->3 2->3 4 6b4a870-6b4a88c 3->4 5 6b4a891-6b4a894 3->5 4->5 6 6b4a896-6b4a8a9 5->6 7 6b4a8ae-6b4a8b1 5->7 6->7 8 6b4a8c5-6b4a8c8 7->8 9 6b4a8b3-6b4a8c0 7->9 11 6b4a8d2-6b4a8d5 8->11 12 6b4a8ca-6b4a8cf 8->12 9->8 15 6b4a8d7-6b4a8e0 11->15 16 6b4a8ef-6b4a8f2 11->16 12->11 18 6b4a8e6-6b4a8ea 15->18 19 6b4aa6f-6b4aaa6 15->19 20 6b4aa55-6b4aa5e 16->20 21 6b4a8f8-6b4a8fb 16->21 18->16 30 6b4aaa8-6b4aaab 19->30 20->15 22 6b4aa64-6b4aa6e 20->22 23 6b4a90c-6b4a90e 21->23 24 6b4a8fd-6b4a901 21->24 27 6b4a915-6b4a918 23->27 28 6b4a910 23->28 24->22 26 6b4a907 24->26 26->23 27->1 29 6b4a91e-6b4a942 27->29 28->27 44 6b4aa52 29->44 45 6b4a948-6b4a957 29->45 31 6b4aaad-6b4aab1 30->31 32 6b4aab8-6b4aabb 30->32 33 6b4aae7-6b4ab22 31->33 34 6b4aab3 31->34 36 6b4aabd-6b4aad9 32->36 37 6b4aade-6b4aae1 32->37 48 6b4ad15-6b4ad28 33->48 49 6b4ab28-6b4ab34 33->49 34->32 36->37 37->33 38 6b4ad4a-6b4ad4d 37->38 41 6b4ad4f-6b4ad59 38->41 42 6b4ad5a-6b4ad5d 38->42 46 6b4ad6c-6b4ad6e 42->46 47 6b4ad5f call 6b4ad90 42->47 44->20 60 6b4a96f-6b4a9aa call 6b46110 45->60 61 6b4a959-6b4a95f 45->61 52 6b4ad75-6b4ad78 46->52 53 6b4ad70 46->53 56 6b4ad65-6b4ad67 47->56 51 6b4ad2a 48->51 58 6b4ab54-6b4ab98 49->58 59 6b4ab36-6b4ab4f 49->59 62 6b4ad2b 51->62 52->30 57 6b4ad7e-6b4ad88 52->57 53->52 56->46 76 6b4abb4-6b4abf3 58->76 77 6b4ab9a-6b4abac 58->77 59->51 78 6b4a9c2-6b4a9d9 60->78 79 6b4a9ac-6b4a9b2 60->79 63 6b4a961 61->63 64 6b4a963-6b4a965 61->64 62->62 63->60 64->60 85 6b4abf9-6b4acd4 call 6b46110 76->85 86 6b4acda-6b4acef 76->86 77->76 90 6b4a9f1-6b4aa02 78->90 91 6b4a9db-6b4a9e1 78->91 80 6b4a9b4 79->80 81 6b4a9b6-6b4a9b8 79->81 80->78 81->78 85->86 86->48 98 6b4aa04-6b4aa0a 90->98 99 6b4aa1a-6b4aa4b 90->99 93 6b4a9e5-6b4a9e7 91->93 94 6b4a9e3 91->94 93->90 94->90 101 6b4aa0c 98->101 102 6b4aa0e-6b4aa10 98->102 99->44 101->99 102->99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 261f5f9b37f2ecf102a7e154d29dd1de6e693a17d9c61e4721c7f8117778565a
                                          • Instruction ID: ee028b97cbc004f86578ccaf7ced90867d3fc231b61b20d48cc8ea0ed339427d
                                          • Opcode Fuzzy Hash: 261f5f9b37f2ecf102a7e154d29dd1de6e693a17d9c61e4721c7f8117778565a
                                          • Instruction Fuzzy Hash: 40E1AF70F5020A8FDB59EF68D5806AEB7B2FF85300F108569D409AB359EB35DC46DB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 253 6ae6b19-6ae6b20 254 6ae6b29-6ae6bb7 GetCurrentProcess 253->254 255 6ae6b22-6ae6b28 253->255 260 6ae6bb9-6ae6bbf 254->260 261 6ae6bc0-6ae6bf4 GetCurrentThread 254->261 255->254 260->261 262 6ae6bfd-6ae6c31 GetCurrentProcess 261->262 263 6ae6bf6-6ae6bfc 261->263 265 6ae6c3a-6ae6c55 call 6ae6cf8 262->265 266 6ae6c33-6ae6c39 262->266 263->262 268 6ae6c5b-6ae6c8a GetCurrentThreadId 265->268 266->265 270 6ae6c8c-6ae6c92 268->270 271 6ae6c93-6ae6cf5 268->271 270->271
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06AE6BA6
                                          • GetCurrentThread.KERNEL32 ref: 06AE6BE3
                                          • GetCurrentProcess.KERNEL32 ref: 06AE6C20
                                          • GetCurrentThreadId.KERNEL32 ref: 06AE6C79
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: a2800117e0e96495506e5d29c359d69075fc62d2c6b7a22a194b77c481c981a8
                                          • Instruction ID: 51d0aaaa28828444e1fb88eb3a8aa6229753d92fcf6cad1b60d45df7b4064e36
                                          • Opcode Fuzzy Hash: a2800117e0e96495506e5d29c359d69075fc62d2c6b7a22a194b77c481c981a8
                                          • Instruction Fuzzy Hash: BE5157B0D00649CFDB54EFAAD948BDEBBF1EB88304F208459E119A7261D734A944CF66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 278 6ae6b28-6ae6bb7 GetCurrentProcess 283 6ae6bb9-6ae6bbf 278->283 284 6ae6bc0-6ae6bf4 GetCurrentThread 278->284 283->284 285 6ae6bfd-6ae6c31 GetCurrentProcess 284->285 286 6ae6bf6-6ae6bfc 284->286 288 6ae6c3a-6ae6c55 call 6ae6cf8 285->288 289 6ae6c33-6ae6c39 285->289 286->285 291 6ae6c5b-6ae6c8a GetCurrentThreadId 288->291 289->288 293 6ae6c8c-6ae6c92 291->293 294 6ae6c93-6ae6cf5 291->294 293->294
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06AE6BA6
                                          • GetCurrentThread.KERNEL32 ref: 06AE6BE3
                                          • GetCurrentProcess.KERNEL32 ref: 06AE6C20
                                          • GetCurrentThreadId.KERNEL32 ref: 06AE6C79
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 09a31fd8401986d342e6392b07bc98b750c652afd2b5f16f6712d34050245f8c
                                          • Instruction ID: d6ec4a418b4600540c655a173ae24c32d0bcdb8f15e72e198195be9a78ede530
                                          • Opcode Fuzzy Hash: 09a31fd8401986d342e6392b07bc98b750c652afd2b5f16f6712d34050245f8c
                                          • Instruction Fuzzy Hash: 355148B0D00209CFDB54EFA9D948BDEFBF1EB88304F208459E519A7260D734A944CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 301 6b48cc8-6b48ced 302 6b48cef-6b48cf2 301->302 303 6b495b0-6b495b3 302->303 304 6b48cf8-6b48d0d 302->304 305 6b495b5-6b495d4 303->305 306 6b495d9-6b495db 303->306 311 6b48d25-6b48d3b 304->311 312 6b48d0f-6b48d15 304->312 305->306 308 6b495e2-6b495e5 306->308 309 6b495dd 306->309 308->302 313 6b495eb-6b495f5 308->313 309->308 318 6b48d46-6b48d48 311->318 314 6b48d17 312->314 315 6b48d19-6b48d1b 312->315 314->311 315->311 319 6b48d60-6b48dd1 318->319 320 6b48d4a-6b48d50 318->320 331 6b48dd3-6b48df6 319->331 332 6b48dfd-6b48e19 319->332 321 6b48d54-6b48d56 320->321 322 6b48d52 320->322 321->319 322->319 331->332 337 6b48e45-6b48e60 332->337 338 6b48e1b-6b48e3e 332->338 343 6b48e62-6b48e84 337->343 344 6b48e8b-6b48ea6 337->344 338->337 343->344 349 6b48ea8-6b48ec4 344->349 350 6b48ecb-6b48ed9 344->350 349->350 351 6b48ee9-6b48f63 350->351 352 6b48edb-6b48ee4 350->352 358 6b48f65-6b48f83 351->358 359 6b48fb0-6b48fc5 351->359 352->313 363 6b48f85-6b48f94 358->363 364 6b48f9f-6b48fae 358->364 359->303 363->364 364->358 364->359
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: acd324f607ba2876fb0a7672f73cfa8a30e54e186d2569fbb006e29cb5de4438
                                          • Instruction ID: db8492164aa84dab022285fa4855b27d7739f18c379cb9ad348480fb4f3cb4f8
                                          • Opcode Fuzzy Hash: acd324f607ba2876fb0a7672f73cfa8a30e54e186d2569fbb006e29cb5de4438
                                          • Instruction Fuzzy Hash: AC912E70B0021A9FDB54EF65D9507AEB3F6EFC9204F108569C409EB354EB74EC468B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 367 6b4cec8-6b4cee3 368 6b4cee5-6b4cee8 367->368 369 6b4cef2-6b4cef5 368->369 370 6b4ceea-6b4ceef 368->370 371 6b4cef7-6b4cf39 369->371 372 6b4cf3e-6b4cf41 369->372 370->369 371->372 373 6b4cf43-6b4cf85 372->373 374 6b4cf8a-6b4cf8d 372->374 373->374 376 6b4cfd6-6b4cfd9 374->376 377 6b4cf8f-6b4cfd1 374->377 379 6b4cfe8-6b4cfeb 376->379 380 6b4cfdb-6b4cfdd 376->380 377->376 384 6b4d034-6b4d037 379->384 385 6b4cfed-6b4d02f 379->385 382 6b4cfe3 380->382 383 6b4d26f-6b4d278 380->383 382->379 390 6b4d287-6b4d293 383->390 391 6b4d27a-6b4d27f 383->391 388 6b4d080-6b4d083 384->388 389 6b4d039-6b4d07b 384->389 385->384 393 6b4d085-6b4d0c7 388->393 394 6b4d0cc-6b4d0cf 388->394 389->388 396 6b4d3a4-6b4d3a9 390->396 397 6b4d299-6b4d2ad 390->397 391->390 393->394 399 6b4d0d1-6b4d113 394->399 400 6b4d118-6b4d11b 394->400 411 6b4d3b1 396->411 397->411 412 6b4d2b3-6b4d2c5 397->412 399->400 408 6b4d3b4-6b4d3c0 400->408 409 6b4d121-6b4d124 400->409 414 6b4d3c6-6b4d6b3 408->414 415 6b4d14c-6b4d15b 408->415 418 6b4d126-6b4d142 409->418 419 6b4d147-6b4d14a 409->419 411->408 442 6b4d2c7-6b4d2cd 412->442 443 6b4d2e9-6b4d2eb 412->443 579 6b4d6b9-6b4d6bf 414->579 580 6b4d8da-6b4d8e4 414->580 421 6b4d15d-6b4d162 415->421 422 6b4d16a-6b4d176 415->422 418->419 419->415 420 6b4d193-6b4d196 419->420 429 6b4d1a5-6b4d1a8 420->429 430 6b4d198-6b4d19a 420->430 421->422 427 6b4d8e5-6b4d91e 422->427 428 6b4d17c-6b4d18e 422->428 458 6b4d920-6b4d923 427->458 428->420 440 6b4d1f1-6b4d1f4 429->440 441 6b4d1aa-6b4d1ec 429->441 430->411 439 6b4d1a0 430->439 439->429 454 6b4d1f6-6b4d20c 440->454 455 6b4d211-6b4d214 440->455 441->440 450 6b4d2d1-6b4d2dd 442->450 451 6b4d2cf 442->451 448 6b4d2f5-6b4d301 443->448 481 6b4d303-6b4d30d 448->481 482 6b4d30f 448->482 461 6b4d2df-6b4d2e7 450->461 451->461 454->455 456 6b4d216-6b4d225 455->456 457 6b4d25d-6b4d25f 455->457 464 6b4d234-6b4d240 456->464 465 6b4d227-6b4d22c 456->465 469 6b4d266-6b4d269 457->469 470 6b4d261 457->470 466 6b4d925-6b4d941 458->466 467 6b4d946-6b4d949 458->467 461->448 464->427 475 6b4d246-6b4d258 464->475 465->464 466->467 476 6b4d97c-6b4d97f 467->476 477 6b4d94b-6b4d977 467->477 469->368 469->383 470->469 475->457 484 6b4d981 call 6b4da3d 476->484 485 6b4d98e-6b4d990 476->485 477->476 486 6b4d314-6b4d316 481->486 482->486 496 6b4d987-6b4d989 484->496 491 6b4d997-6b4d99a 485->491 492 6b4d992 485->492 486->411 494 6b4d31c-6b4d338 call 6b46110 486->494 491->458 497 6b4d99c-6b4d9ab 491->497 492->491 508 6b4d347-6b4d353 494->508 509 6b4d33a-6b4d33f 494->509 496->485 505 6b4da12-6b4da27 497->505 506 6b4d9ad-6b4da10 call 6b46110 497->506 506->505 508->396 512 6b4d355-6b4d3a2 508->512 509->508 512->411 581 6b4d6c1-6b4d6c6 579->581 582 6b4d6ce-6b4d6d7 579->582 581->582 582->427 583 6b4d6dd-6b4d6f0 582->583 585 6b4d6f6-6b4d6fc 583->585 586 6b4d8ca-6b4d8d4 583->586 587 6b4d6fe-6b4d703 585->587 588 6b4d70b-6b4d714 585->588 586->579 586->580 587->588 588->427 589 6b4d71a-6b4d73b 588->589 592 6b4d73d-6b4d742 589->592 593 6b4d74a-6b4d753 589->593 592->593 593->427 594 6b4d759-6b4d776 593->594 594->586 597 6b4d77c-6b4d782 594->597 597->427 598 6b4d788-6b4d7a1 597->598 600 6b4d7a7-6b4d7ce 598->600 601 6b4d8bd-6b4d8c4 598->601 600->427 604 6b4d7d4-6b4d7de 600->604 601->586 601->597 604->427 605 6b4d7e4-6b4d7fb 604->605 607 6b4d7fd-6b4d808 605->607 608 6b4d80a-6b4d825 605->608 607->608 608->601 613 6b4d82b-6b4d844 call 6b46110 608->613 617 6b4d846-6b4d84b 613->617 618 6b4d853-6b4d85c 613->618 617->618 618->427 619 6b4d862-6b4d8b6 618->619 619->601
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 577f4df4781697266b47d18653d30b60f152614db0ee60ad5dc6dd1c776cf0d3
                                          • Instruction ID: 77b08350b098637c5c924910fbbaec2da51aa177d0d0d70665f090868d8b3769
                                          • Opcode Fuzzy Hash: 577f4df4781697266b47d18653d30b60f152614db0ee60ad5dc6dd1c776cf0d3
                                          • Instruction Fuzzy Hash: 35625270A4020A9FCB55EF68D590A5EB7F2FF84304F208969D4099F369EB75EC46CB80

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 627 6b44718-6b4473c 628 6b4473e-6b44741 627->628 629 6b44747-6b4483f 628->629 630 6b44e20-6b44e23 628->630 650 6b44845-6b44892 call 6b44fc0 629->650 651 6b448c2-6b448c9 629->651 631 6b44e44-6b44e46 630->631 632 6b44e25-6b44e3f 630->632 633 6b44e4d-6b44e50 631->633 634 6b44e48 631->634 632->631 633->628 636 6b44e56-6b44e63 633->636 634->633 664 6b44898-6b448b4 650->664 652 6b4494d-6b44956 651->652 653 6b448cf-6b4493f 651->653 652->636 670 6b44941 653->670 671 6b4494a 653->671 667 6b448b6 664->667 668 6b448bf 664->668 667->668 668->651 670->671 671->652
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: 09fe4b5636817b4ec23e35aceec025db83cde99329a1cf91e92893ed6cef8d06
                                          • Instruction ID: 21509f3aaebb596659de01990f54c4fd10cd8bbef339ecfb0a7017d133009f57
                                          • Opcode Fuzzy Hash: 09fe4b5636817b4ec23e35aceec025db83cde99329a1cf91e92893ed6cef8d06
                                          • Instruction Fuzzy Hash: 80618F70F002199FEB54AFA4C8547AEBBF6FB88700F208469D106AB395DB758C469B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 673 15e86f0-15e86f8 674 15e869f-15e86cd MoveFileA 673->674 675 15e86fa-15e8715 673->675 677 15e86cf-15e86d5 674->677 678 15e86d6-15e86ea 674->678 679 15e8717-15e871a 675->679 677->678 680 15e871c-15e8730 679->680 681 15e874d-15e8750 679->681 690 15e8736 680->690 691 15e8732-15e8734 680->691 683 15e8752 call 15e9127 681->683 684 15e8760-15e8763 681->684 692 15e8758-15e875b 683->692 686 15e8777-15e877a 684->686 687 15e8765-15e876c 684->687 688 15e877c-15e87b1 686->688 689 15e87b6-15e87b8 686->689 693 15e8928-15e892f 687->693 694 15e8772 687->694 688->689 695 15e87bf-15e87c2 689->695 696 15e87ba 689->696 699 15e8739-15e8748 690->699 691->699 692->684 697 15e893e-15e8945 693->697 698 15e8931 call 15efa4a 693->698 694->686 695->679 700 15e87c8-15e87d7 695->700 696->695 701 15e8937 698->701 699->681 704 15e87d9-15e87dc 700->704 705 15e8801-15e8816 700->705 701->697 707 15e87e4-15e87ff 704->707 705->693 707->704 707->705
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 015E86C0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID: LR^q
                                          • API String ID: 3562171763-2625958711
                                          • Opcode ID: fde2412daf250eeeb4b3057235a4a700c26d38f5b3aca05244ecec9c4648a876
                                          • Instruction ID: 2f9d96350c2ab558272a045f94bb30fec0da7afb9a5fef42d7f779040e79c3d9
                                          • Opcode Fuzzy Hash: fde2412daf250eeeb4b3057235a4a700c26d38f5b3aca05244ecec9c4648a876
                                          • Instruction Fuzzy Hash: 87418B70E102099FDF19DFA9C84879EBBF2FB86304F248829E905EB280D7759846CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1477 6b48cb7-6b48ced 1480 6b48cef-6b48cf2 1477->1480 1481 6b495b0-6b495b3 1480->1481 1482 6b48cf8-6b48d0d 1480->1482 1483 6b495b5-6b495d4 1481->1483 1484 6b495d9-6b495db 1481->1484 1489 6b48d25-6b48d3b 1482->1489 1490 6b48d0f-6b48d15 1482->1490 1483->1484 1486 6b495e2-6b495e5 1484->1486 1487 6b495dd 1484->1487 1486->1480 1491 6b495eb-6b495f5 1486->1491 1487->1486 1496 6b48d46-6b48d48 1489->1496 1492 6b48d17 1490->1492 1493 6b48d19-6b48d1b 1490->1493 1492->1489 1493->1489 1497 6b48d60-6b48dd1 1496->1497 1498 6b48d4a-6b48d50 1496->1498 1509 6b48dd3-6b48df6 1497->1509 1510 6b48dfd-6b48e19 1497->1510 1499 6b48d54-6b48d56 1498->1499 1500 6b48d52 1498->1500 1499->1497 1500->1497 1509->1510 1515 6b48e45-6b48e60 1510->1515 1516 6b48e1b-6b48e3e 1510->1516 1521 6b48e62-6b48e84 1515->1521 1522 6b48e8b-6b48ea6 1515->1522 1516->1515 1521->1522 1527 6b48ea8-6b48ec4 1522->1527 1528 6b48ecb-6b48ed9 1522->1528 1527->1528 1529 6b48ee9-6b48f63 1528->1529 1530 6b48edb-6b48ee4 1528->1530 1536 6b48f65-6b48f83 1529->1536 1537 6b48fb0-6b48fc5 1529->1537 1530->1491 1541 6b48f85-6b48f94 1536->1541 1542 6b48f9f-6b48fae 1536->1542 1537->1481 1541->1542 1542->1536 1542->1537
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 31254f6eb9844a829fb73970872ca459e7348a6f52414c6e0650b4c5a4e39a39
                                          • Instruction ID: d0fae6b0dbe1e677ec98f2e00d3002783fa4e153e99b2ff967943c3dcfe1bc12
                                          • Opcode Fuzzy Hash: 31254f6eb9844a829fb73970872ca459e7348a6f52414c6e0650b4c5a4e39a39
                                          • Instruction Fuzzy Hash: 02512D70B00119AFDB54EF65D990A6EB3F6EFC8604F10846AC909EB354EB34EC428B95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1607 6ae328d-6ae32fe 1609 6ae3309-6ae3310 1607->1609 1610 6ae3300-6ae3306 1607->1610 1611 6ae331b-6ae3353 1609->1611 1612 6ae3312-6ae3318 1609->1612 1610->1609 1613 6ae335b-6ae33ba CreateWindowExW 1611->1613 1612->1611 1614 6ae33bc-6ae33c2 1613->1614 1615 6ae33c3-6ae33fb 1613->1615 1614->1615 1619 6ae33fd-6ae3400 1615->1619 1620 6ae3408 1615->1620 1619->1620 1621 6ae3409 1620->1621 1621->1621
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AE33AA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: a1856c7f4f7a379c5e0eae127002130f30bb41e69edc3dc9e41f57f8d3183729
                                          • Instruction ID: e1374ccac2dfa5b18cf8979e10542ccd965b112c6a23f7c20b19b2c383031c5f
                                          • Opcode Fuzzy Hash: a1856c7f4f7a379c5e0eae127002130f30bb41e69edc3dc9e41f57f8d3183729
                                          • Instruction Fuzzy Hash: F751CFB1D00309AFDF14DF9AC984ADEFBB5BF48310F24812AE419AB210D775A885CF91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AE33AA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 786c1a32c1355f4a0e25465ad2c334c7a37ef014b5496d7b34b9fb72fdb64af9
                                          • Instruction ID: dfd690e3d33a53e3850edd1b67eb2117b9fa1a6d2ce46d62ecec33e62c97fcbe
                                          • Opcode Fuzzy Hash: 786c1a32c1355f4a0e25465ad2c334c7a37ef014b5496d7b34b9fb72fdb64af9
                                          • Instruction Fuzzy Hash: 5441AEB1D003099FDF14DF9AC984ADEFBB5BF48310F24812AE419AB250D775A845CF91
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 06AE7CC9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: 4b3ed3c6661891b5a6fafc247a7769fdc446ece14d93a0a4b4bc9e9a1b5ca36d
                                          • Instruction ID: 1c3b267034746bc01499d17192e14df6380ecb9c6026562d41fbf6f0c329a620
                                          • Opcode Fuzzy Hash: 4b3ed3c6661891b5a6fafc247a7769fdc446ece14d93a0a4b4bc9e9a1b5ca36d
                                          • Instruction Fuzzy Hash: 7B4117B5A00315CFDB54DF99C888AAABBF9FB88314F24C459D519AB321D774E841CFA0
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 015E86C0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: 596e5ceb55915794dfd307428009036bb05955ec5cacfdf569f1ec76c2c1ff64
                                          • Instruction ID: 145262a305123a7566b7ce71a7ba91aa96e15914a829e3cb7689b10f47ac1ecb
                                          • Opcode Fuzzy Hash: 596e5ceb55915794dfd307428009036bb05955ec5cacfdf569f1ec76c2c1ff64
                                          • Instruction Fuzzy Hash: AD3178B2C053589FCB01CFA9D844ADEBFF1BF89320F14849AD958AB252C3349944CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Clipboard
                                          • String ID:
                                          • API String ID: 220874293-0
                                          • Opcode ID: ac1e5efbef651ea0b479ae967ff20ea02318ed1f8181d003d1aec001a91fda09
                                          • Instruction ID: 74667a424f3b93d9c5a90c108a885e2b65ef0988b1e63c58f3a66622c3e18868
                                          • Opcode Fuzzy Hash: ac1e5efbef651ea0b479ae967ff20ea02318ed1f8181d003d1aec001a91fda09
                                          • Instruction Fuzzy Hash: B83124B0E01249DFDB54DFA8C984BDEBBF1AF48304F248059E408BB294DBB8A845CF55
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Clipboard
                                          • String ID:
                                          • API String ID: 220874293-0
                                          • Opcode ID: c0ad07e5201f50e211dc98337a780aa4e3268570062c2adb8e2cb399f5c1422a
                                          • Instruction ID: e7b5db04816de49272456183ada1e9a665e44a30346462ed6e9969d51220a811
                                          • Opcode Fuzzy Hash: c0ad07e5201f50e211dc98337a780aa4e3268570062c2adb8e2cb399f5c1422a
                                          • Instruction Fuzzy Hash: D73122B0D01208DFDB54DF99C984BCEBBF5AF48304F248019E408BB294DBB4A845CF95
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06AE6DF7
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 015c1fb38596d7383f0b52e11d89616749e6636c4209c80374bedc397379e327
                                          • Instruction ID: e7d9addf19736aa0f5421d86f3dfa61534386e1389855a43085f62995e2fe919
                                          • Opcode Fuzzy Hash: 015c1fb38596d7383f0b52e11d89616749e6636c4209c80374bedc397379e327
                                          • Instruction Fuzzy Hash: 8D21E6B5D00258EFDB10DFAAD984ADEBFF5EB48310F14841AE954A7350C374A944CFA5
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 015E86C0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: ae0cc87e5529c48c910a066080cb6d835a5a79df5ce6604e9e29dbecd22128dd
                                          • Instruction ID: d50e5e15804d2dac1291746a1ad4e8833f7a0c101b206af4dd82319a474f587f
                                          • Opcode Fuzzy Hash: ae0cc87e5529c48c910a066080cb6d835a5a79df5ce6604e9e29dbecd22128dd
                                          • Instruction Fuzzy Hash: 7F2125B6C012189FCB14CF99D984ADEFFF1FB88310F14845AE918AB214C775A944CFA4
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 015E86C0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: 092d873a81fab18ef1a3ca863cf116fbd6b5cc5443ad210a869fbb3748eea209
                                          • Instruction ID: 9ed721e470530cf23bdc760ca2be385b93155e379bcfea34b38b5e20c5990da3
                                          • Opcode Fuzzy Hash: 092d873a81fab18ef1a3ca863cf116fbd6b5cc5443ad210a869fbb3748eea209
                                          • Instruction Fuzzy Hash: 572113B6C012099FCB14CF99D484ADEBFF1BB88310F14845AE818AB255C7759A44CFA4
                                          APIs
                                          • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06AEA78B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: 87beb016350da8ca6f3f09ae24929e33ba8398d8320911c7f2d67615c4b2a028
                                          • Instruction ID: fca3c10f02a5a7649edee0dcb2a42c5e0a995122c31a67097e7aab6a0da02285
                                          • Opcode Fuzzy Hash: 87beb016350da8ca6f3f09ae24929e33ba8398d8320911c7f2d67615c4b2a028
                                          • Instruction Fuzzy Hash: 6E2115B5D002199FCB54DFAAC944BDEFBF5EF88320F208429E459A7250C774A944CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06AE6DF7
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 0e22ff662e607759cdd372c7d09f18361acddc53df19b82e0d09909a3b854cbb
                                          • Instruction ID: 4dad703008239d798a9cc3feef5963b8253b6246e2d62792a9d44932499055e5
                                          • Opcode Fuzzy Hash: 0e22ff662e607759cdd372c7d09f18361acddc53df19b82e0d09909a3b854cbb
                                          • Instruction Fuzzy Hash: C621E2B5D002489FDB10CFAAD984ADEBFF8EB48320F14841AE918A7350C374A944CFA4
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06AE8315), ref: 06AE839F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: b5f1557ae71934474250b37fd02757ff9fde0bf3d26a085733211c7e2f1cb391
                                          • Instruction ID: 5e46a3faa9ecb2b460a37035f77434f87687dc4c73de1b6c93c5586b2eb4c3f4
                                          • Opcode Fuzzy Hash: b5f1557ae71934474250b37fd02757ff9fde0bf3d26a085733211c7e2f1cb391
                                          • Instruction Fuzzy Hash: 84216DB18093999FCB11EFADC8547DEFFF4EF4A310F14409AD494A7252C274A844CBA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06AE2256
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 662974b27a56107f26ca5f3bad24875b40e5dc9b78350d0573832e4064c8b42f
                                          • Instruction ID: a69177ec7b3ef513fa43a941aa52f799f6bbaede9a44a9b98011c1a215a7f1f5
                                          • Opcode Fuzzy Hash: 662974b27a56107f26ca5f3bad24875b40e5dc9b78350d0573832e4064c8b42f
                                          • Instruction Fuzzy Hash: 762149B1C053888FCB15DFAAC844ACEBFF4EF4A310F14859AD458A7252C378A545CFA2
                                          APIs
                                          • DeleteFileW.KERNEL32(00000000), ref: 015E80D0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 5ec6cd45d6069204ef594b0d9edac7c1948a7cbe96da29ab2698f806575f70a1
                                          • Instruction ID: c0f56cb60b87c0c0a03ccb349be7e7fcc6732149ab3718bd8a13be0f7e762b13
                                          • Opcode Fuzzy Hash: 5ec6cd45d6069204ef594b0d9edac7c1948a7cbe96da29ab2698f806575f70a1
                                          • Instruction Fuzzy Hash: F72122B2C0065A9FCB24CF9AC545B9EFBF4FB48320F14812AD858B7251D778A944CFA5
                                          APIs
                                          • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 06AEA78B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: 9f85107d9d50fc4eefb1ad59dd28ad8bbb313a037e4945731e15a92ee43184a4
                                          • Instruction ID: 9fe33a439361fc635aaa2ec341aa155034cda907823c420bc33a0598c767c037
                                          • Opcode Fuzzy Hash: 9f85107d9d50fc4eefb1ad59dd28ad8bbb313a037e4945731e15a92ee43184a4
                                          • Instruction Fuzzy Hash: C02122B5D002099FCB54DFAAC944BEEFBF5EB88320F10842AE459A7250C774A944CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32 ref: 015EF47F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: e21d2fd7368e580d181e9a86b2f4a87ee616a360f25ee335c2bb2349a06de88e
                                          • Instruction ID: 0e10656495878df85fdba71a3f1611d294bc0d7aa473609cec216c4f2442b79f
                                          • Opcode Fuzzy Hash: e21d2fd7368e580d181e9a86b2f4a87ee616a360f25ee335c2bb2349a06de88e
                                          • Instruction Fuzzy Hash: A71133B1C006599BCB10CF9AC444BDEFBF4BB48320F14812AE818A7251D778A944CFA5
                                          APIs
                                          • DeleteFileW.KERNEL32(00000000), ref: 015E80D0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: 4bb092541e346c91c3d21242e98f2cd2744927b5671c1abdbb7b9a24bb8bbab8
                                          • Instruction ID: e582d679936cf5f1b847c67aa3da10e78a280470a1f0d6fd45306a575bc6385a
                                          • Opcode Fuzzy Hash: 4bb092541e346c91c3d21242e98f2cd2744927b5671c1abdbb7b9a24bb8bbab8
                                          • Instruction Fuzzy Hash: 381133B2C0065A9FCB14CF9AC544B9EFBF4BB48320F14812AD858B7250D778A944CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32 ref: 015EF47F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105656009.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_15e0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: c42d3ed2bf932ed1c5e1654d4a98e571610e290788a8630d723dc54fe8e4c3d7
                                          • Instruction ID: 99d775d45c8564334b6d621ecbbc8399c90f7e92a9a98ab30057c009cec789a8
                                          • Opcode Fuzzy Hash: c42d3ed2bf932ed1c5e1654d4a98e571610e290788a8630d723dc54fe8e4c3d7
                                          • Instruction Fuzzy Hash: 481123B1C0026A9BCB14CF9AC548BDEFBF4BF48320F14816AD818B7250D778A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06AE2256
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 3dd15a732a16fcc0f8ed8c60c269128156095ee836ea93a54d0d922c345e8bc9
                                          • Instruction ID: fa1c38c5da06eeb7d3b9ac076b5f8ca36da8ab92c8a1b911ced3c4d787212364
                                          • Opcode Fuzzy Hash: 3dd15a732a16fcc0f8ed8c60c269128156095ee836ea93a54d0d922c345e8bc9
                                          • Instruction Fuzzy Hash: 9C1102B6C002498FDB10EF9AC444BDEFBF8EB88314F10846AD829B7210C375A645CFA5
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06AE8315), ref: 06AE839F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: f568df897703fe424a4bc9946b9edbc9064c9fc5ac6ec82f38a6d62171a4578e
                                          • Instruction ID: 8af0c5a03f28c1c1d0851313712dc2007b9ca83653f1838e611011ced54e51bb
                                          • Opcode Fuzzy Hash: f568df897703fe424a4bc9946b9edbc9064c9fc5ac6ec82f38a6d62171a4578e
                                          • Instruction Fuzzy Hash: 571145B1800249DFCB10DF9AC848BDEFFF4EB48320F208459D418A7250C774A944CFA5
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06AE885D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 0af61f30e7531a257364ea84b65ba41e46b62510948ed409b82cd4320176895b
                                          • Instruction ID: 5c9a735d1878f38622b55090ac81364a37606098079bd1424d0895e321914ff2
                                          • Opcode Fuzzy Hash: 0af61f30e7531a257364ea84b65ba41e46b62510948ed409b82cd4320176895b
                                          • Instruction Fuzzy Hash: 841115B1D003488FDB60EF9AD549BDEBBF4EB48324F208459D918B7210C379A944CFA5
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06AE8315), ref: 06AE839F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: 1b8a913c2aeb5e9cff3bbcf6aa82552127198341ade377585e10f19136c860e1
                                          • Instruction ID: c4e1f476cf49911993c0c68f2af7d8bfdbf417c1374cd1ace3500103669cfc33
                                          • Opcode Fuzzy Hash: 1b8a913c2aeb5e9cff3bbcf6aa82552127198341ade377585e10f19136c860e1
                                          • Instruction Fuzzy Hash: DB1115B1900249CFCB50EF9AC448BDEFBF4EB48324F208459D559A7251C778A944CFA5
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06AE885D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4117744742.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6ae0000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 1dcd290a37b995d104613dc491d84d0bee8365220d52e5c8a208fa6228043473
                                          • Instruction ID: 6ae6bfe6ade5e478f08b013fcfe0673b92ecc29970e40081e8f87bcaa2e4d49c
                                          • Opcode Fuzzy Hash: 1dcd290a37b995d104613dc491d84d0bee8365220d52e5c8a208fa6228043473
                                          • Instruction Fuzzy Hash: 9E1103B58002488FDB20DFAAD549BDEBFF4EB48324F248459D558A7210C379A544CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: f797455421eb0d4dbce12c80a23c4c293cc8df0c24b971786f8a8d7f6547557e
                                          • Instruction ID: ad284c5412e4d079d2e7605fc7eab0dd887930a59460dc01110b7db09fdd31f4
                                          • Opcode Fuzzy Hash: f797455421eb0d4dbce12c80a23c4c293cc8df0c24b971786f8a8d7f6547557e
                                          • Instruction Fuzzy Hash: 7941EFB0E1030A9FDB61EFA4C8946AEBBB2FF85300F104569E405EB340EB74D946DB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: 62abe151387b2beeccd8c9a18b1d2126651d5532bba5d549163a8ca1e0a44cfc
                                          • Instruction ID: 23b997444becebcc0bc8cb9cecacb770b259d53bbb34380ecb99640c949ef7b5
                                          • Opcode Fuzzy Hash: 62abe151387b2beeccd8c9a18b1d2126651d5532bba5d549163a8ca1e0a44cfc
                                          • Instruction Fuzzy Hash: 4D416170F002099FEB55AFA5C854B9EBBF7FF8C700F208529E106AB395DA748C019B91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 08d839f9f3b73ca20cc2088edb4dec004d8011a459b46be3ae5601326044c123
                                          • Instruction ID: 37d5941cfecba099c0cbf752bb2e6c541658aeb77d200a31dae3254f182aeb3a
                                          • Opcode Fuzzy Hash: 08d839f9f3b73ca20cc2088edb4dec004d8011a459b46be3ae5601326044c123
                                          • Instruction Fuzzy Hash: 09310370B14202DFDB59AB70C45426E7BE2FF89200F1485A8E006DB395DF39DD46EBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: f1198e10351aa327968627a0d3163e83b620c56e31a416445d00648feea48f53
                                          • Instruction ID: e86e795dde7c286d17e9a4760937bf9f7333df47ea24cfa58cb532eb54054843
                                          • Opcode Fuzzy Hash: f1198e10351aa327968627a0d3163e83b620c56e31a416445d00648feea48f53
                                          • Instruction Fuzzy Hash: 82310270B102059FDB59AB74C41466E7BE2FFC9600F108478E006EB394EE39DD46EBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 9062d9e55f5cf04899551e1127e830aac5b1cf15f8d68559f95cc14e4c37e045
                                          • Instruction ID: ac589083abad1f3c80e4c2bfaa3debe9e2dcfca54d989944f6e3e5d1cbae7b09
                                          • Opcode Fuzzy Hash: 9062d9e55f5cf04899551e1127e830aac5b1cf15f8d68559f95cc14e4c37e045
                                          • Instruction Fuzzy Hash: 2E118174B102149FDB54EF78D814BAE7BF9AF8C710F148469E60AE73A0DB359D018BA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: f9f82577f95ccf32ab8793a4e2c74dc48e1109cf21db03b366f450822b21688c
                                          • Instruction ID: c84985b76b2d24052127727da1c255bacfbfe4e17794ede362e71ac56f5be30a
                                          • Opcode Fuzzy Hash: f9f82577f95ccf32ab8793a4e2c74dc48e1109cf21db03b366f450822b21688c
                                          • Instruction Fuzzy Hash: 6A115B70B002259FDB44AF78C814B6E7BF5AF8C610F1084A9E60AEB3A0DB759D018B91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5faed1ff0269527407e561bb0def991fece2b6b11528f6385f4ba21472d66162
                                          • Instruction ID: a13105dcdbebe5515f8470de39a8fb9c488cd91f46304ffcef3906c9f3ccd0b3
                                          • Opcode Fuzzy Hash: 5faed1ff0269527407e561bb0def991fece2b6b11528f6385f4ba21472d66162
                                          • Instruction Fuzzy Hash: B2B17CB0E002098FDFA4EF68C490BADB7B1FB45310F1099A6E619DB351DA34EC82DB51
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f8e5da807508b052d03276474f474ab08ace68cdc348a7bffefbea6f8ceb00cf
                                          • Instruction ID: 77516c5ef7c292b97ffa9f7d4fe49326f9e722d37a2c07924691115eef2ac8e8
                                          • Opcode Fuzzy Hash: f8e5da807508b052d03276474f474ab08ace68cdc348a7bffefbea6f8ceb00cf
                                          • Instruction Fuzzy Hash: 8061D2B2F404214FCB65AA7DC888A6FBAD7EFC4610B15447AD80EDB364DE65DD0287C2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7196d8ea1ab671d647e51027a621cc9f8526c37d24bd8a195cc3907a2a132996
                                          • Instruction ID: 46e14499e39f918a6f2f4e1345354907759969470386e140f53ffb7a1a5df3ea
                                          • Opcode Fuzzy Hash: 7196d8ea1ab671d647e51027a621cc9f8526c37d24bd8a195cc3907a2a132996
                                          • Instruction Fuzzy Hash: 7C815C70B002099FDB44EFA9C4947AEB7F2EB89304F149569D40AEB395EB35DC428B91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e1dbdf112811d93971d09469d239343b034950000e139306a43cd153fde1345
                                          • Instruction ID: 4bdc01a5bdd16d3ede20919ee8f82649a337204ee1c7a708c23de4c8b5b4bbd6
                                          • Opcode Fuzzy Hash: 9e1dbdf112811d93971d09469d239343b034950000e139306a43cd153fde1345
                                          • Instruction Fuzzy Hash: 09916E70E1021A8FDF60DF68C890B9DB7B1FF89300F208699D549BB255DB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26a4e11b21cfeaf8c64864410e013ee1240a18aa382dddca588eb7c035a64661
                                          • Instruction ID: ed5d3402d8b4623ac0136328d36a518e43fae7f888be1abae20c73586a9c9a69
                                          • Opcode Fuzzy Hash: 26a4e11b21cfeaf8c64864410e013ee1240a18aa382dddca588eb7c035a64661
                                          • Instruction Fuzzy Hash: C3915E70E1061A8BDF60DF68C880B9DB7B1FF89310F208599D549BB355EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad32a2b7e506d03154a7de16cb0d117ade81e6e6001859e23a2e65fb678c0c4b
                                          • Instruction ID: e09d0872fd3e0d3a1e534ecac441f8c09907b4140d46fea68e7215598c1cdb4e
                                          • Opcode Fuzzy Hash: ad32a2b7e506d03154a7de16cb0d117ade81e6e6001859e23a2e65fb678c0c4b
                                          • Instruction Fuzzy Hash: 12711A70E002099FDB54EFA8D994A9EBBF6FF88300F148569E409EB355DB30E946CB50
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8e6d953ebf5ad04b5f322a22f63ffa311175fdac570de2a6e7d414b3f8ff4a03
                                          • Instruction ID: 558a3a44107ec64c1652d1c0a316d1bc702858aadb22cb13677842fc76b59b31
                                          • Opcode Fuzzy Hash: 8e6d953ebf5ad04b5f322a22f63ffa311175fdac570de2a6e7d414b3f8ff4a03
                                          • Instruction Fuzzy Hash: 2971F870E002099FDB54EFA9D994A9EBBF6FF88300F148469D419EB355DB30E946CB50
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 63ed0a997efd248606aa8ba84118066794388e4445e1da6d24c944046f8e94f2
                                          • Instruction ID: c44515568e8ed1c7592c223e431fe3c78536767553a3fe0c71dd1add12b86cee
                                          • Opcode Fuzzy Hash: 63ed0a997efd248606aa8ba84118066794388e4445e1da6d24c944046f8e94f2
                                          • Instruction Fuzzy Hash: 0851E1B1E00105EFDB54BB78E4546BEBBB6FBC4215F1088A9E106DB251DB36C846CB91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49d4d9bf945bd049df785194a3abd9d88028011b2712f38800f147b7024912ae
                                          • Instruction ID: 35b8c1cd8ebbbeb2dba18bdcd273df93d6e95446391e69a3abab46261824ed84
                                          • Opcode Fuzzy Hash: 49d4d9bf945bd049df785194a3abd9d88028011b2712f38800f147b7024912ae
                                          • Instruction Fuzzy Hash: 655117B0F102049FEF647A6CD99473F365FD7C9300F20486AE10AD33A5DA69CC469792
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 074f5c528d2c08c9ef588434d6348db4a109930a41384475e5bdbecb28cfc949
                                          • Instruction ID: c5100f820c0ca588c134216def8708fb41f3e0dc018e5343ac6e6446992474c7
                                          • Opcode Fuzzy Hash: 074f5c528d2c08c9ef588434d6348db4a109930a41384475e5bdbecb28cfc949
                                          • Instruction Fuzzy Hash: 9651D6B0F102049FEF647A6CD99473F365FD7C9340F20486AE20AD73A4DA69CC459792
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8555aeea6d75c5fe6eeace4fcadda20f104a44d413b9b33c3f22efd563ac2274
                                          • Instruction ID: 0ac46e84c6abad929f592ab6a4c3ad2ad29bb225fa19a8109f34d06b252f073f
                                          • Opcode Fuzzy Hash: 8555aeea6d75c5fe6eeace4fcadda20f104a44d413b9b33c3f22efd563ac2274
                                          • Instruction Fuzzy Hash: 5C419FB6E006099FDF70DEA9D880AAFFBF2FB84314F10496AE156D7640D331A8459B91
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c881c0ce57e07aa1465ed0e21d720351b042b9dd4725630c7456d8142c3d1219
                                          • Instruction ID: 6dc88eddabb63df04e41adfdcd46eb5fb73337ca025e8f62e2094f1905565e17
                                          • Opcode Fuzzy Hash: c881c0ce57e07aa1465ed0e21d720351b042b9dd4725630c7456d8142c3d1219
                                          • Instruction Fuzzy Hash: BE319C70E102199FDF09EFA4D8946AEB7F2EF89300F109929E806E7351DB71AD42CB41
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57082e24c2e28c8ce932620ddb0cf203297042c9865ae6705ceb7488420ec57b
                                          • Instruction ID: 4006e18d8b2b765cbcfd3a4f301a7beffb54dbf61732bda32c5008581a45ae2d
                                          • Opcode Fuzzy Hash: 57082e24c2e28c8ce932620ddb0cf203297042c9865ae6705ceb7488420ec57b
                                          • Instruction Fuzzy Hash: 0D31AD70E002159BDF09EFA4D89469EB7F2FF89300F109929E806E7351DB71AD42DB40
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ecacc635d418ae3174850cf6b870126432b8c9158ac92c1d09a409bc9e2e420b
                                          • Instruction ID: ba05fe108da073c686cbd9e8aed6f9d06cee96c7e6df27daf130798bcb15c58f
                                          • Opcode Fuzzy Hash: ecacc635d418ae3174850cf6b870126432b8c9158ac92c1d09a409bc9e2e420b
                                          • Instruction Fuzzy Hash: AD218BB5F002099FEB50DF69E880BEEBBF5EB48210F048069E905E7390E734D9019BA5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 420d57c05ae232b7557b0c2423faf17cd48266a430ba4164f42f971dc4c35e33
                                          • Instruction ID: 58b9b3897b75b997ab7b24af001e4902ed20bea1fb84ee033f3fd6fbc3d06e76
                                          • Opcode Fuzzy Hash: 420d57c05ae232b7557b0c2423faf17cd48266a430ba4164f42f971dc4c35e33
                                          • Instruction Fuzzy Hash: F9216BB5F402199FEB40DF69D880AAEBBF5EB48610F148069E906E7390E734D9019B95
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105346514.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_159d000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c44c8edc0506756585f2a2e54b0174bbb1cac3c2eaa8fa691a9d0d7f579028e8
                                          • Instruction ID: 937dfd45098b2400064dc391b011241243e45c5c41f881bb340ec76f3397ebdd
                                          • Opcode Fuzzy Hash: c44c8edc0506756585f2a2e54b0174bbb1cac3c2eaa8fa691a9d0d7f579028e8
                                          • Instruction Fuzzy Hash: 00212275504200DFDF11DF98D9C0B2ABBB5FB84314F20C96DD8094F256D33AD446CA62
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105346514.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_159d000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca6d0c54e8e02464ee63642c317ab2771870b74b035d1759f3c636f4b4ffc076
                                          • Instruction ID: 7c29a34e132197310fcba72eadaaf0af2a3fc0b0f69ba05420fe367650b3906c
                                          • Opcode Fuzzy Hash: ca6d0c54e8e02464ee63642c317ab2771870b74b035d1759f3c636f4b4ffc076
                                          • Instruction Fuzzy Hash: F621FFB2604204DFDB05DF58DAC0B2ABFB5FB84318F20C66DE8094F256C33AD846C662
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105346514.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_159d000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9aa1b45977b3553003f5c1b6a09ff74b421506bc924377eb7719a009551e13b8
                                          • Instruction ID: 00e74e10ed11612820acc112dca0ff56330100499535fb4955ba5aec2d5bbf7e
                                          • Opcode Fuzzy Hash: 9aa1b45977b3553003f5c1b6a09ff74b421506bc924377eb7719a009551e13b8
                                          • Instruction Fuzzy Hash: 37216B750093C09FCB03CF64C994715BF71AB46214F29C5DBD8898F2A3D23A981ACB62
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c7b06c3414c46fa25d8f78a955a2bcf81e41cc3eae8b5d6367ef33087260648b
                                          • Instruction ID: e5161faa069230706a2e413915c312b6e4e5bb05b93bee3fc118286226d321a2
                                          • Opcode Fuzzy Hash: c7b06c3414c46fa25d8f78a955a2bcf81e41cc3eae8b5d6367ef33087260648b
                                          • Instruction Fuzzy Hash: 41112730B100156FDB61FA3CE89079FB7E9FB8A310F0098A9E50ED7351DA25EC069791
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d16a340ff9bd93d5a7ebc1af49c035a819485e7a319bf03f7900a633597941b
                                          • Instruction ID: 19c50afefd0be5afdc4ca8bdae608df9f9f9446107ee6bc0555b3fb09d6525d8
                                          • Opcode Fuzzy Hash: 0d16a340ff9bd93d5a7ebc1af49c035a819485e7a319bf03f7900a633597941b
                                          • Instruction Fuzzy Hash: 7F21E170F100199BDF44EB69E89069EB7B6EFC6314F208479E409EB340EB35EC428B80
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc2672ef414bdf6dec3b7b366495b6d90e7803065bedc7d82ee4ed9a5ad996ea
                                          • Instruction ID: 2ebdb6faf8ccccb6336573627fb54d6b1f7748b86f9cc9874401349d3a3aff2c
                                          • Opcode Fuzzy Hash: dc2672ef414bdf6dec3b7b366495b6d90e7803065bedc7d82ee4ed9a5ad996ea
                                          • Instruction Fuzzy Hash: EF11A131B002289FDF54AA79DC54AAF73EAEBC8210F044479C40AE7380DE25DC029BD2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f252896f652b4c8c0d7780c61dd76408764e1512be00ed891efd760e354fde5f
                                          • Instruction ID: d35a98d34ff69e42f3ffb0645681d6fe994fe00647cf5e22fa991a1b3a313fda
                                          • Opcode Fuzzy Hash: f252896f652b4c8c0d7780c61dd76408764e1512be00ed891efd760e354fde5f
                                          • Instruction Fuzzy Hash: 28014C31B101510FDB95A63ED49071BB7DADBCA710F18947AE40ECB351DD21CC038395
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2758fdfe63d0ed50312eccdee30d3932845cf783d3f08ce60307dea1bde4bb9a
                                          • Instruction ID: 48be3d34ae61c0a32bdfabe1816f6b6b0cc7479fbd2a0891886e9d18954aece2
                                          • Opcode Fuzzy Hash: 2758fdfe63d0ed50312eccdee30d3932845cf783d3f08ce60307dea1bde4bb9a
                                          • Instruction Fuzzy Hash: C401F731B101101FCB61AA2CA86077B77EAEBCA614F18987AE50ECB356DE15DC034381
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2688b09a08d8e29fad6ca180d36771a272fc75e2f1d5f297106ca26062e10005
                                          • Instruction ID: 172546ac859a4a8081c6183e976ec3f3937f2671324f26563e892ecbbaa2c152
                                          • Opcode Fuzzy Hash: 2688b09a08d8e29fad6ca180d36771a272fc75e2f1d5f297106ca26062e10005
                                          • Instruction Fuzzy Hash: 5721C0B5D01259AFCB00DF9AD885ACEFBB4FB48320F10816AE918A7250C374A954CFA5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 37367c917784b80f2f049e14fc88ac448ef0ede17233062610084d8c76b5761c
                                          • Instruction ID: 2173cedcfbc933ec3b59e256682ee35beb487a55fd1d9c746419acc7fa7a1155
                                          • Opcode Fuzzy Hash: 37367c917784b80f2f049e14fc88ac448ef0ede17233062610084d8c76b5761c
                                          • Instruction Fuzzy Hash: E6018F75B141146BEB94AA6A9C14BEF77EADBC8210F04007AD50AE7380EE649C4397E2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4105346514.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_159d000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                          • Instruction ID: 822590a4b7c2d5634ceaef55651596aaaaa438bfd41082eb27e8a7bdca7233cc
                                          • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                                          • Instruction Fuzzy Hash: E6118BB6504284CFDB06CF54D9C4B19BFB2FB84218F24C6AAD8494B656C33AD44ACB52
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1658785ecf8c6536b00106e866eced4246872e1358549abbee48c305a54d81a
                                          • Instruction ID: 606db4ff38900eb690a0443abc15c617769fc3ba9bdf411e3cc2d90f6c3c71f0
                                          • Opcode Fuzzy Hash: f1658785ecf8c6536b00106e866eced4246872e1358549abbee48c305a54d81a
                                          • Instruction Fuzzy Hash: 4B11D0B1D01259AFCB00DF9AD884ACEFFF4FB48320F10812AE918A7250C374A954CFA5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 062f79d67132d21b03fc9ca5cfa1340ff9831504e04fdf6c4c9cbd1128c37b31
                                          • Instruction ID: 587dc0e56fb1756389a98029f3c41c292181b5340dba67cdce0db702dd82f4d4
                                          • Opcode Fuzzy Hash: 062f79d67132d21b03fc9ca5cfa1340ff9831504e04fdf6c4c9cbd1128c37b31
                                          • Instruction Fuzzy Hash: 0801F431B100110BDB64A56ED49072BB3CFDBC9710F189839E50EC7344EE25DC034395
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 570beb4943f62c3dabba2ec05fd744b8cf97f192c11ec6bf033452820bdeb782
                                          • Instruction ID: d50676efce7851755ca84ecfea450256318a157c2e7a1cf2a089e78c4160712b
                                          • Opcode Fuzzy Hash: 570beb4943f62c3dabba2ec05fd744b8cf97f192c11ec6bf033452820bdeb782
                                          • Instruction Fuzzy Hash: 9B01FF31B000101BCB64BA2CA8A072F73DAEBCA620F149839E50ECB350EE25DC034385
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 283169fa661f2d069d93fcc0249e50c58ff622459551c83b729e2eea685d06eb
                                          • Instruction ID: b2cee7b6cc1cdcfbc9952519bcd642b551d386ec4bf690faf1878ffa1841c517
                                          • Opcode Fuzzy Hash: 283169fa661f2d069d93fcc0249e50c58ff622459551c83b729e2eea685d06eb
                                          • Instruction Fuzzy Hash: 1001A471B100155FDB60FA2CE49071BB3DAEB8A710F109839E50EC7354DE25EC028781
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a910a2a1672a698d3a3fd1e971e5b7c8510e70b927ccdfa7e83a152cf4fa3ea
                                          • Instruction ID: 2fe664465518d27f76f8037de922258d52a5fbf08ef3b0080c665cd6af73568b
                                          • Opcode Fuzzy Hash: 3a910a2a1672a698d3a3fd1e971e5b7c8510e70b927ccdfa7e83a152cf4fa3ea
                                          • Instruction Fuzzy Hash: 12F0A772F21228ABDB157965EC5059AB77AE7C4A54F104469E901A7244D772A80087C0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57a8b9279d83a7d930b648286d24636b655922a29d924ad3e886dd7bbc792771
                                          • Instruction ID: 422b4ed6016b28a16c079a0754b376029b0f34f84af0fec4184e31434f0c9b84
                                          • Opcode Fuzzy Hash: 57a8b9279d83a7d930b648286d24636b655922a29d924ad3e886dd7bbc792771
                                          • Instruction Fuzzy Hash: 6EE0D8F5D15209ABEB60DE74C98579B77ADE743208F2048E9D404CB241F237C9025751
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: fe2fa88f14f6eeedcaa11c1a5781ee69d4f0b457f15d62234f4b3ed16f35bffa
                                          • Instruction ID: 3e92d56356533410858c76fa2e05dd86c29974a815c2f437356b2530723f9949
                                          • Opcode Fuzzy Hash: fe2fa88f14f6eeedcaa11c1a5781ee69d4f0b457f15d62234f4b3ed16f35bffa
                                          • Instruction Fuzzy Hash: 61120B70E002198FDB68EF65C954A9DB7F2FF84704F2085A9D409AB364DF359D86CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 7a463fa4d268d2c40791e6f8ac0724daaa2662aa92d135255e19c5382ced9a19
                                          • Instruction ID: 84768c49a61477b14879ed0a7b2b438260fc03299b651d0ee5c350d0d40619d4
                                          • Opcode Fuzzy Hash: 7a463fa4d268d2c40791e6f8ac0724daaa2662aa92d135255e19c5382ced9a19
                                          • Instruction Fuzzy Hash: 6F915FB0E50209DFEB68EF68D554B6EB7F2FF84304F108469D401AB298DB789D45DB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: a96c378c13ffdab2766542788a13ec06a247970f6effeef6d19281fa7f3fe50b
                                          • Instruction ID: 154fe954b5bf6f8467e08b5f11baa09b1ac25c4431b36ff14e41dde20690bea4
                                          • Opcode Fuzzy Hash: a96c378c13ffdab2766542788a13ec06a247970f6effeef6d19281fa7f3fe50b
                                          • Instruction Fuzzy Hash: 2DF11970B00219CFDB59EF64D994A6EB7B2FF84300F248568D405AB3A8DB75EC46DB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 10ce1dc529ab8c65c04105a08e668ab8ff653fe9e90fe01e49e81039ea8af83d
                                          • Instruction ID: 4c2b769d50e37b9003dc599c71eb72d1f76d9358de0c61351e41af2782bf1e72
                                          • Opcode Fuzzy Hash: 10ce1dc529ab8c65c04105a08e668ab8ff653fe9e90fe01e49e81039ea8af83d
                                          • Instruction Fuzzy Hash: BA71B2B0E002198FDB58EF68D5946AEB7F2FF84300B1089A9D505EB359EB71DC46DB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: c4c588b344c8a32b256a05cbdcdd49e3520f02f774914907e1025975b702eb70
                                          • Instruction ID: 7d54228b8e55a95233f0d840c13b40a314cfca1080a2b76cf2702f2fc072b939
                                          • Opcode Fuzzy Hash: c4c588b344c8a32b256a05cbdcdd49e3520f02f774914907e1025975b702eb70
                                          • Instruction Fuzzy Hash: 22B13F70E002198FDB68EFA8D59465EB7F2FF88300F248969D406AB354DB75DC86DB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0oAp$DqAp$PH^q$]
                                          • API String ID: 0-2851057850
                                          • Opcode ID: 5b75d70ef4cf8eb580c2474cd96f46905617358eca55082bf64fa7773e6a3585
                                          • Instruction ID: 39cca3a7fce6dac5dcff100cce64306ce138c53c7e5ec721661dce220498c3fc
                                          • Opcode Fuzzy Hash: 5b75d70ef4cf8eb580c2474cd96f46905617358eca55082bf64fa7773e6a3585
                                          • Instruction Fuzzy Hash: CC8179747101018FCB95EB28D894A5EBBF2FF89310B1185A9E506DB376DB34EC46CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: b11b268397f00e5b47fd7cfc10bfae9b219cce125d709b56105bd07a8e8f6e07
                                          • Instruction ID: fcc8bdea85ecdb9d4ac95db47af76f45848beb430ff97d3afd61c43011927153
                                          • Opcode Fuzzy Hash: b11b268397f00e5b47fd7cfc10bfae9b219cce125d709b56105bd07a8e8f6e07
                                          • Instruction Fuzzy Hash: E751D570B002069FDB58EF28D594B6AB7E5FF84700F1485A8E4069F3A5EB34EC41CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4118157528.0000000006B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_6b40000_Statement JULY #U007e SEP 2024 USD 19,055.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: f9c214d393a4851aaccb921351e76d1a906adf25cd218a40eab84e214d73b307
                                          • Instruction ID: 9493be54d07ea250627b5a9af7ce4e52d600284e66c77af4b2f819752ba558db
                                          • Opcode Fuzzy Hash: f9c214d393a4851aaccb921351e76d1a906adf25cd218a40eab84e214d73b307
                                          • Instruction Fuzzy Hash: 7051CF70F502099FDFA9EE68D5806AEB3B2FF88300F1095A9D405AB359DB35DC42DB90

                                          Execution Graph

                                          Execution Coverage:9.4%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:274
                                          Total number of Limit Nodes:17
                                          execution_graph 25173 118d01c 25174 118d034 25173->25174 25175 118d08e 25174->25175 25178 5492bf9 25174->25178 25187 549113c 25174->25187 25180 5492c35 25178->25180 25179 5492c69 25212 5491264 25179->25212 25180->25179 25182 5492c59 25180->25182 25196 5492e5c 25182->25196 25202 5492d80 25182->25202 25207 5492d90 25182->25207 25183 5492c67 25188 5491147 25187->25188 25189 5492c69 25188->25189 25191 5492c59 25188->25191 25190 5491264 CallWindowProcW 25189->25190 25192 5492c67 25190->25192 25193 5492e5c CallWindowProcW 25191->25193 25194 5492d80 CallWindowProcW 25191->25194 25195 5492d90 CallWindowProcW 25191->25195 25193->25192 25194->25192 25195->25192 25197 5492e1a 25196->25197 25198 5492e6a 25196->25198 25216 5492e48 25197->25216 25219 5492e37 25197->25219 25199 5492e30 25199->25183 25204 5492d90 25202->25204 25203 5492e30 25203->25183 25205 5492e48 CallWindowProcW 25204->25205 25206 5492e37 CallWindowProcW 25204->25206 25205->25203 25206->25203 25209 5492da4 25207->25209 25208 5492e30 25208->25183 25210 5492e48 CallWindowProcW 25209->25210 25211 5492e37 CallWindowProcW 25209->25211 25210->25208 25211->25208 25213 549126f 25212->25213 25214 549434a CallWindowProcW 25213->25214 25215 54942f9 25213->25215 25214->25215 25215->25183 25217 5492e59 25216->25217 25223 5494282 25216->25223 25217->25199 25220 5492e48 25219->25220 25221 5492e59 25220->25221 25222 5494282 CallWindowProcW 25220->25222 25221->25199 25222->25221 25224 5491264 CallWindowProcW 25223->25224 25225 549429a 25224->25225 25225->25217 25226 537d380 25227 537d3c6 25226->25227 25231 537d560 25227->25231 25234 537d550 25227->25234 25228 537d4b3 25237 537afd4 25231->25237 25235 537d58e 25234->25235 25236 537afd4 DuplicateHandle 25234->25236 25235->25228 25236->25235 25238 537d5c8 DuplicateHandle 25237->25238 25239 537d58e 25238->25239 25239->25228 25240 5496d30 25241 5496d4a 25240->25241 25242 5496d73 25241->25242 25245 5496db9 25241->25245 25254 5496dc8 25241->25254 25246 5496dc2 25245->25246 25249 5496e20 25245->25249 25251 5496db9 12 API calls 25246->25251 25260 5496df8 25246->25260 25264 5496de8 25246->25264 25247 5496e80 25247->25241 25248 5496de0 25248->25241 25249->25247 25268 5495a2c 25249->25268 25251->25248 25255 5496dd4 25254->25255 25257 5496db9 12 API calls 25255->25257 25258 5496de8 12 API calls 25255->25258 25259 5496df8 12 API calls 25255->25259 25256 5496de0 25256->25241 25257->25256 25258->25256 25259->25256 25262 5496e14 25260->25262 25261 5496e80 25261->25248 25262->25261 25263 5495a2c 12 API calls 25262->25263 25263->25262 25266 5496df8 25264->25266 25265 5496e80 25265->25248 25266->25265 25267 5495a2c 12 API calls 25266->25267 25267->25266 25270 5495a37 25268->25270 25269 549717a 25269->25249 25270->25269 25283 5499d31 25270->25283 25288 5499dd8 25270->25288 25292 549a7f8 25270->25292 25297 549a6a6 25270->25297 25302 549a507 25270->25302 25306 549ab03 25270->25306 25311 549a643 25270->25311 25315 549a5e3 25270->25315 25321 5499f4f 25270->25321 25326 549a549 25270->25326 25330 5499e76 25270->25330 25335 549a735 25270->25335 25284 5499d4d 25283->25284 25339 5499918 25284->25339 25343 549990c 25284->25343 25347 549b2a0 25288->25347 25352 549b2b0 25288->25352 25289 5499da1 25293 549a7fe 25292->25293 25294 5499da1 25293->25294 25365 5499690 25293->25365 25369 549966a 25293->25369 25298 549a6d2 25297->25298 25300 549966a WriteProcessMemory 25298->25300 25301 5499690 WriteProcessMemory 25298->25301 25299 549a70c 25300->25299 25301->25299 25373 549b258 25302->25373 25378 549b268 25302->25378 25303 549a51f 25308 5499e79 25306->25308 25307 5499da1 25308->25306 25308->25307 25391 549ba09 25308->25391 25396 549ba18 25308->25396 25312 549a667 25311->25312 25313 549966a WriteProcessMemory 25311->25313 25314 5499690 WriteProcessMemory 25311->25314 25312->25270 25313->25312 25314->25312 25316 549a653 25315->25316 25318 5499da1 25315->25318 25319 549966a WriteProcessMemory 25316->25319 25320 5499690 WriteProcessMemory 25316->25320 25317 549a667 25317->25270 25319->25317 25320->25317 25322 5499fc0 25321->25322 25323 5499da1 25321->25323 25324 549966a WriteProcessMemory 25322->25324 25325 5499690 WriteProcessMemory 25322->25325 25323->25270 25324->25323 25325->25323 25409 549b9c0 25326->25409 25414 549b9d0 25326->25414 25327 549a561 25331 5499e79 25330->25331 25332 5499da1 25331->25332 25333 549ba09 2 API calls 25331->25333 25334 549ba18 2 API calls 25331->25334 25333->25331 25334->25331 25419 5499778 25335->25419 25423 5499780 25335->25423 25336 549a757 25340 54999a1 CreateProcessA 25339->25340 25342 5499b63 25340->25342 25344 5499918 CreateProcessA 25343->25344 25346 5499b63 25344->25346 25348 549b2c5 25347->25348 25357 54991ca 25348->25357 25361 54991d0 25348->25361 25349 549b2e4 25349->25289 25353 549b2c5 25352->25353 25355 54991ca VirtualAllocEx 25353->25355 25356 54991d0 VirtualAllocEx 25353->25356 25354 549b2e4 25354->25289 25355->25354 25356->25354 25358 54991d0 VirtualAllocEx 25357->25358 25360 549924d 25358->25360 25360->25349 25362 5499210 VirtualAllocEx 25361->25362 25364 549924d 25362->25364 25364->25349 25366 54996d3 WriteProcessMemory 25365->25366 25368 549972f 25366->25368 25368->25294 25370 549968b WriteProcessMemory 25369->25370 25372 549972f 25370->25372 25372->25294 25374 549b27d 25373->25374 25383 54990f8 25374->25383 25387 54990f2 25374->25387 25375 549b293 25375->25303 25379 549b27d 25378->25379 25381 54990f8 Wow64SetThreadContext 25379->25381 25382 54990f2 Wow64SetThreadContext 25379->25382 25380 549b293 25380->25303 25381->25380 25382->25380 25384 549913d Wow64SetThreadContext 25383->25384 25386 5499185 25384->25386 25386->25375 25388 54990f8 Wow64SetThreadContext 25387->25388 25390 5499185 25388->25390 25390->25375 25392 549ba2d 25391->25392 25401 5499048 25392->25401 25405 5499042 25392->25405 25393 549ba40 25393->25308 25397 549ba2d 25396->25397 25399 5499048 ResumeThread 25397->25399 25400 5499042 ResumeThread 25397->25400 25398 549ba40 25398->25308 25399->25398 25400->25398 25402 5499088 ResumeThread 25401->25402 25404 54990b9 25402->25404 25404->25393 25406 5499048 ResumeThread 25405->25406 25408 54990b9 25406->25408 25408->25393 25410 549b9c5 25409->25410 25412 54990f8 Wow64SetThreadContext 25410->25412 25413 54990f2 Wow64SetThreadContext 25410->25413 25411 549b9fb 25411->25327 25412->25411 25413->25411 25415 549b9e5 25414->25415 25417 54990f8 Wow64SetThreadContext 25415->25417 25418 54990f2 Wow64SetThreadContext 25415->25418 25416 549b9fb 25416->25327 25417->25416 25418->25416 25420 5499780 ReadProcessMemory 25419->25420 25422 549980f 25420->25422 25422->25336 25424 54997cb ReadProcessMemory 25423->25424 25426 549980f 25424->25426 25426->25336 25427 5374668 25428 537467a 25427->25428 25429 5374686 25428->25429 25433 5374779 25428->25433 25438 5373e10 25429->25438 25434 537479d 25433->25434 25442 5374878 25434->25442 25446 5374888 25434->25446 25439 5373e1b 25438->25439 25454 5375cf8 25439->25454 25441 537703b 25444 5374888 25442->25444 25443 537498c 25443->25443 25444->25443 25450 5374248 25444->25450 25448 53748af 25446->25448 25447 537498c 25448->25447 25449 5374248 CreateActCtxA 25448->25449 25449->25447 25451 5375918 CreateActCtxA 25450->25451 25453 53759db 25451->25453 25455 5375d03 25454->25455 25458 5375d18 25455->25458 25457 53771dd 25457->25441 25459 5375d23 25458->25459 25462 5375d48 25459->25462 25461 53772ba 25461->25457 25463 5375d53 25462->25463 25466 5375d78 25463->25466 25465 53773ad 25465->25461 25467 5375d83 25466->25467 25469 537890b 25467->25469 25473 537abb1 25467->25473 25468 5378949 25468->25465 25469->25468 25479 537cca1 25469->25479 25484 537ccb0 25469->25484 25489 537aff0 25473->25489 25494 537afb8 25473->25494 25499 537af58 25473->25499 25504 537afe0 25473->25504 25474 537abc6 25474->25469 25480 537ccd1 25479->25480 25481 537ccf5 25480->25481 25519 537d268 25480->25519 25523 537d258 25480->25523 25481->25468 25485 537ccd1 25484->25485 25486 537ccf5 25485->25486 25487 537d268 2 API calls 25485->25487 25488 537d258 2 API calls 25485->25488 25486->25468 25487->25486 25488->25486 25490 537aff4 25489->25490 25509 537b0e8 25490->25509 25514 537b0d8 25490->25514 25491 537afff 25491->25474 25495 537afbd 25494->25495 25496 537afff 25495->25496 25497 537b0e8 GetModuleHandleW 25495->25497 25498 537b0d8 GetModuleHandleW 25495->25498 25496->25474 25497->25496 25498->25496 25500 537af5d 25499->25500 25502 537b0e8 GetModuleHandleW 25500->25502 25503 537b0d8 GetModuleHandleW 25500->25503 25501 537afff 25501->25474 25502->25501 25503->25501 25505 537aff0 25504->25505 25507 537b0e8 GetModuleHandleW 25505->25507 25508 537b0d8 GetModuleHandleW 25505->25508 25506 537afff 25506->25474 25507->25506 25508->25506 25510 537b11c 25509->25510 25511 537b0f9 25509->25511 25510->25491 25511->25510 25512 537b320 GetModuleHandleW 25511->25512 25513 537b34d 25512->25513 25513->25491 25515 537b11c 25514->25515 25516 537b0f9 25514->25516 25515->25491 25516->25515 25517 537b320 GetModuleHandleW 25516->25517 25518 537b34d 25517->25518 25518->25491 25520 537d275 25519->25520 25522 537d2af 25520->25522 25527 537d090 25520->25527 25522->25481 25525 537d275 25523->25525 25524 537d2af 25524->25481 25525->25524 25526 537d090 2 API calls 25525->25526 25526->25524 25528 537d09b 25527->25528 25530 537dbc0 25528->25530 25531 537d1ac 25528->25531 25530->25530 25532 537d1b7 25531->25532 25533 5375d78 2 API calls 25532->25533 25534 537dc2f 25533->25534 25534->25530

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 369 549990c-54999ad 372 54999af-54999b9 369->372 373 54999e6-5499a06 369->373 372->373 374 54999bb-54999bd 372->374 380 5499a08-5499a12 373->380 381 5499a3f-5499a6e 373->381 375 54999bf-54999c9 374->375 376 54999e0-54999e3 374->376 378 54999cb 375->378 379 54999cd-54999dc 375->379 376->373 378->379 379->379 382 54999de 379->382 380->381 383 5499a14-5499a16 380->383 389 5499a70-5499a7a 381->389 390 5499aa7-5499b61 CreateProcessA 381->390 382->376 385 5499a39-5499a3c 383->385 386 5499a18-5499a22 383->386 385->381 387 5499a24 386->387 388 5499a26-5499a35 386->388 387->388 388->388 391 5499a37 388->391 389->390 392 5499a7c-5499a7e 389->392 401 5499b6a-5499bf0 390->401 402 5499b63-5499b69 390->402 391->385 394 5499aa1-5499aa4 392->394 395 5499a80-5499a8a 392->395 394->390 396 5499a8c 395->396 397 5499a8e-5499a9d 395->397 396->397 397->397 399 5499a9f 397->399 399->394 412 5499c00-5499c04 401->412 413 5499bf2-5499bf6 401->413 402->401 415 5499c14-5499c18 412->415 416 5499c06-5499c0a 412->416 413->412 414 5499bf8 413->414 414->412 417 5499c28-5499c2c 415->417 418 5499c1a-5499c1e 415->418 416->415 419 5499c0c 416->419 421 5499c3e-5499c45 417->421 422 5499c2e-5499c34 417->422 418->417 420 5499c20 418->420 419->415 420->417 423 5499c5c 421->423 424 5499c47-5499c56 421->424 422->421 426 5499c5d 423->426 424->423 426->426
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05499B4E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 8c9beef58304047c2cbd4ad8be0ee51fab2095ef39d2b5b8dcc874507e425cc3
                                          • Instruction ID: 41478012bd2a77a332b7465ecf0510390441ff4d949fd55d08593befbb1228f8
                                          • Opcode Fuzzy Hash: 8c9beef58304047c2cbd4ad8be0ee51fab2095ef39d2b5b8dcc874507e425cc3
                                          • Instruction Fuzzy Hash: 23A16D71D04259DFDF14CFA8C846BEEBBB2BF48314F1481AAD809A7250DB749985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 427 5499918-54999ad 429 54999af-54999b9 427->429 430 54999e6-5499a06 427->430 429->430 431 54999bb-54999bd 429->431 437 5499a08-5499a12 430->437 438 5499a3f-5499a6e 430->438 432 54999bf-54999c9 431->432 433 54999e0-54999e3 431->433 435 54999cb 432->435 436 54999cd-54999dc 432->436 433->430 435->436 436->436 439 54999de 436->439 437->438 440 5499a14-5499a16 437->440 446 5499a70-5499a7a 438->446 447 5499aa7-5499b61 CreateProcessA 438->447 439->433 442 5499a39-5499a3c 440->442 443 5499a18-5499a22 440->443 442->438 444 5499a24 443->444 445 5499a26-5499a35 443->445 444->445 445->445 448 5499a37 445->448 446->447 449 5499a7c-5499a7e 446->449 458 5499b6a-5499bf0 447->458 459 5499b63-5499b69 447->459 448->442 451 5499aa1-5499aa4 449->451 452 5499a80-5499a8a 449->452 451->447 453 5499a8c 452->453 454 5499a8e-5499a9d 452->454 453->454 454->454 456 5499a9f 454->456 456->451 469 5499c00-5499c04 458->469 470 5499bf2-5499bf6 458->470 459->458 472 5499c14-5499c18 469->472 473 5499c06-5499c0a 469->473 470->469 471 5499bf8 470->471 471->469 474 5499c28-5499c2c 472->474 475 5499c1a-5499c1e 472->475 473->472 476 5499c0c 473->476 478 5499c3e-5499c45 474->478 479 5499c2e-5499c34 474->479 475->474 477 5499c20 475->477 476->472 477->474 480 5499c5c 478->480 481 5499c47-5499c56 478->481 479->478 483 5499c5d 480->483 481->480 483->483
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05499B4E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: b1b771473ee3b0c26922d114bbe2af443e82e66da97d288dde20e46c96716731
                                          • Instruction ID: ca0bca6b6c61b1b485a47bf03786959e23788ec5cfdade68ab0602e48c1f7a41
                                          • Opcode Fuzzy Hash: b1b771473ee3b0c26922d114bbe2af443e82e66da97d288dde20e46c96716731
                                          • Instruction Fuzzy Hash: F1915C71D04219DFDF24CF68C846BEEBBB2BF48314F1485AAD809A7240DB749985CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 484 537b0e8-537b0f7 485 537b123-537b127 484->485 486 537b0f9-537b106 call 5379b58 484->486 487 537b13b-537b17c 485->487 488 537b129-537b133 485->488 492 537b11c 486->492 493 537b108 486->493 495 537b17e-537b186 487->495 496 537b189-537b197 487->496 488->487 492->485 539 537b10e call 537b370 493->539 540 537b10e call 537b380 493->540 495->496 498 537b1bb-537b1bd 496->498 499 537b199-537b19e 496->499 497 537b114-537b116 497->492 500 537b258-537b318 497->500 501 537b1c0-537b1c7 498->501 502 537b1a0-537b1a7 call 537ada0 499->502 503 537b1a9 499->503 534 537b320-537b34b GetModuleHandleW 500->534 535 537b31a-537b31d 500->535 504 537b1d4-537b1db 501->504 505 537b1c9-537b1d1 501->505 506 537b1ab-537b1b9 502->506 503->506 508 537b1dd-537b1e5 504->508 509 537b1e8-537b1f1 call 537adb0 504->509 505->504 506->501 508->509 515 537b1f3-537b1fb 509->515 516 537b1fe-537b203 509->516 515->516 517 537b205-537b20c 516->517 518 537b221-537b22e 516->518 517->518 520 537b20e-537b21e call 537adc0 call 537add0 517->520 524 537b251-537b257 518->524 525 537b230-537b24e 518->525 520->518 525->524 536 537b354-537b368 534->536 537 537b34d-537b353 534->537 535->534 537->536 539->497 540->497
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0537B33E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1800832431.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5370000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 05f79f1b1b2cb2242917b6aa5c33a2c6d9a6425eba7e55e66394ae33ea01fd2d
                                          • Instruction ID: d41fb9053b4108a16ae7a0f9c2f4a8166b7e0e2f59ba2458b4e5a887b98489f7
                                          • Opcode Fuzzy Hash: 05f79f1b1b2cb2242917b6aa5c33a2c6d9a6425eba7e55e66394ae33ea01fd2d
                                          • Instruction Fuzzy Hash: E1713670A00B498FD724DF69D45479ABBF1FF88304F108A2DD48ADBA50EB78E945CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 541 5491264-54942ec 544 549439c-54943bc call 549113c 541->544 545 54942f2-54942f7 541->545 553 54943bf-54943cc 544->553 546 54942f9-5494330 545->546 547 549434a-5494382 CallWindowProcW 545->547 554 5494339-5494348 546->554 555 5494332-5494338 546->555 549 549438b-549439a 547->549 550 5494384-549438a 547->550 549->553 550->549 554->553 555->554
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 05494371
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: 5cce9d85252806f3be5247c100dbc668d29b0f55078ebcb6a6ef10b7391a86b1
                                          • Instruction ID: 21e7e5c9db2cad09f18bb2e8ac9c8b85544a17064f985f26cdd74c4b94579b89
                                          • Opcode Fuzzy Hash: 5cce9d85252806f3be5247c100dbc668d29b0f55078ebcb6a6ef10b7391a86b1
                                          • Instruction Fuzzy Hash: 504108B5A00305CFDB18CF99C489AEABBF5FB89314F148459D519AB321D774A841CFA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 558 5374248-53759d9 CreateActCtxA 561 53759e2-5375a3c 558->561 562 53759db-53759e1 558->562 569 5375a3e-5375a41 561->569 570 5375a4b-5375a4f 561->570 562->561 569->570 571 5375a51-5375a5d 570->571 572 5375a60 570->572 571->572 574 5375a61 572->574 574->574
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 053759C9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1800832431.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5370000_adobe.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 85ff9e8ad7d7572c2e0221d0f4d0fd222ec05c978de3c41b46128de687f31b74
                                          • Instruction ID: 5e40b42c2ac1ed0189cac366fc6fe9172de5adc08e20020470337ab200a74209
                                          • Opcode Fuzzy Hash: 85ff9e8ad7d7572c2e0221d0f4d0fd222ec05c978de3c41b46128de687f31b74
                                          • Instruction Fuzzy Hash: E441AFB0C0061DCBDB24DFA9C984B9EBBF5BF49304F24806AD409AB255EB756946CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 575 537590d-53759d9 CreateActCtxA 577 53759e2-5375a3c 575->577 578 53759db-53759e1 575->578 585 5375a3e-5375a41 577->585 586 5375a4b-5375a4f 577->586 578->577 585->586 587 5375a51-5375a5d 586->587 588 5375a60 586->588 587->588 590 5375a61 588->590 590->590
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 053759C9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1800832431.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5370000_adobe.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 722366d604c3ff90ffd13162a30217928aa8642543c7aff19c3e78b3a39cf6cf
                                          • Instruction ID: a41eba12466ff168b8e2afcf607f6af68790d5d85ef1ce14b32417231d56d384
                                          • Opcode Fuzzy Hash: 722366d604c3ff90ffd13162a30217928aa8642543c7aff19c3e78b3a39cf6cf
                                          • Instruction Fuzzy Hash: BA41B0B1C0061DCBDB24DFA9C884BDEBBF5BF49304F24806AD409AB255DB756986CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 591 549966a-5499689 592 549968b-54996d1 591->592 593 54996d3-54996de 591->593 592->593 596 54996ee-549972d WriteProcessMemory 593->596 597 54996e0-54996ec 593->597 599 549972f-5499735 596->599 600 5499736-5499766 596->600 597->596 599->600
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05499720
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 830f79d632f52cf8d05a447025f96a778d0344338608213095247b5a7e74a13f
                                          • Instruction ID: 4728ebb84f6ce90055c44283a9fae21679499338945e763f32d80016f83d056a
                                          • Opcode Fuzzy Hash: 830f79d632f52cf8d05a447025f96a778d0344338608213095247b5a7e74a13f
                                          • Instruction Fuzzy Hash: B53158B69003599FCB14CFA9C885BDEBFB4BF48310F10842AE458A7240D7749954CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 604 5499690-54996de 607 54996ee-549972d WriteProcessMemory 604->607 608 54996e0-54996ec 604->608 610 549972f-5499735 607->610 611 5499736-5499766 607->611 608->607 610->611
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05499720
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 78c8ec6cdb3f6b39d676e81d48937e77c84a4b4568d52ef89c53fcdc87f56ca5
                                          • Instruction ID: c699a7e0e2c10aea5e620ab58de09d00b80e5fb96f2e857110da7d994559f412
                                          • Opcode Fuzzy Hash: 78c8ec6cdb3f6b39d676e81d48937e77c84a4b4568d52ef89c53fcdc87f56ca5
                                          • Instruction Fuzzy Hash: 1D2146B59003499FCB14CFA9C885BDEBBF4FF48310F10842AE959A7240C7789954CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 615 5499778-549980d ReadProcessMemory 619 549980f-5499815 615->619 620 5499816-5499846 615->620 619->620
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05499800
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 57d4023cd3c8b5e3d43075259503eab083f598b45c6d904524109395f4308f7d
                                          • Instruction ID: 5db6bad84f9ecfd4a4af4c3c76d3fcb26d7394523903e4a89937e453cd3e7f68
                                          • Opcode Fuzzy Hash: 57d4023cd3c8b5e3d43075259503eab083f598b45c6d904524109395f4308f7d
                                          • Instruction Fuzzy Hash: EE2136B1C002599FCB10CFAAC881BDEBBF4FF48324F10842EE559A7250C7789944CBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 624 537afd4-537d65c DuplicateHandle 626 537d665-537d682 624->626 627 537d65e-537d664 624->627 627->626
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0537D58E,?,?,?,?,?), ref: 0537D64F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1800832431.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5370000_adobe.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 40727f8901a050bdc54b54cd1ed52e2695cf798ea2957ad068ac305bdc6f514b
                                          • Instruction ID: b112833efa4fa9a263c540e98f7a2312131d56c8220be3f0f04ae3b8dcffdeb3
                                          • Opcode Fuzzy Hash: 40727f8901a050bdc54b54cd1ed52e2695cf798ea2957ad068ac305bdc6f514b
                                          • Instruction Fuzzy Hash: C021E5B5D002089FDB10CF99D584ADEBFF4EB48314F14841AE959A7350D378A954CFA4
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05499176
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 6211a918220f70e81572e204836a61d9c6fcadd1462404ae59fe1380bbc0934e
                                          • Instruction ID: ea9a5dbcb6c0ccb4bbc97f1e14fd0b6430848edba8a0ba3a9442435d06ac5db7
                                          • Opcode Fuzzy Hash: 6211a918220f70e81572e204836a61d9c6fcadd1462404ae59fe1380bbc0934e
                                          • Instruction Fuzzy Hash: EA2139B1D042098FDB14DFAAC4857EEBBF4FF88324F14842AD459A7240C7789945CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0537D58E,?,?,?,?,?), ref: 0537D64F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1800832431.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5370000_adobe.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: f3947b8d867a84e117b2b137ecc3a273a98fe388313e2f0f7b90204b6e2c24d1
                                          • Instruction ID: 9d0e47d79072066d44b58df3dc7d3a4aad474db7675c6327aeed98cbc0575831
                                          • Opcode Fuzzy Hash: f3947b8d867a84e117b2b137ecc3a273a98fe388313e2f0f7b90204b6e2c24d1
                                          • Instruction Fuzzy Hash: 0421E0B5D002189FDB10CFA9D984ADEBBF4FB48324F24841AE959A3350D378A954CFA4
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05499800
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: ef41247fa106945e9506348e5ed8a1fa3c028186a4b0d8b53fab2cdd88e826fb
                                          • Instruction ID: e822043abc5655fe47b1c32e3990182764f44502521c82bf7953f102abe9f235
                                          • Opcode Fuzzy Hash: ef41247fa106945e9506348e5ed8a1fa3c028186a4b0d8b53fab2cdd88e826fb
                                          • Instruction Fuzzy Hash: 9C2116B1C002599FDB10DFAAC841ADEBBF5FF48310F10842EE559A7250C7749544CBA4
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05499176
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: dbcb72349695100659c49d7398c38188f0ab623cab0ce335eadf11858c48c275
                                          • Instruction ID: 188a7d90a6e3043e0a5366fdc8f52d7862f5bb4f5e5a462e69d17bedae16e293
                                          • Opcode Fuzzy Hash: dbcb72349695100659c49d7398c38188f0ab623cab0ce335eadf11858c48c275
                                          • Instruction Fuzzy Hash: 392137B1D042098FDB14DFAAC4857EEBBF4BB88324F10842AD459A7240CB78A945CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0549923E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 879514a78de5cee7f9ddb448df178218367d13a8a73238b329affaf1e86aa703
                                          • Instruction ID: 57c17a234ac7f71ba46cfd2451457ec3070f2b80ccc3dcf981750a08d7fef579
                                          • Opcode Fuzzy Hash: 879514a78de5cee7f9ddb448df178218367d13a8a73238b329affaf1e86aa703
                                          • Instruction Fuzzy Hash: BC1159718002499FDB14DFA9C845BDEFFF5EF88324F10881AE559A7250C775A544CFA4
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0549923E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 1dd2bdb1b35307c224ecee1b0a9aff6d95adac68387bd1963786b3811c973f8e
                                          • Instruction ID: b520100bdb89202a81c3aaa72999f284b33961b1f54736b714d8f20176eb591b
                                          • Opcode Fuzzy Hash: 1dd2bdb1b35307c224ecee1b0a9aff6d95adac68387bd1963786b3811c973f8e
                                          • Instruction Fuzzy Hash: DD1156B18002488FDB14DFAAC845BDEFFF5EF88324F10881AE559A7250C775A544CFA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 4df31f4d8b728a529a37f9594363329cfff5b4761f34efad1e610782643f8122
                                          • Instruction ID: 8ea14d95080089daf0af1267c4cbd7d3ef64d26f7e72139e21b70eab57645f2f
                                          • Opcode Fuzzy Hash: 4df31f4d8b728a529a37f9594363329cfff5b4761f34efad1e610782643f8122
                                          • Instruction Fuzzy Hash: A31158B1D002488BDB20DFAAC4457DEFBF4EB88324F24841AD559B7250CB79A944CF94
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1801321356.0000000005490000.00000040.00000800.00020000.00000000.sdmp, Offset: 05490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5490000_adobe.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: ed9d2e527625de6470a6e04ecdbcdb4e8cc9a0ad4c7c9953bf5ce9294964a8f5
                                          • Instruction ID: f3cb4d21cfae386bbe4a4f0e0756126a8ae2cb857be556d8c4d8e94b326668b3
                                          • Opcode Fuzzy Hash: ed9d2e527625de6470a6e04ecdbcdb4e8cc9a0ad4c7c9953bf5ce9294964a8f5
                                          • Instruction Fuzzy Hash: 211136B1D042488FDB24DFAAC4457DEFFF4EB88324F20842AD559A7250CB75A944CFA4
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0537B33E
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1800832431.0000000005370000.00000040.00000800.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_5370000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e3ecf11d2bf66f4f18e1e8d57cb963dfd4015e1c79ad016f31340c82fa5c09f3
                                          • Instruction ID: 18c1deb92737b8d7ac6e9059b028a869a366c519665bad9863a53b22b76b2095
                                          • Opcode Fuzzy Hash: e3ecf11d2bf66f4f18e1e8d57cb963dfd4015e1c79ad016f31340c82fa5c09f3
                                          • Instruction Fuzzy Hash: 90110FB6C002498FEB20CF9AC444ADEFBF4EB88224F10842AD459A7210D779A585CFA1
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1799735057.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_118d000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 83ef23baf5aca27d92ea6b9d82c6832827150752d01cdee522728bc0b318c55d
                                          • Instruction ID: 5075f4c21df7637e5a3374d742b2b5bb0fd6a393ae3aad96678a5fb2235b9080
                                          • Opcode Fuzzy Hash: 83ef23baf5aca27d92ea6b9d82c6832827150752d01cdee522728bc0b318c55d
                                          • Instruction Fuzzy Hash: 0C212271604300DFDF19EF98E9C4B26BFA5EB84314F20C66DD80A4B296C33AD447CA62
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.1799735057.000000000118D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0118D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_118d000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 39721540dbbc6c72a01616421dccee5117b8e4d9e8ae0b4ede548a5f704d4717
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: B911A975504380CFDB16DF58E584B16BBA2FB84214F24C6AAD8494B696C33AD40BCFA2

                                          Execution Graph

                                          Execution Coverage:11.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:27
                                          Total number of Limit Nodes:4
                                          execution_graph 25210 2ff0848 25212 2ff084e 25210->25212 25211 2ff091b 25212->25211 25215 2ff134f 25212->25215 25220 2ff147f 25212->25220 25217 2ff1353 25215->25217 25216 2ff147a 25216->25212 25217->25216 25219 2ff147f 2 API calls 25217->25219 25225 2ff8219 25217->25225 25219->25217 25221 2ff147a 25220->25221 25222 2ff1366 25220->25222 25221->25212 25222->25221 25223 2ff147f 2 API calls 25222->25223 25224 2ff8219 2 API calls 25222->25224 25223->25222 25224->25222 25227 2ff8223 25225->25227 25226 2ff82d9 25226->25217 25227->25226 25230 6d6f8e8 25227->25230 25236 6d6f8d9 25227->25236 25232 6d6f8fd 25230->25232 25231 6d6fb12 25231->25226 25232->25231 25233 6d6fb37 GlobalMemoryStatusEx GlobalMemoryStatusEx 25232->25233 25234 6d6fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 25232->25234 25235 6d6fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx 25232->25235 25233->25232 25234->25232 25235->25232 25238 6d6f8fd 25236->25238 25237 6d6fb12 25237->25226 25238->25237 25239 6d6fb37 GlobalMemoryStatusEx GlobalMemoryStatusEx 25238->25239 25240 6d6fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 25238->25240 25241 6d6fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx 25238->25241 25239->25238 25240->25238 25241->25238
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: dbb21c62101143edb247d932cc2ca64c48798061b1b1c073ef4f4d90668f4e25
                                          • Instruction ID: c01defbe99e711d7a0751029302f6c3a42a2ab888cbbc89208053866ee1b1971
                                          • Opcode Fuzzy Hash: dbb21c62101143edb247d932cc2ca64c48798061b1b1c073ef4f4d90668f4e25
                                          • Instruction Fuzzy Hash: AD825D34E106098FCB64DF69C584A9DB7F2FF89300F15D5A9E449AB265EB30ED85CB80
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdd14ed44f02b871aeea9cbffd69dc873f4b319d03820a95ef82ed41bcbdbdbd
                                          • Instruction ID: bb3c73eee492277b79050f2892410be26e0577f0ac6fa3b36ff91ae9d375a506
                                          • Opcode Fuzzy Hash: cdd14ed44f02b871aeea9cbffd69dc873f4b319d03820a95ef82ed41bcbdbdbd
                                          • Instruction Fuzzy Hash: 9B62C130B102449FDB54DBA9D584BADB7F2EF88304F148469E406EB395DB35EC46CB82
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f4f3f440725eb4147c98cdbe6e7664afa0b747aa751f94253bb0bb6648b795e3
                                          • Instruction ID: 4db6816379fe65f069cac1bbfcc2c072b2216d44181f74dd8b16c46ca819e3b9
                                          • Opcode Fuzzy Hash: f4f3f440725eb4147c98cdbe6e7664afa0b747aa751f94253bb0bb6648b795e3
                                          • Instruction Fuzzy Hash: F9225030E102098FDF64DBAAD5847AEB7F6EB49314F208827E449EB391CA35DC95CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 262 6d690c8-6d690ed 263 6d690ef-6d690f2 262->263 264 6d699b0-6d699b3 263->264 265 6d690f8-6d6910d 263->265 266 6d699b5-6d699d4 264->266 267 6d699d9-6d699db 264->267 272 6d69125-6d6913b 265->272 273 6d6910f-6d69115 265->273 266->267 269 6d699e2-6d699e5 267->269 270 6d699dd 267->270 269->263 274 6d699eb-6d699f5 269->274 270->269 279 6d69146-6d69148 272->279 275 6d69117 273->275 276 6d69119-6d6911b 273->276 275->272 276->272 280 6d69160-6d691d1 279->280 281 6d6914a-6d69150 279->281 292 6d691d3-6d691f6 280->292 293 6d691fd-6d69219 280->293 282 6d69154-6d69156 281->282 283 6d69152 281->283 282->280 283->280 292->293 298 6d69245-6d69260 293->298 299 6d6921b-6d6923e 293->299 304 6d69262-6d69284 298->304 305 6d6928b-6d692a6 298->305 299->298 304->305 310 6d692cb-6d692d9 305->310 311 6d692a8-6d692c4 305->311 312 6d692db-6d692e4 310->312 313 6d692e9-6d69363 310->313 311->310 312->274 319 6d69365-6d69383 313->319 320 6d693b0-6d693c5 313->320 324 6d69385-6d69394 319->324 325 6d6939f-6d693ae 319->325 320->264 324->325 325->319 325->320
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 7a332089fb3d904c3247c4743513cd1ef5e85b9e363e1ed3e360db2ea18f593e
                                          • Instruction ID: c3baee58fd0a9fd4ebaf01928821152e3d03d84da0b3faf231cc1e3cfd8821a0
                                          • Opcode Fuzzy Hash: 7a332089fb3d904c3247c4743513cd1ef5e85b9e363e1ed3e360db2ea18f593e
                                          • Instruction Fuzzy Hash: E7914030B1020A9FDB54DB69D9647AEB7F6EBC8204F108569D409EB384EF74DC86CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 328 6d6cec8-6d6cee3 329 6d6cee5-6d6cee8 328->329 330 6d6cef2-6d6cef5 329->330 331 6d6ceea-6d6ceef 329->331 332 6d6cef7-6d6cf39 330->332 333 6d6cf3e-6d6cf41 330->333 331->330 332->333 334 6d6cf43-6d6cf85 333->334 335 6d6cf8a-6d6cf8d 333->335 334->335 337 6d6cfd6-6d6cfd9 335->337 338 6d6cf8f-6d6cfd1 335->338 340 6d6cfdb-6d6cfdd 337->340 341 6d6cfe8-6d6cfeb 337->341 338->337 344 6d6cfe3 340->344 345 6d6d26f-6d6d278 340->345 346 6d6d034-6d6d037 341->346 347 6d6cfed-6d6d02f 341->347 344->341 351 6d6d287-6d6d293 345->351 352 6d6d27a-6d6d27f 345->352 349 6d6d080-6d6d083 346->349 350 6d6d039-6d6d07b 346->350 347->346 357 6d6d085-6d6d0c7 349->357 358 6d6d0cc-6d6d0cf 349->358 350->349 353 6d6d3a4-6d6d3a9 351->353 354 6d6d299-6d6d2ad 351->354 352->351 372 6d6d3b1 353->372 354->372 373 6d6d2b3-6d6d2c5 354->373 357->358 360 6d6d0d1-6d6d113 358->360 361 6d6d118-6d6d11b 358->361 360->361 369 6d6d3b4-6d6d3c0 361->369 370 6d6d121-6d6d124 361->370 375 6d6d3c6-6d6d6b3 369->375 376 6d6d14c-6d6d15b 369->376 379 6d6d126-6d6d142 370->379 380 6d6d147-6d6d14a 370->380 372->369 400 6d6d2c7-6d6d2cd 373->400 401 6d6d2e9-6d6d2eb 373->401 540 6d6d8da-6d6d8e4 375->540 541 6d6d6b9-6d6d6bf 375->541 384 6d6d15d-6d6d162 376->384 385 6d6d16a-6d6d176 376->385 379->380 380->376 383 6d6d193-6d6d196 380->383 396 6d6d1a5-6d6d1a8 383->396 397 6d6d198-6d6d19a 383->397 384->385 394 6d6d8e5-6d6d91e 385->394 395 6d6d17c-6d6d18e 385->395 420 6d6d920-6d6d923 394->420 395->383 398 6d6d1f1-6d6d1f4 396->398 399 6d6d1aa-6d6d1ec 396->399 397->372 405 6d6d1a0 397->405 410 6d6d1f6-6d6d20c 398->410 411 6d6d211-6d6d214 398->411 399->398 406 6d6d2d1-6d6d2dd 400->406 407 6d6d2cf 400->407 415 6d6d2f5-6d6d301 401->415 405->396 418 6d6d2df-6d6d2e7 406->418 407->418 410->411 421 6d6d216-6d6d225 411->421 422 6d6d25d-6d6d25f 411->422 439 6d6d303-6d6d30d 415->439 440 6d6d30f 415->440 418->415 429 6d6d946-6d6d949 420->429 430 6d6d925-6d6d941 420->430 431 6d6d227-6d6d22c 421->431 432 6d6d234-6d6d240 421->432 434 6d6d266-6d6d269 422->434 435 6d6d261 422->435 442 6d6d97c-6d6d97f 429->442 443 6d6d94b-6d6d977 429->443 430->429 431->432 432->394 441 6d6d246-6d6d258 432->441 434->329 434->345 435->434 446 6d6d314-6d6d316 439->446 440->446 441->422 449 6d6d981 442->449 450 6d6d98e-6d6d990 442->450 443->442 446->372 452 6d6d31c-6d6d338 call 6d66510 446->452 587 6d6d981 call 6d6da50 449->587 588 6d6d981 call 6d6da4b 449->588 454 6d6d997-6d6d99a 450->454 455 6d6d992 450->455 471 6d6d347-6d6d353 452->471 472 6d6d33a-6d6d33f 452->472 454->420 456 6d6d99c-6d6d9ab 454->456 455->454 465 6d6da12-6d6da27 456->465 466 6d6d9ad-6d6da10 call 6d66510 456->466 459 6d6d987-6d6d989 459->450 466->465 471->353 474 6d6d355-6d6d3a2 471->474 472->471 474->372 542 6d6d6c1-6d6d6c6 541->542 543 6d6d6ce-6d6d6d7 541->543 542->543 543->394 544 6d6d6dd-6d6d6f0 543->544 546 6d6d6f6-6d6d6fc 544->546 547 6d6d8ca-6d6d8d4 544->547 548 6d6d6fe-6d6d703 546->548 549 6d6d70b-6d6d714 546->549 547->540 547->541 548->549 549->394 550 6d6d71a-6d6d73b 549->550 553 6d6d73d-6d6d742 550->553 554 6d6d74a-6d6d753 550->554 553->554 554->394 555 6d6d759-6d6d776 554->555 555->547 558 6d6d77c-6d6d782 555->558 558->394 559 6d6d788-6d6d7a1 558->559 561 6d6d7a7-6d6d7ce 559->561 562 6d6d8bd-6d6d8c4 559->562 561->394 565 6d6d7d4-6d6d7de 561->565 562->547 562->558 565->394 566 6d6d7e4-6d6d7fb 565->566 568 6d6d7fd-6d6d808 566->568 569 6d6d80a-6d6d825 566->569 568->569 569->562 574 6d6d82b-6d6d844 call 6d66510 569->574 578 6d6d846-6d6d84b 574->578 579 6d6d853-6d6d85c 574->579 578->579 579->394 580 6d6d862-6d6d8b6 579->580 580->562 587->459 588->459
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 04661e40ab2765d829bbc784ab3d7e512cad484cf9ce9bcfc4847b8009c4b37c
                                          • Instruction ID: 21b0f9bb90a12440c6fcf75ea1d4eab8f0a374014fb3189f936dff111ed1ee08
                                          • Opcode Fuzzy Hash: 04661e40ab2765d829bbc784ab3d7e512cad484cf9ce9bcfc4847b8009c4b37c
                                          • Instruction Fuzzy Hash: BC624E30B102068FCB55DB69D590A5EB7F2FF84304F248A69D0099F369DB75ED8ACB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 589 6d64b18-6d64b3c 591 6d64b3e-6d64b41 589->591 592 6d64b47-6d64c3f 591->592 593 6d65220-6d65223 591->593 613 6d64c45-6d64c8d 592->613 614 6d64cc2-6d64cc9 592->614 594 6d65244-6d65246 593->594 595 6d65225-6d6523f 593->595 597 6d6524d-6d65250 594->597 598 6d65248 594->598 595->594 597->591 600 6d65256-6d65263 597->600 598->597 636 6d64c92 call 6d653c3 613->636 637 6d64c92 call 6d653d0 613->637 615 6d64ccf-6d64d3f 614->615 616 6d64d4d-6d64d56 614->616 633 6d64d41 615->633 634 6d64d4a 615->634 616->600 627 6d64c98-6d64cb4 631 6d64cb6 627->631 632 6d64cbf-6d64cc0 627->632 631->632 632->614 633->634 634->616 636->627 637->627
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: 3ddb0b82bd14b487589e83ec2dcddf2e582344848cc48029543725c9b6615291
                                          • Instruction ID: df4b6a47c59a9f5d86b17d7c4fa9fa459df4b15a3b37308ae5299bf4f6d85379
                                          • Opcode Fuzzy Hash: 3ddb0b82bd14b487589e83ec2dcddf2e582344848cc48029543725c9b6615291
                                          • Instruction Fuzzy Hash: 29618D30F102099FEB559FA9D8547AEBAF2FF88700F208429E106EB395DF758C458B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1146 6d67ff0-6d6800f 1147 6d68011-6d68014 1146->1147 1148 6d680c1-6d680c4 1147->1148 1149 6d6801a-6d68026 1147->1149 1150 6d680c6-6d680e2 1148->1150 1151 6d680e7-6d680ea 1148->1151 1154 6d68031-6d68033 1149->1154 1150->1151 1152 6d680f0-6d680ff 1151->1152 1153 6d6831f-6d68321 1151->1153 1168 6d68101-6d6811c 1152->1168 1169 6d6811e-6d68162 1152->1169 1155 6d68323 1153->1155 1156 6d68328-6d6832b 1153->1156 1157 6d68035-6d6803b 1154->1157 1158 6d6804b-6d6804f 1154->1158 1155->1156 1156->1147 1163 6d68331-6d6833a 1156->1163 1161 6d6803f-6d68041 1157->1161 1162 6d6803d 1157->1162 1164 6d68051-6d6805b 1158->1164 1165 6d6805d 1158->1165 1161->1158 1162->1158 1166 6d68062-6d68064 1164->1166 1165->1166 1170 6d68066-6d68069 1166->1170 1171 6d6807b-6d680b4 1166->1171 1168->1169 1175 6d682f3-6d68309 1169->1175 1176 6d68168-6d68179 1169->1176 1170->1163 1171->1152 1189 6d680b6-6d680c0 1171->1189 1175->1153 1181 6d682de-6d682ed 1176->1181 1182 6d6817f-6d6819c 1176->1182 1181->1175 1181->1176 1182->1181 1190 6d681a2-6d68298 call 6d66510 1182->1190 1214 6d682a6 1190->1214 1215 6d6829a-6d682a4 1190->1215 1216 6d682ab-6d682ad 1214->1216 1215->1216 1216->1181 1217 6d682af-6d682b4 1216->1217 1218 6d682b6-6d682c0 1217->1218 1219 6d682c2 1217->1219 1220 6d682c7-6d682c9 1218->1220 1219->1220 1220->1181 1221 6d682cb-6d682d7 1220->1221 1221->1181
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 969f00320f84210fc748edc2fc395f07f06c5757c1d41c270b7096b6369c952e
                                          • Instruction ID: 1959686963d3e04109e88024002adfe916025e277edfdac9eaa3cc7c242c3121
                                          • Opcode Fuzzy Hash: 969f00320f84210fc748edc2fc395f07f06c5757c1d41c270b7096b6369c952e
                                          • Instruction Fuzzy Hash: BD91B130B102068FDB54DFBAD5906AEB7E2FF88204F148529E805DB395DB75DC86CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1223 6d690bb-6d690ed 1225 6d690ef-6d690f2 1223->1225 1226 6d699b0-6d699b3 1225->1226 1227 6d690f8-6d6910d 1225->1227 1228 6d699b5-6d699d4 1226->1228 1229 6d699d9-6d699db 1226->1229 1234 6d69125-6d6913b 1227->1234 1235 6d6910f-6d69115 1227->1235 1228->1229 1231 6d699e2-6d699e5 1229->1231 1232 6d699dd 1229->1232 1231->1225 1236 6d699eb-6d699f5 1231->1236 1232->1231 1241 6d69146-6d69148 1234->1241 1237 6d69117 1235->1237 1238 6d69119-6d6911b 1235->1238 1237->1234 1238->1234 1242 6d69160-6d691d1 1241->1242 1243 6d6914a-6d69150 1241->1243 1254 6d691d3-6d691f6 1242->1254 1255 6d691fd-6d69219 1242->1255 1244 6d69154-6d69156 1243->1244 1245 6d69152 1243->1245 1244->1242 1245->1242 1254->1255 1260 6d69245-6d69260 1255->1260 1261 6d6921b-6d6923e 1255->1261 1266 6d69262-6d69284 1260->1266 1267 6d6928b-6d692a6 1260->1267 1261->1260 1266->1267 1272 6d692cb-6d692d9 1267->1272 1273 6d692a8-6d692c4 1267->1273 1274 6d692db-6d692e4 1272->1274 1275 6d692e9-6d69363 1272->1275 1273->1272 1274->1236 1281 6d69365-6d69383 1275->1281 1282 6d693b0-6d693c5 1275->1282 1286 6d69385-6d69394 1281->1286 1287 6d6939f-6d693ae 1281->1287 1282->1226 1286->1287 1287->1281 1287->1282
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: ec73ce2b921b598bcab93868451a16847b9714ac0995e90fe5f58b70fe58263a
                                          • Instruction ID: 5094d5d172e1918472d232c48b1d27fe27a350bff375f8d6497deeb901c7db89
                                          • Opcode Fuzzy Hash: ec73ce2b921b598bcab93868451a16847b9714ac0995e90fe5f58b70fe58263a
                                          • Instruction Fuzzy Hash: 44516330B101069FDB54DBB9D9A4BAF73F6EBC8644F108429D409DB384DA74DC42CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1290 6d6a318-6d6a319 1291 6d6a2de-6d6a2e4 1290->1291 1292 6d6a31b-6d6a321 1290->1292 1293 6d6a2e6-6d6a2f3 1291->1293 1292->1293 1294 6d6a323-6d6a348 1292->1294 1295 6d6a2fa 1293->1295 1298 6d6a34a-6d6a34d 1294->1298 1297 6d6a2ff-6d6a301 1295->1297 1299 6d6a303 1297->1299 1300 6d6a308-6d6a30b 1297->1300 1301 6d6a370-6d6a373 1298->1301 1302 6d6a34f-6d6a36b 1298->1302 1299->1300 1305 6d6a290-6d6a293 1300->1305 1306 6d6a30d-6d6a311 1300->1306 1303 6d6a41f-6d6a422 1301->1303 1304 6d6a379-6d6a412 call 6d62058 1301->1304 1302->1301 1307 6d6a553-6d6a556 1303->1307 1308 6d6a428-6d6a455 call 6d62058 1303->1308 1304->1308 1350 6d6a414-6d6a41e 1304->1350 1310 6d6a2b5-6d6a2b8 1305->1310 1311 6d6a295-6d6a2b0 1305->1311 1315 6d6a563-6d6a566 1307->1315 1316 6d6a558-6d6a562 1307->1316 1344 6d6a45b-6d6a480 1308->1344 1345 6d6a548-6d6a552 1308->1345 1313 6d6a2da-6d6a2dd 1310->1313 1314 6d6a2ba-6d6a2d5 1310->1314 1311->1310 1313->1297 1322 6d6a2df 1313->1322 1314->1313 1319 6d6a581-6d6a584 1315->1319 1320 6d6a568-6d6a576 1315->1320 1325 6d6a586-6d6a59f 1319->1325 1326 6d6a5a4-6d6a5a6 1319->1326 1320->1304 1337 6d6a57c 1320->1337 1332 6d6a2eb-6d6a2f3 1322->1332 1325->1326 1328 6d6a5ad-6d6a5b0 1326->1328 1329 6d6a5a8 1326->1329 1328->1298 1334 6d6a5b6-6d6a5bf 1328->1334 1329->1328 1332->1295 1337->1319 1352 6d6a482-6d6a488 1344->1352 1353 6d6a48a 1344->1353 1354 6d6a490-6d6a542 call 6d66510 call 6d62058 1352->1354 1353->1354 1354->1344 1354->1345
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: X!@$x!@
                                          • API String ID: 0-2527372166
                                          • Opcode ID: 838b0e6ca9eb3c23bad27e4b08270863104b7330d3dea0315a7252bc23229c8f
                                          • Instruction ID: 86421dca9d46af24ef4f499442fd6273612e97abbe3f4f876bb3711a5fd0336f
                                          • Opcode Fuzzy Hash: 838b0e6ca9eb3c23bad27e4b08270863104b7330d3dea0315a7252bc23229c8f
                                          • Instruction Fuzzy Hash: FC313E71F102154BDB54DF7AC8902ADB7E6EB89710F54883AE549F7380DB70DD468790

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1372 2ffeddf-2ffedf9 1374 2ffedff-2ffee8c GlobalMemoryStatusEx 1372->1374 1375 2ffedfb-2ffedfe 1372->1375 1378 2ffee8e-2ffee94 1374->1378 1379 2ffee95-2ffeebd 1374->1379 1378->1379
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32 ref: 02FFEE7F
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1889133415.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_2ff0000_adobe.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: cfb5528815dab8480a030ca2620ec970aae5b35117c192ffc66f88cf3a4e8c28
                                          • Instruction ID: 51ce4463d5b909d7e67134d833b7d82b340c86574ea3c23fc02347eadcf44da3
                                          • Opcode Fuzzy Hash: cfb5528815dab8480a030ca2620ec970aae5b35117c192ffc66f88cf3a4e8c28
                                          • Instruction Fuzzy Hash: BC2186B1C006998FCB10CFAAD50479EBBF0AF48220F10816AD958A7260E3389941CFE2

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1382 2ffee18-2ffee8c GlobalMemoryStatusEx 1384 2ffee8e-2ffee94 1382->1384 1385 2ffee95-2ffeebd 1382->1385 1384->1385
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32 ref: 02FFEE7F
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1889133415.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_2ff0000_adobe.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 696a9a3fbc9f19c3652af9a0eee87c36c03efdcce1e4336ded449178f591a21e
                                          • Instruction ID: 79db05ed8367335145290ca26cdfa5ac5dfe43836fdf3a8a10d017313b22631c
                                          • Opcode Fuzzy Hash: 696a9a3fbc9f19c3652af9a0eee87c36c03efdcce1e4336ded449178f591a21e
                                          • Instruction Fuzzy Hash: 5E1120B1C006699BCB10CF9AD544BDEFBF4EF48320F15816AD918A7260E378A944CFE5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1449 6d64b13-6d64b3c 1452 6d64b3e-6d64b41 1449->1452 1453 6d64b47-6d64c3f 1452->1453 1454 6d65220-6d65223 1452->1454 1474 6d64c45-6d64c8d 1453->1474 1475 6d64cc2-6d64cc9 1453->1475 1455 6d65244-6d65246 1454->1455 1456 6d65225-6d6523f 1454->1456 1458 6d6524d-6d65250 1455->1458 1459 6d65248 1455->1459 1456->1455 1458->1452 1461 6d65256-6d65263 1458->1461 1459->1458 1497 6d64c92 call 6d653c3 1474->1497 1498 6d64c92 call 6d653d0 1474->1498 1476 6d64ccf-6d64d3f 1475->1476 1477 6d64d4d-6d64d56 1475->1477 1494 6d64d41 1476->1494 1495 6d64d4a 1476->1495 1477->1461 1488 6d64c98-6d64cb4 1492 6d64cb6 1488->1492 1493 6d64cbf-6d64cc0 1488->1493 1492->1493 1493->1475 1494->1495 1495->1477 1497->1488 1498->1488
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: 458c0e68162f0ecf11bcd6b3aa0d63a465fcaa1a85973760e04b228c134ffeb6
                                          • Instruction ID: 4926282d46474add8f50721964f147c6161ce943bbf5196e1d48b8f8a2711513
                                          • Opcode Fuzzy Hash: 458c0e68162f0ecf11bcd6b3aa0d63a465fcaa1a85973760e04b228c134ffeb6
                                          • Instruction Fuzzy Hash: 59414C70F102089FDB55DFA9C854BAEBAF6FF88700F208529E105EB395DA748C458B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1499 6d64b09-6d64b10 1500 6d64b12 1499->1500 1501 6d64b33-6d64b3c 1499->1501 1500->1501 1502 6d64b3e-6d64b41 1501->1502 1503 6d64b47-6d64c3f 1502->1503 1504 6d65220-6d65223 1502->1504 1524 6d64c45-6d64c8d 1503->1524 1525 6d64cc2-6d64cc9 1503->1525 1505 6d65244-6d65246 1504->1505 1506 6d65225-6d6523f 1504->1506 1508 6d6524d-6d65250 1505->1508 1509 6d65248 1505->1509 1506->1505 1508->1502 1511 6d65256-6d65263 1508->1511 1509->1508 1547 6d64c92 call 6d653c3 1524->1547 1548 6d64c92 call 6d653d0 1524->1548 1526 6d64ccf-6d64d3f 1525->1526 1527 6d64d4d-6d64d56 1525->1527 1544 6d64d41 1526->1544 1545 6d64d4a 1526->1545 1527->1511 1538 6d64c98-6d64cb4 1542 6d64cb6 1538->1542 1543 6d64cbf-6d64cc0 1538->1543 1542->1543 1543->1525 1544->1545 1545->1527 1547->1538 1548->1538
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: 5c9017eb03ef12cb9b7b33fb2bf5128ad766ddfbb3c7e7adc3dccff3b0e1308b
                                          • Instruction ID: f42a0f50c8a2885b1d617b56c5d87fe410de5a820cc8c76a5d596d76904381ed
                                          • Opcode Fuzzy Hash: 5c9017eb03ef12cb9b7b33fb2bf5128ad766ddfbb3c7e7adc3dccff3b0e1308b
                                          • Instruction Fuzzy Hash: A0414A74F102099FEB55DFA9C8547AEBAF2FF88700F208529E105EB395DB748C458B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1549 6d6da50-6d6da67 1550 6d6da69-6d6da6c 1549->1550 1551 6d6da6e-6d6da9a 1550->1551 1552 6d6da9f-6d6daa2 1550->1552 1551->1552 1553 6d6daa4 1552->1553 1554 6d6dab1-6d6dab4 1552->1554 1557 6d6daaa-6d6daac 1553->1557 1555 6d6dab6-6d6dad2 1554->1555 1556 6d6dad7-6d6dad9 1554->1556 1555->1556 1558 6d6dae0-6d6dae3 1556->1558 1559 6d6dadb 1556->1559 1557->1554 1558->1550 1561 6d6dae5-6d6daf4 1558->1561 1559->1558 1564 6d6dafa-6d6db33 1561->1564 1565 6d6dc79-6d6dca3 1561->1565 1572 6d6db35-6d6db3f 1564->1572 1573 6d6db81-6d6dba5 1564->1573 1568 6d6dca4 1565->1568 1568->1568 1576 6d6db57-6d6db7f 1572->1576 1577 6d6db41-6d6db47 1572->1577 1579 6d6dba7 1573->1579 1580 6d6dbaf-6d6dc73 1573->1580 1576->1572 1576->1573 1581 6d6db4b-6d6db4d 1577->1581 1582 6d6db49 1577->1582 1579->1580 1580->1564 1580->1565 1581->1576 1582->1576
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 38a094c4330d2af7b830df37dc668ad87086f269016b7ddc2f5483f1b06a1974
                                          • Instruction ID: 3778a32fc5e048629fa097a0992850725b003d5faf14ee5b8b29597dc4b5bce6
                                          • Opcode Fuzzy Hash: 38a094c4330d2af7b830df37dc668ad87086f269016b7ddc2f5483f1b06a1974
                                          • Instruction Fuzzy Hash: CA41A130F142099FDB60DFA6E5446AEBBB2FF85300F144529E406EB244DB74D946CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1624 6d6da4b-6d6da67 1625 6d6da69-6d6da6c 1624->1625 1626 6d6da6e-6d6da9a 1625->1626 1627 6d6da9f-6d6daa2 1625->1627 1626->1627 1628 6d6daa4 1627->1628 1629 6d6dab1-6d6dab4 1627->1629 1632 6d6daaa-6d6daac 1628->1632 1630 6d6dab6-6d6dad2 1629->1630 1631 6d6dad7-6d6dad9 1629->1631 1630->1631 1633 6d6dae0-6d6dae3 1631->1633 1634 6d6dadb 1631->1634 1632->1629 1633->1625 1636 6d6dae5-6d6daf4 1633->1636 1634->1633 1639 6d6dafa-6d6db33 1636->1639 1640 6d6dc79-6d6dca3 1636->1640 1647 6d6db35-6d6db3f 1639->1647 1648 6d6db81-6d6dba5 1639->1648 1643 6d6dca4 1640->1643 1643->1643 1651 6d6db57-6d6db7f 1647->1651 1652 6d6db41-6d6db47 1647->1652 1654 6d6dba7 1648->1654 1655 6d6dbaf-6d6dc73 1648->1655 1651->1647 1651->1648 1656 6d6db4b-6d6db4d 1652->1656 1657 6d6db49 1652->1657 1654->1655 1655->1639 1655->1640 1656->1651 1657->1651
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: eaad6063a6ed768b113a5e1313bb372761c0829bec78b6aaede1f2eea5ae82e3
                                          • Instruction ID: 5c93274ecb768a460fc6b574651e77d9aef511a67437bd07d1eb5366db66a72b
                                          • Opcode Fuzzy Hash: eaad6063a6ed768b113a5e1313bb372761c0829bec78b6aaede1f2eea5ae82e3
                                          • Instruction Fuzzy Hash: B6418F70F102099FDB65DFA6E5846AEBBB2FF85300F148529E405EB244EB74E946CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1663 6d621b5-6d621e3 1664 6d621e5-6d621e8 1663->1664 1665 6d621ea-6d62206 1664->1665 1666 6d6220b-6d6220d 1664->1666 1665->1666 1667 6d62214-6d62217 1666->1667 1668 6d6220f 1666->1668 1667->1664 1670 6d62219-6d6223f 1667->1670 1668->1667 1675 6d62246-6d62274 1670->1675 1680 6d62276-6d62280 1675->1680 1681 6d622eb-6d6230f 1675->1681 1684 6d62282-6d62288 1680->1684 1685 6d62298-6d622e9 1680->1685 1689 6d62311 1681->1689 1690 6d62319 1681->1690 1687 6d6228c-6d6228e 1684->1687 1688 6d6228a 1684->1688 1685->1680 1685->1681 1687->1685 1688->1685 1689->1690 1692 6d6231a 1690->1692 1692->1692
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 5891a81ca8a1d9741a1a7cd3316f62a7659ff8bdaf55db4ab8e377343d99ebfb
                                          • Instruction ID: f9d596d78e805ef8685308635fb62bfac5c4b9593c3fa0f58e2c77c510e7a85f
                                          • Opcode Fuzzy Hash: 5891a81ca8a1d9741a1a7cd3316f62a7659ff8bdaf55db4ab8e377343d99ebfb
                                          • Instruction Fuzzy Hash: 9E312E30B102028FDB699B75D55826E7BA2BF8A304F148568E006DB395DF39DD46CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 3611fa4d4e7375e18d1d1f4cdcedb6863be06f8e3e36b565ded74e62e1460450
                                          • Instruction ID: 75b00a1610fc5fdba8f2634ff8a61920e53411d164a71ee63cc96d47986e0d87
                                          • Opcode Fuzzy Hash: 3611fa4d4e7375e18d1d1f4cdcedb6863be06f8e3e36b565ded74e62e1460450
                                          • Instruction Fuzzy Hash: CD31E230B102018FDB699B75D55866F7BE2AF89700F108428E406DB385DF39DD46CBA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 8b10ef8d2ebe1a337452b58a4cf6b40be3e49743aca8fffd642e35dec4bc1898
                                          • Instruction ID: 79c95c2c20114474f612f318f5aa9fd85e5850eac46595a439ea3d035e1d293c
                                          • Opcode Fuzzy Hash: 8b10ef8d2ebe1a337452b58a4cf6b40be3e49743aca8fffd642e35dec4bc1898
                                          • Instruction Fuzzy Hash: 22118B70B102209FDB509F79D804B6E7BF2AF88700F008469E50AEB3A0DB799C00CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 1769ca43fbf80ceee14e5e883b91cff8fb28577d4b6d774fe4907f0d43858726
                                          • Instruction ID: f08ddd96a3fe25bc0f1db387500af28698fe0cc02de4e5dc99555085bda0f52d
                                          • Opcode Fuzzy Hash: 1769ca43fbf80ceee14e5e883b91cff8fb28577d4b6d774fe4907f0d43858726
                                          • Instruction Fuzzy Hash: 1F115B71F102109FDB549FB8D805B6E7BF2AF88700F104469E50AE73A0DB799901CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: f3613d00f206c7701edaea6df6376a715e8c2799160cd1286a5ff16187029e15
                                          • Instruction ID: 5c4050b7b8a8a4e02560e2129119a2a702f60480214c6c277ead7b03cc14e951
                                          • Opcode Fuzzy Hash: f3613d00f206c7701edaea6df6376a715e8c2799160cd1286a5ff16187029e15
                                          • Instruction Fuzzy Hash: 25012836F112189BDF744EA3D9846AB77B9EB80290F040836FD01D7241CA75DD45D3B1
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 31e0b8b73dc84579165a780e48282b72480cb66dcc25aad77f3d7d2b494a09c0
                                          • Instruction ID: afa38728fcf44c3b522fc88cd4ac8d8acee5597ddfbc2b5a819faad0e277d88c
                                          • Opcode Fuzzy Hash: 31e0b8b73dc84579165a780e48282b72480cb66dcc25aad77f3d7d2b494a09c0
                                          • Instruction Fuzzy Hash: 74B1A035F102099BDB14DFB5E8946AE77B6EB84714F208829E806DB344DF74EC86CB81
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 89603ecd88600d1f2a6590b09aa803c75303bd757a64c67af7b7fa9cff217b7f
                                          • Instruction ID: f3d1006a662912b0a47fcc6303875bd9abc74ea79f86695e88747a2be9b80b13
                                          • Opcode Fuzzy Hash: 89603ecd88600d1f2a6590b09aa803c75303bd757a64c67af7b7fa9cff217b7f
                                          • Instruction Fuzzy Hash: BCA15030F101099FEF64DBAAD5947AE77E6EB89310F204826F409E7395CA35DC918B91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a6f2ae9d0ea14207bea0191d9e78e8332c1f415d7c06641528f025c90685ef6b
                                          • Instruction ID: 3d6acb0e9272ce713598854730ae0b86321968cca9a8831b388ea461268e225f
                                          • Opcode Fuzzy Hash: a6f2ae9d0ea14207bea0191d9e78e8332c1f415d7c06641528f025c90685ef6b
                                          • Instruction Fuzzy Hash: 8A91B275F102059BDB14DFB5D894AAE77B6EF84314F208829E806EB344DB34ED86CB41
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4dc32cf3e7d3af553a8185d690144b95b753e614431c9ebd86f933e5d9be1e12
                                          • Instruction ID: a92276c40b5f9f1401c4232fdfe0ff93a5f94670be4824c224c27dc1eb9a3906
                                          • Opcode Fuzzy Hash: 4dc32cf3e7d3af553a8185d690144b95b753e614431c9ebd86f933e5d9be1e12
                                          • Instruction Fuzzy Hash: 4161C071F000114FCB549B7EC89466FBAD7AFC8620B15443AE80EDB365DE6ADD0287C2
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c3e2378287a15a483907572bc2f11715571a7f2c3bd1e4d9e9d1871de2ddd63
                                          • Instruction ID: 98f7a6fb5babad1e2422aad28148bca5b335d59d3dab06463838666359e764a6
                                          • Opcode Fuzzy Hash: 1c3e2378287a15a483907572bc2f11715571a7f2c3bd1e4d9e9d1871de2ddd63
                                          • Instruction Fuzzy Hash: 61813D30B102099FDB54DFA9D5547AEB7F2EF89304F108429E40AEB394EB74EC468B91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57cf32d1907d785b94250c4984dd2c8e8b3bb4b59bbf9eca31caca47a0807030
                                          • Instruction ID: 198e98ee3bb2d3e76122b3d3443deaa557d3ae54f1f44480e4a075fda65f0d6a
                                          • Opcode Fuzzy Hash: 57cf32d1907d785b94250c4984dd2c8e8b3bb4b59bbf9eca31caca47a0807030
                                          • Instruction Fuzzy Hash: 1A813C30B102099FDB54DFA9D5547AEB7F2AF89304F108429E40ADB395EB74EC868B91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bca10826a883bcbc9fbe308f91473ae9be947bf8c18cd65fb8ad060fca66bbbc
                                          • Instruction ID: be5c7b2e3693eb3eaabb867c3bc948f760ecc5c6a6b5e7688fd5fee69a888d93
                                          • Opcode Fuzzy Hash: bca10826a883bcbc9fbe308f91473ae9be947bf8c18cd65fb8ad060fca66bbbc
                                          • Instruction Fuzzy Hash: 93716F31F1031A8FDB14DFAAC5546AEB7B2FF85304F108529E409EB354EB75D8868B81
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca747351cc19caf9b8eacc737a683aad42433c47fd2e5e5b2fb630c939e780a5
                                          • Instruction ID: 68b77eb99bb694d5719f8dd939d4a22ef28698935cd5aa967a8dd2343616b8f5
                                          • Opcode Fuzzy Hash: ca747351cc19caf9b8eacc737a683aad42433c47fd2e5e5b2fb630c939e780a5
                                          • Instruction Fuzzy Hash: C3913F34E102198BDF60DF69C890B9DB7B1FF89310F20C599E549AB354EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0fd74bcab3c29d3c0865e8ba51f7fd649d97a4f72060e98c00ddf9eb5b47a38
                                          • Instruction ID: d193f220ad3ec464d6345b4840d6a26c3cafc324901ea082edec1798672f3ebd
                                          • Opcode Fuzzy Hash: a0fd74bcab3c29d3c0865e8ba51f7fd649d97a4f72060e98c00ddf9eb5b47a38
                                          • Instruction Fuzzy Hash: 8F914F34E102198BDF60DF69C890B9DB7B1FF89310F20C599E549AB354EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab5b0c7cff41913573c2931f96ecd8711bab6266aff3c7d52b81f73a231b96c5
                                          • Instruction ID: ed488ae89b4c23ea6391c78a4f36f4fc3451231d7ec6343c7ff518f81f42cb50
                                          • Opcode Fuzzy Hash: ab5b0c7cff41913573c2931f96ecd8711bab6266aff3c7d52b81f73a231b96c5
                                          • Instruction Fuzzy Hash: C9914E34E102198BDF50DF69C890B9DB7B1FF89300F20C599E549AB394EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 10ac194f69c1b6af046ee687c34ec50ed7cc83c8d59ff805408d42ef142a4711
                                          • Instruction ID: 5e4d2a9ef2699f1ebfcd52ac36c2c276a45a81668c611fe7d7c6bbb1c33e56b6
                                          • Opcode Fuzzy Hash: 10ac194f69c1b6af046ee687c34ec50ed7cc83c8d59ff805408d42ef142a4711
                                          • Instruction Fuzzy Hash: AF711C74A006099FDB54DBAAD990AAEBBF6FF88300F148429E405EB355DB74EC46CB50
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6d874d4ee16760b1b9d9428eabfb7c75b412fffde013cc74946c1256d8c8b667
                                          • Instruction ID: 9ccc530181dbb98658832172f677e2781615b3531b4e3509afd7fe34d275e219
                                          • Opcode Fuzzy Hash: 6d874d4ee16760b1b9d9428eabfb7c75b412fffde013cc74946c1256d8c8b667
                                          • Instruction Fuzzy Hash: 91711D74A006099FDB54DFAAD990AAEBBF6FF88300F148429E405EB355DB74EC46CB50
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 137efb9662d1b822928fb18f0f9b5890d7e3137435034fcfb52cf0785298ad30
                                          • Instruction ID: 23429506a370a034a7a068f2ad9348d03cdc1bb726782a95a34f5bf811f34491
                                          • Opcode Fuzzy Hash: 137efb9662d1b822928fb18f0f9b5890d7e3137435034fcfb52cf0785298ad30
                                          • Instruction Fuzzy Hash: E951BE31E105059FDB24EBAAF8942ADBBB3FF85315F108869E10AD7250DB359856CB81
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86045f622eb6f6920f87be36c7d0fac5b9962d4a24c47972e608a85c63c242b8
                                          • Instruction ID: ad96869facee9f3c4ee408abff05c6b5a62123f7f225ec41479593435e807b7b
                                          • Opcode Fuzzy Hash: 86045f622eb6f6920f87be36c7d0fac5b9962d4a24c47972e608a85c63c242b8
                                          • Instruction Fuzzy Hash: 0451D670F202049FEF645B6EE954B6F2A5BDB89314F24482AF00ED73E5C929CCD58792
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0443f23235dd8f2fa6fdb893c914f8969c91972b2a7b210efff454949b7d2e89
                                          • Instruction ID: bf5c5dadc0d50ffb69c6f765740a858247f4f8663f806d94653733a799d163fa
                                          • Opcode Fuzzy Hash: 0443f23235dd8f2fa6fdb893c914f8969c91972b2a7b210efff454949b7d2e89
                                          • Instruction Fuzzy Hash: C151A374E142458FDF70CFAAE49477EBBB2EB45310F20886AF55ADB281C635D881CB91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d27522179e50b8bd6229dc92abcd41b7405205889b4fd13a04f67d87ba86820
                                          • Instruction ID: 68a925f955c934fccbb7407caa7c8b9ad3c4f2d25856623509d2006eac5192fb
                                          • Opcode Fuzzy Hash: 4d27522179e50b8bd6229dc92abcd41b7405205889b4fd13a04f67d87ba86820
                                          • Instruction Fuzzy Hash: 6051B370F202049FEF645BAEE95476F265BEB89750F20482AF10ED73A4C929CCD58792
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 885a22175634e50dcf824efc85cb775d29cbcff0f903e232fbf2386caeee847e
                                          • Instruction ID: 4ec883c644b80dffaeaeeb9b5dbbbeb8019c53feb1f794361ad214361b9189a3
                                          • Opcode Fuzzy Hash: 885a22175634e50dcf824efc85cb775d29cbcff0f903e232fbf2386caeee847e
                                          • Instruction Fuzzy Hash: 2A518130F102049FCB44EB79D980A9DB7B2FF88354F108929E545AB364DB35EC86CB90
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7e3d66bb56c8b2e549c9bf7a37014c0e56dfa65345eca43f07dc19d11714d9d
                                          • Instruction ID: b257af44157354edc466f651b7fc4f4a12583ecead5cc7251110febd802e0e77
                                          • Opcode Fuzzy Hash: f7e3d66bb56c8b2e549c9bf7a37014c0e56dfa65345eca43f07dc19d11714d9d
                                          • Instruction Fuzzy Hash: 4C413071E006098BDF70CF9AE8806AFF7F2FB88310F10492AE156D7654D771E8958B90
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cce0606bf917706994fff099c6a50e0b02c0738d98671f4efbdb750feebb04bd
                                          • Instruction ID: c13a0ae6eec50f27e88f1278663df9d406cc08f1b80831999708b4313f94bc81
                                          • Opcode Fuzzy Hash: cce0606bf917706994fff099c6a50e0b02c0738d98671f4efbdb750feebb04bd
                                          • Instruction Fuzzy Hash: 17317E70E106059FCF59CFA5D89469EB7B2EF89300F148929E806E7740DB35E946CB91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3373a579f326260430279c11db17587d1a3899a135056ad6f21dab73e2f62fd
                                          • Instruction ID: 27d33b5964853c4d1c08780c9c6b47ee747a0e3dda8ac6c15ff9265bb537517e
                                          • Opcode Fuzzy Hash: d3373a579f326260430279c11db17587d1a3899a135056ad6f21dab73e2f62fd
                                          • Instruction Fuzzy Hash: 73315C70E102059BCB59CFAAD89469EB7B2FF89300F108929E816E7350DB75ED46CB91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fed043b9a2227a6083c399cecd4a8a1262afc8cc81b66dbe716229275f0601b
                                          • Instruction ID: 7599e1943efc25ba51d0e5f1ec9b8ca08baaec566b5ffe9616bd881896cb399e
                                          • Opcode Fuzzy Hash: 7fed043b9a2227a6083c399cecd4a8a1262afc8cc81b66dbe716229275f0601b
                                          • Instruction Fuzzy Hash: 17217A75F112159FDB40CFAAE880AAEBBF5EB48710F10802AE915E7341E734DD418B91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 72d28b21f084c64b3170f2ec2a6dabca871f0364f49a7faeeb219a6edbb5a37d
                                          • Instruction ID: 6621259ae2e2ba2a184a6ccfe3e9e782248e24aaa5f7148b6bd8be0c931352d9
                                          • Opcode Fuzzy Hash: 72d28b21f084c64b3170f2ec2a6dabca871f0364f49a7faeeb219a6edbb5a37d
                                          • Instruction Fuzzy Hash: 96215976F112159FDB40CFAAE840AAEBBF5EB48710F10802AF919E7391E734DD418B91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1887594273.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_129d000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 229461ac36fd0b12419713f9fe58a6c3c334345d127694acec2ced1db541cc48
                                          • Instruction ID: 33eb92883958cce00ba6d7d4cda5e9a3db6f6548d3183c57a5918d6787f4c57c
                                          • Opcode Fuzzy Hash: 229461ac36fd0b12419713f9fe58a6c3c334345d127694acec2ced1db541cc48
                                          • Instruction Fuzzy Hash: EE212271514208DFDF11DF9CD9C0B26BBA5FB84314F20C56DD9094B256C37BD446DA62
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f633164eabe7806c944f8a835503aaf5d80e748362715f4b09eff7a2e78ec742
                                          • Instruction ID: 09e3641b882a9b0c5e6e803e5aca747e14b65b4298272b4e141fb92dd7505f06
                                          • Opcode Fuzzy Hash: f633164eabe7806c944f8a835503aaf5d80e748362715f4b09eff7a2e78ec742
                                          • Instruction Fuzzy Hash: 0911B171E002289BCF55DF79D8806DEF7B5EB89310F1599AAE406E7300DA32DA85CB91
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f5075576c90196af629e05052c788ad2d6d8b03bc8a701101b5356264c55ed8
                                          • Instruction ID: eaec3ac637528b6ce826082357bc01cdcc1db66ff52c539480bc02afd02b8a64
                                          • Opcode Fuzzy Hash: 3f5075576c90196af629e05052c788ad2d6d8b03bc8a701101b5356264c55ed8
                                          • Instruction Fuzzy Hash: 6F118232B201249FDB549669D818AAF73FAEBC8211F11443AE40AE7344DE75DC0287D1
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81581f996fa53c60f055fc929a21a5a52a95e980e0ec602cf97e6845856d35af
                                          • Instruction ID: b28a56514b56f2c16e3419bf90003e3c9466a9800802eb89dcdb1c786493177a
                                          • Opcode Fuzzy Hash: 81581f996fa53c60f055fc929a21a5a52a95e980e0ec602cf97e6845856d35af
                                          • Instruction Fuzzy Hash: 6F11C875F115104BCF699BB9E45416DB7A3EBC4211B24887AE40AD7350EE34C842CB81
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bdb0ad1703b7476e455a35c1640c67c236cba1371db75c6448c38de1aa6201f1
                                          • Instruction ID: e141695a274841ea44b9a62bf600f068b66c33cf7950855758f852152d83d670
                                          • Opcode Fuzzy Hash: bdb0ad1703b7476e455a35c1640c67c236cba1371db75c6448c38de1aa6201f1
                                          • Instruction Fuzzy Hash: 9221C2B1D01269AFCB10CF9AD984ACEFBF4FB48324F10812AE518A7350D374A554CFA5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8b8ddbe8d19105b2f1c82a993cf356fa593c64342109ff05d1fb748d9bf18d4c
                                          • Instruction ID: 6d3160f4131929848feddfe38a8188b03466b9d20af0713dbaf81a2edeb084fa
                                          • Opcode Fuzzy Hash: 8b8ddbe8d19105b2f1c82a993cf356fa593c64342109ff05d1fb748d9bf18d4c
                                          • Instruction Fuzzy Hash: E601A732B200245FDB5496A9DC547EF73FADBC4610F04443AE409E3344EE69DC0647D5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1887594273.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_129d000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 45aebc967d627419c09fbf36d24881c04751cff3d3889f4e42d5e4d7e1b93223
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: BE11EB75504284CFCB12CF58C5C4B15BFA1FB84314F28C6AAD9094B252C33AD40ACB62
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 800298e97bf93466b2edcf0e7fb168bd6ae7ce278a1188cac09580afee65bb14
                                          • Instruction ID: d70168f8f2251bf850c6c2473621cd8015cc9403534b830fb496c0b25155797b
                                          • Opcode Fuzzy Hash: 800298e97bf93466b2edcf0e7fb168bd6ae7ce278a1188cac09580afee65bb14
                                          • Instruction Fuzzy Hash: DA11D3B1D01229AFCB00CF9AD984ACEFBB4FB48310F10812AE518A7350C374A554CFA5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1a93f87807ea96b6691ee5ab19f7aa97265a7d1d726c46d61b01b39fc7671295
                                          • Instruction ID: 63bf301b82396c428c1a0944fa3aec107f2857f3b32ce89f79482a1d79fadb79
                                          • Opcode Fuzzy Hash: 1a93f87807ea96b6691ee5ab19f7aa97265a7d1d726c46d61b01b39fc7671295
                                          • Instruction Fuzzy Hash: 6101AD35B100145BDBA596AFD95072BB7DADBC9710F24C83AF50AC7340DE25DC038396
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b3a175a08879b2c4e0475cac01204b632eb914b83c50692014af82821a43e30c
                                          • Instruction ID: a6706c5c12d6fac67ef7c986e43bbb1b01f253392882f79561425abfdaa23cf6
                                          • Opcode Fuzzy Hash: b3a175a08879b2c4e0475cac01204b632eb914b83c50692014af82821a43e30c
                                          • Instruction Fuzzy Hash: 0A016D31B100145BDBA596AED95072AB7DADBC9710F24C43AF50AC7344DE65DC434395
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a783b29c48a9086720d807794760d4ba0b5e833eb925975be2e6feaf621b3885
                                          • Instruction ID: 66b699620f586e2b23f2a6b2352b86c5f63a06dfccf55df9adb64bb28e16f24d
                                          • Opcode Fuzzy Hash: a783b29c48a9086720d807794760d4ba0b5e833eb925975be2e6feaf621b3885
                                          • Instruction Fuzzy Hash: 17018CB1B204111BDB65976EE85472E67DBDBCA664F10883AF10EC7340DE69DC4343C5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d587f35b3ef6108d9b8f9dde93668315ef99503ef12c3d0eecc17a4dd66820f
                                          • Instruction ID: d5fba7424501edd2bb418ae9a10d10c771a7916bea3af20db2ae1095fff7efa0
                                          • Opcode Fuzzy Hash: 4d587f35b3ef6108d9b8f9dde93668315ef99503ef12c3d0eecc17a4dd66820f
                                          • Instruction Fuzzy Hash: 43018130B201155FDB60EAAFE45472AB7D6EB8E714F148839F50AE7344DE26EC428781
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a4ab7120a4b6aa420e11f97ebcfb3f393de52f30b69972b335c40610ab3f815
                                          • Instruction ID: d6e173a8168461e5d7bb71cb8d5879fe111cf42ead0a024f754b929bf95c3399
                                          • Opcode Fuzzy Hash: 6a4ab7120a4b6aa420e11f97ebcfb3f393de52f30b69972b335c40610ab3f815
                                          • Instruction Fuzzy Hash: 4901DCB1B204100BDB65D7AEE85072E63D7DBC9654F10883AF00ED7340DE69CC430381
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3406a9ab1292e9af44c5efcd3bd7543ab6276094103e0daa20590ef556d93af2
                                          • Instruction ID: d13137f866bc2ca2cbd0ec9a2b5194ffba2b1c0c2ce04c0576b3dfff21836d3e
                                          • Opcode Fuzzy Hash: 3406a9ab1292e9af44c5efcd3bd7543ab6276094103e0daa20590ef556d93af2
                                          • Instruction Fuzzy Hash: E2018130B200155FDB60DAAFE45472AB3D6EB8D714F148839F50AE7344DE26EC428781
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e9efdd05df39efa44060dc308eb9917392cc6677c05c139ca5281c347594005f
                                          • Instruction ID: b3d03821eb22afdac16d3bf5e4ceba2affa55209bc8b8f262648d35aaf374e48
                                          • Opcode Fuzzy Hash: e9efdd05df39efa44060dc308eb9917392cc6677c05c139ca5281c347594005f
                                          • Instruction Fuzzy Hash: 56F06D71B149004FDB62876EE86172A6BE7DBC9694F14847AF00EC7355DA69DC4383C1
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45ea91e225b7cf66cf8e3315785573f91fc391b070ef9cde37a28340aade8296
                                          • Instruction ID: 8e89cde6e514629d4e68ac3ae18214a207932bbd436b30080ee4e884ff9e9b81
                                          • Opcode Fuzzy Hash: 45ea91e225b7cf66cf8e3315785573f91fc391b070ef9cde37a28340aade8296
                                          • Instruction Fuzzy Hash: E8F05C76F30228A7DF549AA6EC017DA7336FB40355F104426EA40F7344D7359C058BC0
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 99eb8dad64e01dea114a4cfb8f3ade2fc88e344f85800674f79b54ffcf255d61
                                          • Instruction ID: 8f86e7bfe3038c742b3c5b3ca2397ea306dbcd80b2a22b46ccc16faf5bd0080a
                                          • Opcode Fuzzy Hash: 99eb8dad64e01dea114a4cfb8f3ade2fc88e344f85800674f79b54ffcf255d61
                                          • Instruction Fuzzy Hash: 03E0C2B1E14148ABDF60CFB6C94576FB3ACD706214F2088B4F809DB201E2B6DA028352
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                                          • Instruction ID: 6360f9b12800a991b64b0b4f09d14938832ce1d3ceb56d56b20f666ccf0c113e
                                          • Opcode Fuzzy Hash: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                                          • Instruction Fuzzy Hash: 95E0C2B0E14148ABDF60CFB6C94576FB3ACD706204F2084B4E409CB201E272DA028352
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: 51d4be279ee000e9b68b20a5f48b3de301834b70845fdf554b46ac6741bdda99
                                          • Instruction ID: 912fe39196f88d05e9e1163ebb8cff8cf002125418d0483cf29a7b9ec83a012f
                                          • Opcode Fuzzy Hash: 51d4be279ee000e9b68b20a5f48b3de301834b70845fdf554b46ac6741bdda99
                                          • Instruction Fuzzy Hash: 89121B30E002198FDB68DF69C954A9EB7F2FF88704F2085A9D50AAB355DB309D85CF91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 9916555dfea4497c9c9936b2c1c65ac0db0dbd32fbb74262239e36e17fa1fcbb
                                          • Instruction ID: 74cd7d52721821a4f91f0e8ff059343cc7e23094595ee34ab7f2b158a1e1f792
                                          • Opcode Fuzzy Hash: 9916555dfea4497c9c9936b2c1c65ac0db0dbd32fbb74262239e36e17fa1fcbb
                                          • Instruction Fuzzy Hash: 91915E30E102099FDB64DB6AD958B6EB7B2EF44304F18842AE482AB355DB75DC85CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: a73f6514b4ea4025f6877ae48eb2894fd8f7e1e64bcfdcd0570b0b0e43286bd4
                                          • Instruction ID: a6ffcde9d3764b5685c6801dab0fa7da26c5a22d61b3929dde2750d8d9bfe3ee
                                          • Opcode Fuzzy Hash: a73f6514b4ea4025f6877ae48eb2894fd8f7e1e64bcfdcd0570b0b0e43286bd4
                                          • Instruction Fuzzy Hash: 4E518030F102088FDB69DB6AD94466EB7F2EB84300F24892AE446EB355DF35DC46CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: 6cffe251c806474551ee4fad10a6c992fc5b54cadd448f69a91f2431abc6a569
                                          • Instruction ID: 008bf9e23e989a5d79ea9cac86984553cf6ce52eeeb5cfdc47649240062cbdff
                                          • Opcode Fuzzy Hash: 6cffe251c806474551ee4fad10a6c992fc5b54cadd448f69a91f2431abc6a569
                                          • Instruction Fuzzy Hash: 13F15E30B01209CFDB58DBA9D594A6EB7B3FF84304F248569E4059B369DB75DC82CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 5deef69cf76711510166b234646b02c823e0696e658f6c97c30d652c42d3c571
                                          • Instruction ID: b5ff2c1fddd84346264cecda1c8fafdb32d10ee6981faf7f2391a6e9b7ce4276
                                          • Opcode Fuzzy Hash: 5deef69cf76711510166b234646b02c823e0696e658f6c97c30d652c42d3c571
                                          • Instruction Fuzzy Hash: 2071AE30E102198FDB68DFAAD59466EB7B2FF84300F10896AE006DB358DB71DD56CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 191bb3e8aa1482501d4e9d189148e15cb5d110bb14e89d10c287cbf7d49a1316
                                          • Instruction ID: df585e9e11f3b32fd5bdb7678de220300eefcd02c48dbf63fc34cd395cc6f6b4
                                          • Opcode Fuzzy Hash: 191bb3e8aa1482501d4e9d189148e15cb5d110bb14e89d10c287cbf7d49a1316
                                          • Instruction Fuzzy Hash: 08B14D30F112098FDB54EFA9D5946AEB7B2FF88304F248429E0069B359DB75DC86CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: 1b21d540eb5e365d723991fa496f0d9b452ccc5ceff79b03954c6ff69b01f68f
                                          • Instruction ID: f1bfb356104b673acc12ca207cf19347d97ab10a0d8cb9b7d1ee66eb7abfae7a
                                          • Opcode Fuzzy Hash: 1b21d540eb5e365d723991fa496f0d9b452ccc5ceff79b03954c6ff69b01f68f
                                          • Instruction Fuzzy Hash: A751D330F102019FDB58DB6AD944A6AB7F2FF88704F108569E4059B3A5DB34EC45CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.1896000072.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6d60000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: da13eda605a1417487f5e8f8f571c8f67efdc986ee87117cbc0e0e1bfe66bea2
                                          • Instruction ID: 13719f9c27205e9353bf49d185fbb5d7cc5e31811bfd444b3918cb8f663d22de
                                          • Opcode Fuzzy Hash: da13eda605a1417487f5e8f8f571c8f67efdc986ee87117cbc0e0e1bfe66bea2
                                          • Instruction Fuzzy Hash: E8517F34F102049FDBA5DB69D5846AEB3B2EB84311F18852AE846EB355DB35DC42CB90

                                          Execution Graph

                                          Execution Coverage:8.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:38
                                          Total number of Limit Nodes:5
                                          execution_graph 14903 2c0aff0 14904 2c0aff4 14903->14904 14908 2c0b0e7 14904->14908 14913 2c0b0e8 14904->14913 14905 2c0afff 14909 2c0b11c 14908->14909 14910 2c0b0f9 14908->14910 14909->14905 14910->14909 14911 2c0b320 GetModuleHandleW 14910->14911 14912 2c0b34d 14911->14912 14912->14905 14914 2c0b11c 14913->14914 14915 2c0b0f9 14913->14915 14914->14905 14915->14914 14916 2c0b320 GetModuleHandleW 14915->14916 14917 2c0b34d 14916->14917 14917->14905 14918 2c0d380 14919 2c0d3c6 14918->14919 14923 2c0d550 14919->14923 14926 2c0d560 14919->14926 14920 2c0d4b3 14929 2c0afd4 14923->14929 14927 2c0d58e 14926->14927 14928 2c0afd4 DuplicateHandle 14926->14928 14927->14920 14928->14927 14930 2c0d5c8 DuplicateHandle 14929->14930 14931 2c0d58e 14930->14931 14931->14920 14932 2c04668 14933 2c0467a 14932->14933 14934 2c04686 14933->14934 14936 2c04779 14933->14936 14937 2c0479d 14936->14937 14941 2c04888 14937->14941 14945 2c04878 14937->14945 14943 2c048af 14941->14943 14942 2c0498c 14942->14942 14943->14942 14949 2c04248 14943->14949 14947 2c04888 14945->14947 14946 2c0498c 14946->14946 14947->14946 14948 2c04248 CreateActCtxA 14947->14948 14948->14946 14950 2c05918 CreateActCtxA 14949->14950 14952 2c059db 14950->14952

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 548 2c0b0e8-2c0b0f7 549 2c0b123-2c0b127 548->549 550 2c0b0f9-2c0b106 call 2c09b58 548->550 551 2c0b129-2c0b133 549->551 552 2c0b13b-2c0b17c 549->552 557 2c0b108 550->557 558 2c0b11c 550->558 551->552 559 2c0b189-2c0b197 552->559 560 2c0b17e-2c0b186 552->560 603 2c0b10e call 2c0b380 557->603 604 2c0b10e call 2c0b370 557->604 558->549 562 2c0b199-2c0b19e 559->562 563 2c0b1bb-2c0b1bd 559->563 560->559 561 2c0b114-2c0b116 561->558 564 2c0b258-2c0b318 561->564 566 2c0b1a0-2c0b1a7 call 2c0ada0 562->566 567 2c0b1a9 562->567 565 2c0b1c0-2c0b1c7 563->565 598 2c0b320-2c0b34b GetModuleHandleW 564->598 599 2c0b31a-2c0b31d 564->599 568 2c0b1d4-2c0b1db 565->568 569 2c0b1c9-2c0b1d1 565->569 570 2c0b1ab-2c0b1b9 566->570 567->570 573 2c0b1e8-2c0b1f1 call 2c0adb0 568->573 574 2c0b1dd-2c0b1e5 568->574 569->568 570->565 579 2c0b1f3-2c0b1fb 573->579 580 2c0b1fe-2c0b203 573->580 574->573 579->580 582 2c0b221-2c0b22e 580->582 583 2c0b205-2c0b20c 580->583 588 2c0b230-2c0b24e 582->588 589 2c0b251-2c0b257 582->589 583->582 584 2c0b20e-2c0b21e call 2c0adc0 call 2c0add0 583->584 584->582 588->589 600 2c0b354-2c0b368 598->600 601 2c0b34d-2c0b353 598->601 599->598 601->600 603->561 604->561
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02C0B33E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1889166863.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2c00000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID: p@;
                                          • API String ID: 4139908857-2970247504
                                          • Opcode ID: 1f379d20d1a80afcdc5c41bd4b28ea7ff71c530213d2acf0ba1d90abb488708f
                                          • Instruction ID: 4b64c91ea814a85bba189d8dfb8b025683c6028f1d70a6f45b5283a827a66c2b
                                          • Opcode Fuzzy Hash: 1f379d20d1a80afcdc5c41bd4b28ea7ff71c530213d2acf0ba1d90abb488708f
                                          • Instruction Fuzzy Hash: 92714470A00B058FDB24DF69D58175ABBF2FF88308F148A2DD48AD7A90DB74E945CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 605 2c0590d-2c059d9 CreateActCtxA 607 2c059e2-2c05a3c 605->607 608 2c059db-2c059e1 605->608 615 2c05a4b-2c05a4f 607->615 616 2c05a3e-2c05a41 607->616 608->607 617 2c05a60-2c05a90 615->617 618 2c05a51-2c05a5d 615->618 616->615 622 2c05a42-2c05a4a 617->622 623 2c05a92-2c05b14 617->623 618->617 622->615
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02C059C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1889166863.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2c00000_adobe.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID: p@;
                                          • API String ID: 2289755597-2970247504
                                          • Opcode ID: a14ee2de651d9aa944cb178348d9d55eec3d0ce870d96acf59750ddbf5602878
                                          • Instruction ID: 434d521af5d3389d90fa13431e79cd382fb9e058bd20247ad694810284d38959
                                          • Opcode Fuzzy Hash: a14ee2de651d9aa944cb178348d9d55eec3d0ce870d96acf59750ddbf5602878
                                          • Instruction Fuzzy Hash: 3C41F5B0C00619CFDB14CFA9C9847DDFBB5BF48304F24816AD409AB255DB75594ACF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 625 2c04248-2c059d9 CreateActCtxA 628 2c059e2-2c05a3c 625->628 629 2c059db-2c059e1 625->629 636 2c05a4b-2c05a4f 628->636 637 2c05a3e-2c05a41 628->637 629->628 638 2c05a60-2c05a90 636->638 639 2c05a51-2c05a5d 636->639 637->636 643 2c05a42-2c05a4a 638->643 644 2c05a92-2c05b14 638->644 639->638 643->636
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02C059C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1889166863.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2c00000_adobe.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID: p@;
                                          • API String ID: 2289755597-2970247504
                                          • Opcode ID: a90d636014e6865a87263bbc8af615a336a44aae3a39475fb64a92961032d6c9
                                          • Instruction ID: 539c38e8eea4a3d8935944ace085fc7e5f20c56ba635f30f83e1670edbe901f8
                                          • Opcode Fuzzy Hash: a90d636014e6865a87263bbc8af615a336a44aae3a39475fb64a92961032d6c9
                                          • Instruction Fuzzy Hash: E241D2B0C00719CBDB24DFAAC98479EBBB5BF48304F64806AD408AB295DB755946CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 646 2c0afd4-2c0d65c DuplicateHandle 648 2c0d665-2c0d682 646->648 649 2c0d65e-2c0d664 646->649 649->648
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C0D58E,?,?,?,?,?), ref: 02C0D64F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1889166863.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2c00000_adobe.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID: p@;
                                          • API String ID: 3793708945-2970247504
                                          • Opcode ID: 65c3a502448ba2df96f89cfc6b0ec6e846f97b2abde0fa6a85d15e6fdbc2e747
                                          • Instruction ID: 773b78f17a3f7c74994dee62b45ef62d774f390266a087730c4e9cb404a70413
                                          • Opcode Fuzzy Hash: 65c3a502448ba2df96f89cfc6b0ec6e846f97b2abde0fa6a85d15e6fdbc2e747
                                          • Instruction Fuzzy Hash: 1021E4B5900208EFDB10CF9AD584ADEFFF8EB48314F14841AE919A7350D378A950CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 652 2c0d5c0-2c0d65c DuplicateHandle 653 2c0d665-2c0d682 652->653 654 2c0d65e-2c0d664 652->654 654->653
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C0D58E,?,?,?,?,?), ref: 02C0D64F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1889166863.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2c00000_adobe.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID: p@;
                                          • API String ID: 3793708945-2970247504
                                          • Opcode ID: 3202e8af6428e1fb72f03e1b99ffcb91c90fc52953aa647c55d1984e631c6222
                                          • Instruction ID: 7378b6f84147ee9125203a63c31799499f2f08cd03c706a6d4d49dbd08274a0a
                                          • Opcode Fuzzy Hash: 3202e8af6428e1fb72f03e1b99ffcb91c90fc52953aa647c55d1984e631c6222
                                          • Instruction Fuzzy Hash: CC21EFB59002589FDB10CFA9D584AEEBBF4FB48324F14842AE958A3351D378A940CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 657 2c0b2d8-2c0b318 658 2c0b320-2c0b34b GetModuleHandleW 657->658 659 2c0b31a-2c0b31d 657->659 660 2c0b354-2c0b368 658->660 661 2c0b34d-2c0b353 658->661 659->658 661->660
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02C0B33E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1889166863.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_2c00000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID: p@;
                                          • API String ID: 4139908857-2970247504
                                          • Opcode ID: 295e55143c4add4f451563d7c753e330e4de92a622b0a73701a812cea5fe7678
                                          • Instruction ID: d9ff6e6621812973babd83da210cb0e0d8fc161797049f95b2e137db863eb5fb
                                          • Opcode Fuzzy Hash: 295e55143c4add4f451563d7c753e330e4de92a622b0a73701a812cea5fe7678
                                          • Instruction Fuzzy Hash: 121110B6D002498FCB14CF9AD544ADEFBF4AB88328F20842AD519A7250C379A945CFA5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1887742805.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_fcd000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2cc086886811270478da30abca5f29d735f019605f66d6edd988afed9b59a963
                                          • Instruction ID: 7cba3408116bbc5af9e1fdf2f110d2035d780ef9131988ef8e17b6f7d83842eb
                                          • Opcode Fuzzy Hash: 2cc086886811270478da30abca5f29d735f019605f66d6edd988afed9b59a963
                                          • Instruction Fuzzy Hash: 21212872500205DFDB09DF14DAC1F2ABF65FB94324F20C17DDA094B256C336E856E6A2
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1887824035.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_fdd000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bfd78dd97888243996c0768bcd1eb321d9da99813b520a7833580b5c899e068
                                          • Instruction ID: e517475a12d87cf13953d2a609d75d070ad05918519d1d4867678dca80912f85
                                          • Opcode Fuzzy Hash: 1bfd78dd97888243996c0768bcd1eb321d9da99813b520a7833580b5c899e068
                                          • Instruction Fuzzy Hash: 1E21F571504200DFCB14DF14D988B16BB66EBC4324F28C56AD80A4B35AC336D847DA61
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1887824035.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_fdd000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d317d79e5f8f45398a8f228dfe8c51ec59cf093726417a6b7945f3edb88ecb9
                                          • Instruction ID: 6f1467f951a013eb91d40d00d847a047739b6a619c3d09015ec8bfa9cc97d5d6
                                          • Opcode Fuzzy Hash: 3d317d79e5f8f45398a8f228dfe8c51ec59cf093726417a6b7945f3edb88ecb9
                                          • Instruction Fuzzy Hash: B92183755093808FC712CF24D594715BF71EB46314F28C5EBD8498F6A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.1887742805.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_fcd000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 42e924271af87e70bede3bc7a861002bd56165e2d8aae147d7fc277a08c58675
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 2A110372804240DFCB06CF00DAC4B1ABF71FB94324F24C2ADD9090B256C33AE85ADBA1

                                          Execution Graph

                                          Execution Coverage:11.6%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:1.4%
                                          Total number of Nodes:219
                                          Total number of Limit Nodes:25
                                          execution_graph 43641 301d030 43642 301d048 43641->43642 43643 301d0a2 43642->43643 43651 6e2769e 43642->43651 43659 6e2313e 43642->43659 43663 6e23130 43642->43663 43667 6e23010 43642->43667 43673 6e23003 43642->43673 43679 6e2170c 43642->43679 43687 6e216fc 43642->43687 43653 6e276a0 43651->43653 43652 6e27701 43703 6e26694 43652->43703 43653->43652 43656 6e276f1 43653->43656 43655 6e276ff 43691 6e27828 43656->43691 43697 6e27818 43656->43697 43660 6e23140 43659->43660 43766 6e21734 43660->43766 43662 6e23147 43662->43643 43664 6e23134 43663->43664 43664->43643 43665 6e21734 GetModuleHandleW 43664->43665 43666 6e23147 43665->43666 43666->43643 43668 6e23012 43667->43668 43669 6e216fc GetModuleHandleW 43668->43669 43670 6e23042 43669->43670 43671 6e2170c 2 API calls 43670->43671 43672 6e23057 43671->43672 43672->43643 43674 6e2300c 43673->43674 43675 6e216fc GetModuleHandleW 43674->43675 43676 6e23042 43675->43676 43677 6e2170c 2 API calls 43676->43677 43678 6e23057 43677->43678 43678->43643 43680 6e21717 43679->43680 43681 6e27701 43680->43681 43683 6e276f1 43680->43683 43682 6e26694 2 API calls 43681->43682 43684 6e276ff 43682->43684 43685 6e27828 2 API calls 43683->43685 43686 6e27818 2 API calls 43683->43686 43685->43684 43686->43684 43688 6e21707 43687->43688 43689 6e21734 GetModuleHandleW 43688->43689 43690 6e23147 43689->43690 43690->43643 43693 6e27836 43691->43693 43692 6e26694 2 API calls 43692->43693 43693->43692 43694 6e2790e 43693->43694 43710 6e27cf1 43693->43710 43715 6e27d00 43693->43715 43694->43655 43699 6e27828 43697->43699 43698 6e26694 2 API calls 43698->43699 43699->43698 43700 6e2790e 43699->43700 43701 6e27d00 OleGetClipboard 43699->43701 43702 6e27cf1 OleGetClipboard 43699->43702 43700->43655 43701->43699 43702->43699 43704 6e2669f 43703->43704 43705 6e27a14 43704->43705 43706 6e2796a 43704->43706 43707 6e2170c OleGetClipboard 43705->43707 43708 6e279c2 CallWindowProcW 43706->43708 43709 6e27971 43706->43709 43707->43709 43708->43709 43709->43655 43711 6e27cf6 43710->43711 43712 6e27ce6 43711->43712 43720 6e282c0 43711->43720 43726 6e28298 43711->43726 43712->43693 43716 6e27d05 43715->43716 43717 6e27ce6 43716->43717 43718 6e282c0 OleGetClipboard 43716->43718 43719 6e28298 OleGetClipboard 43716->43719 43717->43693 43718->43716 43719->43716 43722 6e282c8 43720->43722 43721 6e282dc 43721->43711 43722->43721 43732 6e28308 43722->43732 43743 6e282f9 43722->43743 43723 6e282f1 43723->43711 43727 6e2829d 43726->43727 43728 6e28215 43727->43728 43730 6e28308 OleGetClipboard 43727->43730 43731 6e282f9 OleGetClipboard 43727->43731 43728->43711 43729 6e282f1 43729->43711 43730->43729 43731->43729 43733 6e2831a 43732->43733 43734 6e28335 43733->43734 43736 6e28379 43733->43736 43739 6e28308 OleGetClipboard 43734->43739 43740 6e282f9 OleGetClipboard 43734->43740 43735 6e2833b 43735->43723 43738 6e283f9 43736->43738 43754 6e285c0 43736->43754 43758 6e285d0 43736->43758 43737 6e28417 43737->43723 43738->43723 43739->43735 43740->43735 43744 6e28302 43743->43744 43745 6e28335 43744->43745 43747 6e28379 43744->43747 43750 6e28308 OleGetClipboard 43745->43750 43751 6e282f9 OleGetClipboard 43745->43751 43746 6e2833b 43746->43723 43749 6e283f9 43747->43749 43752 6e285c0 OleGetClipboard 43747->43752 43753 6e285d0 OleGetClipboard 43747->43753 43748 6e28417 43748->43723 43749->43723 43750->43746 43751->43746 43752->43748 43753->43748 43756 6e285d0 43754->43756 43757 6e2860b 43756->43757 43762 6e280a8 43756->43762 43757->43737 43760 6e285e5 43758->43760 43759 6e280a8 OleGetClipboard 43759->43760 43760->43759 43761 6e2860b 43760->43761 43761->43737 43763 6e28678 OleGetClipboard 43762->43763 43765 6e28712 43763->43765 43767 6e2173f 43766->43767 43769 6e23217 43767->43769 43770 6e2039c 43767->43770 43771 6e21db0 GetModuleHandleW 43770->43771 43773 6e21e25 43771->43773 43773->43769 43626 6e284e0 43627 6e284eb 43626->43627 43629 6e284fb 43627->43629 43630 6e26834 43627->43630 43631 6e28530 OleInitialize 43630->43631 43632 6e28594 43631->43632 43632->43629 43633 6e27c20 43635 6e27c28 43633->43635 43636 6e27c4b 43635->43636 43637 6e266ec 43635->43637 43638 6e27c60 KiUserCallbackDispatcher 43637->43638 43640 6e27cce 43638->43640 43640->43635 43774 31e0848 43776 31e0849 43774->43776 43775 31e091b 43776->43775 43778 31e134f 43776->43778 43780 31e1353 43778->43780 43779 31e147a 43779->43776 43780->43779 43786 31efb90 43780->43786 43790 31efb80 43780->43790 43794 31e8219 43780->43794 43799 6e2a050 43780->43799 43805 6e2a060 43780->43805 43787 31efba2 43786->43787 43789 31efc19 43787->43789 43811 31ef2bc 43787->43811 43789->43780 43791 31efb90 43790->43791 43792 31ef2bc 4 API calls 43791->43792 43793 31efc19 43791->43793 43792->43793 43793->43780 43795 31e8223 43794->43795 43796 31e82d9 43795->43796 43864 6e3f8d9 43795->43864 43870 6e3f8e8 43795->43870 43796->43780 43800 6e2a060 43799->43800 43801 6e2a0ad 43800->43801 43876 6e2a142 43800->43876 43880 6e2a0b0 43800->43880 43884 6e2a0c0 43800->43884 43801->43780 43806 6e2a068 43805->43806 43807 6e2a0ad 43806->43807 43808 6e2a142 SetWindowsHookExA 43806->43808 43809 6e2a0c0 SetWindowsHookExA 43806->43809 43810 6e2a0b0 SetWindowsHookExA 43806->43810 43807->43780 43808->43806 43809->43806 43810->43806 43812 31ef2c7 43811->43812 43816 6e20f73 43812->43816 43825 6e20f88 43812->43825 43813 31efdfa 43813->43789 43817 6e20f80 43816->43817 43834 6e21500 43817->43834 43838 6e214f1 43817->43838 43818 6e21036 43819 6e21062 43818->43819 43820 6e2039c GetModuleHandleW 43818->43820 43819->43819 43821 6e210a6 43820->43821 43824 6e22de1 CreateWindowExW CreateWindowExW 43821->43824 43824->43819 43826 6e20fb3 43825->43826 43832 6e21500 2 API calls 43826->43832 43833 6e214f1 2 API calls 43826->43833 43827 6e21036 43828 6e2039c GetModuleHandleW 43827->43828 43830 6e21062 43827->43830 43829 6e210a6 43828->43829 43852 6e22de1 43829->43852 43832->43827 43833->43827 43835 6e2152d 43834->43835 43836 6e215ae 43835->43836 43842 6e21ad7 43835->43842 43839 6e214f8 43838->43839 43840 6e215ae 43839->43840 43841 6e21ad7 2 API calls 43839->43841 43841->43840 43843 6e21ae2 43842->43843 43844 6e2039c GetModuleHandleW 43843->43844 43845 6e21c02 43844->43845 43846 6e2039c GetModuleHandleW 43845->43846 43851 6e21c7c 43845->43851 43849 6e21c50 43846->43849 43847 6e21df8 GetModuleHandleW 43848 6e21e25 43847->43848 43848->43836 43850 6e2039c GetModuleHandleW 43849->43850 43849->43851 43850->43851 43851->43836 43851->43847 43854 6e22de4 43852->43854 43853 6e22dc1 43853->43830 43854->43830 43854->43853 43855 6e22e52 CreateWindowExW 43854->43855 43858 6e22de1 CreateWindowExW 43854->43858 43860 6e22e58 43854->43860 43857 6e22f7c 43855->43857 43858->43854 43861 6e22ec0 CreateWindowExW 43860->43861 43863 6e22f7c 43861->43863 43866 6e3f8e8 43864->43866 43865 6e3fb12 43865->43796 43866->43865 43867 6e3fb31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43866->43867 43868 6e3fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43866->43868 43869 6e3fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43866->43869 43867->43866 43868->43866 43869->43866 43872 6e3f8fd 43870->43872 43871 6e3fb12 43871->43796 43872->43871 43873 6e3fb31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43872->43873 43874 6e3fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43872->43874 43875 6e3fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43872->43875 43873->43872 43874->43872 43875->43872 43877 6e2a0fd 43876->43877 43879 6e2a140 43877->43879 43888 6e29ae8 43877->43888 43879->43800 43882 6e2a0c0 43880->43882 43881 6e2a140 43881->43800 43882->43881 43883 6e29ae8 SetWindowsHookExA 43882->43883 43883->43882 43885 6e2a0dd 43884->43885 43886 6e29ae8 SetWindowsHookExA 43885->43886 43887 6e2a140 43885->43887 43886->43885 43887->43800 43889 6e2a2c8 SetWindowsHookExA 43888->43889 43891 6e2a352 43889->43891 43891->43877 43892 6e26a98 DuplicateHandle 43893 6e26b2e 43892->43893
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 7c8b427d08a326a05e433a3e1225936a9448b10c7596a8255aac142ea7211854
                                          • Instruction ID: 241b24ddcecc2d076a04d109631eb175e8a6b309a906bdf175d60e776e6a1b52
                                          • Opcode Fuzzy Hash: 7c8b427d08a326a05e433a3e1225936a9448b10c7596a8255aac142ea7211854
                                          • Instruction Fuzzy Hash: 3FD26734E003198FDB64DF68C588A9DB7B2FF89314F54D5A9D449AB264EB30ED85CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 46110d0d52a4649053cfab12ca1bfc2ce72b00964449a3cdac16073a6593c1a7
                                          • Instruction ID: 4c215b167915afb3d257281f9df4af27ba19474e36e9c8759a3a7127469c2b2d
                                          • Opcode Fuzzy Hash: 46110d0d52a4649053cfab12ca1bfc2ce72b00964449a3cdac16073a6593c1a7
                                          • Instruction Fuzzy Hash: C0529F30E103198FEF64CB68C5987AEB7B2FB95314F209926D40ADB395DA35DC81CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1785 6e37cf8-6e37d16 1786 6e37d18-6e37d1b 1785->1786 1787 6e37d3e-6e37d41 1786->1787 1788 6e37d1d-6e37d39 1786->1788 1789 6e37d43-6e37d4d 1787->1789 1790 6e37d4e-6e37d51 1787->1790 1788->1787 1792 6e37d53-6e37d61 1790->1792 1793 6e37d68-6e37d6b 1790->1793 1800 6e37d9e-6e37db4 1792->1800 1801 6e37d63 1792->1801 1794 6e37d6d-6e37d87 1793->1794 1795 6e37d8c-6e37d8e 1793->1795 1794->1795 1798 6e37d90 1795->1798 1799 6e37d95-6e37d98 1795->1799 1798->1799 1799->1786 1799->1800 1805 6e37dba-6e37dc3 1800->1805 1806 6e37fcf-6e37fd9 1800->1806 1801->1793 1807 6e37fda-6e3800f 1805->1807 1808 6e37dc9-6e37de6 1805->1808 1815 6e38011-6e38014 1807->1815 1813 6e37fbc-6e37fc9 1808->1813 1814 6e37dec-6e37e14 1808->1814 1813->1805 1813->1806 1814->1813 1836 6e37e1a-6e37e23 1814->1836 1816 6e380c1-6e380c4 1815->1816 1817 6e3801a-6e38026 1815->1817 1818 6e380e7-6e380ea 1816->1818 1819 6e380c6-6e380e2 1816->1819 1821 6e38031-6e38033 1817->1821 1822 6e380f0-6e380ff 1818->1822 1823 6e3831f-6e38321 1818->1823 1819->1818 1824 6e38035-6e3803b 1821->1824 1825 6e3804b-6e3804f 1821->1825 1839 6e38101-6e3811c 1822->1839 1840 6e3811e-6e38162 1822->1840 1827 6e38323 1823->1827 1828 6e38328-6e3832b 1823->1828 1830 6e3803f-6e38041 1824->1830 1831 6e3803d 1824->1831 1832 6e38051-6e3805b 1825->1832 1833 6e3805d 1825->1833 1827->1828 1828->1815 1834 6e38331-6e3833a 1828->1834 1830->1825 1831->1825 1837 6e38062-6e38064 1832->1837 1833->1837 1836->1807 1841 6e37e29-6e37e45 1836->1841 1842 6e38066-6e38069 1837->1842 1843 6e3807b-6e380b4 1837->1843 1839->1840 1849 6e382f3-6e38309 1840->1849 1850 6e38168-6e38179 1840->1850 1847 6e37e4b-6e37e75 1841->1847 1848 6e37faa-6e37fb6 1841->1848 1842->1834 1843->1822 1866 6e380b6-6e380c0 1843->1866 1867 6e37fa0-6e37fa5 1847->1867 1868 6e37e7b-6e37ea3 1847->1868 1848->1813 1848->1836 1849->1823 1857 6e3817f-6e3819c 1850->1857 1858 6e382de-6e382ed 1850->1858 1857->1858 1870 6e381a2-6e38298 call 6e36510 1857->1870 1858->1849 1858->1850 1867->1848 1868->1867 1876 6e37ea9-6e37ed7 1868->1876 1919 6e382a6 1870->1919 1920 6e3829a-6e382a4 1870->1920 1876->1867 1881 6e37edd-6e37ee6 1876->1881 1881->1867 1882 6e37eec-6e37f1e 1881->1882 1890 6e37f20-6e37f24 1882->1890 1891 6e37f29-6e37f45 1882->1891 1890->1867 1893 6e37f26 1890->1893 1891->1848 1894 6e37f47-6e37f9e call 6e36510 1891->1894 1893->1891 1894->1848 1921 6e382ab-6e382ad 1919->1921 1920->1921 1921->1858 1922 6e382af-6e382b4 1921->1922 1923 6e382c2 1922->1923 1924 6e382b6-6e382c0 1922->1924 1925 6e382c7-6e382c9 1923->1925 1924->1925 1925->1858 1926 6e382cb-6e382d7 1925->1926 1926->1858
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: b9cad66a9fa8dce51614bf85d77fd7eeb74a32536c22fd5b9086b9c61b600049
                                          • Instruction ID: 3bf6d48cea2d8c20f66d17cedd88a2a741f9463c622e3c69c4463f390565ea8e
                                          • Opcode Fuzzy Hash: b9cad66a9fa8dce51614bf85d77fd7eeb74a32536c22fd5b9086b9c61b600049
                                          • Instruction Fuzzy Hash: AD02BF34B002299FDF54DB68D5986AEB7E2FF84304F248569E405DB394EB35EC86CB81
                                          APIs
                                          • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,06E2A130,00000000,00000000), ref: 06E2A343
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: 14ee218dc8a7023a3dd7085b4bd93e45864c85d18072fa22652b92a02981268a
                                          • Instruction ID: 62c5bd3309eb4eeba08c95aae514b59fb2d518042db1be369baaff092d41b513
                                          • Opcode Fuzzy Hash: 14ee218dc8a7023a3dd7085b4bd93e45864c85d18072fa22652b92a02981268a
                                          • Instruction Fuzzy Hash: E82137B1D04219CFCB54DF99C844BEEBBF5BB88310F148429E458A7250C775A940CFA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92b339c4bfc27f1157d9a2ecdd2df45271d16abf1c26298ef209c90021bf264a
                                          • Instruction ID: f88097de5253b744abb02afb48d7b2e2ddf320387efaf5001d69c98a146cc26c
                                          • Opcode Fuzzy Hash: 92b339c4bfc27f1157d9a2ecdd2df45271d16abf1c26298ef209c90021bf264a
                                          • Instruction Fuzzy Hash: B3629F34A00324AFDB54DB78D598AADB7F2EF88318F249469E405DB394DB35EC46CB90
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 493a790ba99d5f81e973631f91f1084890a222e3cc70f0e819a1a463d4449593
                                          • Instruction ID: 2bda59b1913cd088cf11fb279f125caf6e1bb482a5bd4fb01da67e75cb522779
                                          • Opcode Fuzzy Hash: 493a790ba99d5f81e973631f91f1084890a222e3cc70f0e819a1a463d4449593
                                          • Instruction Fuzzy Hash: 4B32BE34B102199FDF54DB68D984BAEBBB6FB88714F209525E405EB390DB35EC42CB81
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0073ae0cb9ebd923dd4d478ac2a5bf9fb02f85c81b26e807b090fa328a737963
                                          • Instruction ID: 7b1811783c6441bb3ad4d907dc1f7de8ff1d02f64b255e490e1626c01218f72d
                                          • Opcode Fuzzy Hash: 0073ae0cb9ebd923dd4d478ac2a5bf9fb02f85c81b26e807b090fa328a737963
                                          • Instruction Fuzzy Hash: 7412E335F103249BDB64DF64C8887AEB7B2EB85318F208879D859DB385DA34EC45CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 6e3ac40-6e3ac5e 1 6e3ac60-6e3ac63 0->1 2 6e3ac73-6e3ac76 1->2 3 6e3ac65-6e3ac6e 1->3 4 6e3ac99-6e3ac9c 2->4 5 6e3ac78-6e3ac94 2->5 3->2 6 6e3acb6-6e3acb9 4->6 7 6e3ac9e-6e3acb1 4->7 5->4 9 6e3acbb-6e3acc8 6->9 10 6e3accd-6e3acd0 6->10 7->6 9->10 11 6e3acd2-6e3acd7 10->11 12 6e3acda-6e3acdd 10->12 11->12 15 6e3acf7-6e3acfa 12->15 16 6e3acdf-6e3ace8 12->16 20 6e3ad00-6e3ad03 15->20 21 6e3ae5d-6e3ae66 15->21 18 6e3ae77-6e3aeae 16->18 19 6e3acee-6e3acf2 16->19 31 6e3aeb0-6e3aeb3 18->31 19->15 23 6e3ad05-6e3ad09 20->23 24 6e3ad14-6e3ad16 20->24 21->16 22 6e3ae6c-6e3ae76 21->22 23->22 26 6e3ad0f 23->26 27 6e3ad18 24->27 28 6e3ad1d-6e3ad20 24->28 26->24 27->28 28->1 29 6e3ad26-6e3ad4a 28->29 40 6e3ad50-6e3ad5f 29->40 41 6e3ae5a 29->41 33 6e3aec0-6e3aec3 31->33 34 6e3aeb5-6e3aeb9 31->34 38 6e3aee6-6e3aee9 33->38 39 6e3aec5-6e3aee1 33->39 36 6e3aebb 34->36 37 6e3aeef-6e3af2a 34->37 36->33 48 6e3af30-6e3af3c 37->48 49 6e3b11d-6e3b130 37->49 38->37 42 6e3b152-6e3b155 38->42 39->38 55 6e3ad61-6e3ad67 40->55 56 6e3ad77-6e3adb2 call 6e36510 40->56 41->21 45 6e3b162-6e3b165 42->45 46 6e3b157-6e3b161 42->46 50 6e3b167 45->50 51 6e3b174-6e3b176 45->51 63 6e3af3e-6e3af57 48->63 64 6e3af5c-6e3afa0 48->64 57 6e3b132 49->57 124 6e3b167 call 6e3b1a4 50->124 125 6e3b167 call 6e3b1a8 50->125 53 6e3b178 51->53 54 6e3b17d-6e3b180 51->54 53->54 54->31 59 6e3b186-6e3b190 54->59 60 6e3ad6b-6e3ad6d 55->60 61 6e3ad69 55->61 75 6e3adb4-6e3adba 56->75 76 6e3adca-6e3ade1 56->76 57->42 58 6e3b16d-6e3b16f 58->51 60->56 61->56 63->57 80 6e3afa2-6e3afb4 64->80 81 6e3afbc-6e3affb 64->81 78 6e3adbe-6e3adc0 75->78 79 6e3adbc 75->79 86 6e3ade3-6e3ade9 76->86 87 6e3adf9-6e3ae0a 76->87 78->76 79->76 80->81 88 6e3b0e2-6e3b0f7 81->88 89 6e3b001-6e3b0dc call 6e36510 81->89 92 6e3adeb 86->92 93 6e3aded-6e3adef 86->93 97 6e3ae22-6e3ae53 87->97 98 6e3ae0c-6e3ae12 87->98 88->49 89->88 92->87 93->87 97->41 100 6e3ae16-6e3ae18 98->100 101 6e3ae14 98->101 100->97 101->97 124->58 125->58
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: e48434dda941324bf2aec7844431c4d101281882d838e75f0f2e2984fa499776
                                          • Instruction ID: 8d60ea384fd0fe58457a5acd46691e5f735f8ed3bc2c88242c35a9f3368f698e
                                          • Opcode Fuzzy Hash: e48434dda941324bf2aec7844431c4d101281882d838e75f0f2e2984fa499776
                                          • Instruction Fuzzy Hash: E5E18C30E103198FDB69DF69D5846AEB7B2FB88304F209529D4469B354DB35DC86CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 867 6e390c8-6e390ed 869 6e390ef-6e390f2 867->869 870 6e399b0-6e399b3 869->870 871 6e390f8-6e3910d 869->871 872 6e399b5-6e399d4 870->872 873 6e399d9-6e399db 870->873 879 6e39125-6e3913b 871->879 880 6e3910f-6e39115 871->880 872->873 875 6e399e2-6e399e5 873->875 876 6e399dd 873->876 875->869 877 6e399eb-6e399f5 875->877 876->875 885 6e39146-6e39148 879->885 881 6e39117 880->881 882 6e39119-6e3911b 880->882 881->879 882->879 886 6e39160-6e391d1 885->886 887 6e3914a-6e39150 885->887 898 6e391d3-6e391f6 886->898 899 6e391fd-6e39219 886->899 888 6e39152 887->888 889 6e39154-6e39156 887->889 888->886 889->886 898->899 904 6e39245-6e39260 899->904 905 6e3921b-6e3923e 899->905 910 6e39262-6e39284 904->910 911 6e3928b-6e392a6 904->911 905->904 910->911 916 6e392cb-6e392d9 911->916 917 6e392a8-6e392c4 911->917 918 6e392db-6e392e4 916->918 919 6e392e9-6e39363 916->919 917->916 918->877 925 6e393b0-6e393c5 919->925 926 6e39365-6e39383 919->926 925->870 930 6e39385-6e39394 926->930 931 6e3939f-6e393ae 926->931 930->931 931->925 931->926
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 809c1fe7404f6f37d2e488f363406a18e3d1fb8174f66b7d39b1943b2d41edf6
                                          • Instruction ID: 45c0c359c16042d1ee6bd12d994e0c12b628f0af7e8d269873a2673c82716807
                                          • Opcode Fuzzy Hash: 809c1fe7404f6f37d2e488f363406a18e3d1fb8174f66b7d39b1943b2d41edf6
                                          • Instruction Fuzzy Hash: 24914A34B0021A9FEB54DB65D9947AEB3F6BBC8204F108569C809EB385EB749C46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 934 6e3cec8-6e3cee3 935 6e3cee5-6e3cee8 934->935 936 6e3cef2-6e3cef5 935->936 937 6e3ceea-6e3ceef 935->937 938 6e3cef7-6e3cf39 936->938 939 6e3cf3e-6e3cf41 936->939 937->936 938->939 940 6e3cf43-6e3cf85 939->940 941 6e3cf8a-6e3cf8d 939->941 940->941 943 6e3cfd6-6e3cfd9 941->943 944 6e3cf8f-6e3cfd1 941->944 946 6e3cfdb-6e3cfdd 943->946 947 6e3cfe8-6e3cfeb 943->947 944->943 950 6e3cfe3 946->950 951 6e3d26f-6e3d278 946->951 952 6e3d034-6e3d037 947->952 953 6e3cfed-6e3d02f 947->953 950->947 957 6e3d287-6e3d293 951->957 958 6e3d27a-6e3d27f 951->958 955 6e3d080-6e3d083 952->955 956 6e3d039-6e3d07b 952->956 953->952 960 6e3d085-6e3d0c7 955->960 961 6e3d0cc-6e3d0cf 955->961 956->955 963 6e3d3a4-6e3d3a9 957->963 964 6e3d299-6e3d2ad 957->964 958->957 960->961 966 6e3d0d1-6e3d113 961->966 967 6e3d118-6e3d11b 961->967 981 6e3d3b1 963->981 980 6e3d2b3-6e3d2c5 964->980 964->981 966->967 975 6e3d121-6e3d124 967->975 976 6e3d3b4-6e3d3c0 967->976 985 6e3d147-6e3d14a 975->985 986 6e3d126-6e3d142 975->986 978 6e3d3c6-6e3d6b3 976->978 979 6e3d14c-6e3d15b 976->979 1147 6e3d8da-6e3d8e4 978->1147 1148 6e3d6b9-6e3d6bf 978->1148 990 6e3d16a-6e3d176 979->990 991 6e3d15d-6e3d162 979->991 1004 6e3d2c7-6e3d2cd 980->1004 1005 6e3d2e9-6e3d2eb 980->1005 981->976 985->979 989 6e3d193-6e3d196 985->989 986->985 1002 6e3d1a5-6e3d1a8 989->1002 1003 6e3d198-6e3d19a 989->1003 1000 6e3d8e5-6e3d91e 990->1000 1001 6e3d17c-6e3d18e 990->1001 991->990 1026 6e3d920-6e3d923 1000->1026 1001->989 1010 6e3d1f1-6e3d1f4 1002->1010 1011 6e3d1aa-6e3d1ec 1002->1011 1003->981 1009 6e3d1a0 1003->1009 1012 6e3d2d1-6e3d2dd 1004->1012 1013 6e3d2cf 1004->1013 1025 6e3d2f5-6e3d301 1005->1025 1009->1002 1015 6e3d211-6e3d214 1010->1015 1016 6e3d1f6-6e3d20c 1010->1016 1011->1010 1023 6e3d2df-6e3d2e7 1012->1023 1013->1023 1027 6e3d216-6e3d225 1015->1027 1028 6e3d25d-6e3d25f 1015->1028 1016->1015 1023->1025 1050 6e3d303-6e3d30d 1025->1050 1051 6e3d30f 1025->1051 1033 6e3d946-6e3d949 1026->1033 1034 6e3d925-6e3d941 1026->1034 1035 6e3d227-6e3d22c 1027->1035 1036 6e3d234-6e3d240 1027->1036 1039 6e3d261 1028->1039 1040 6e3d266-6e3d269 1028->1040 1045 6e3d94b-6e3d977 1033->1045 1046 6e3d97c-6e3d97f 1033->1046 1034->1033 1035->1036 1036->1000 1044 6e3d246-6e3d258 1036->1044 1039->1040 1040->935 1040->951 1044->1028 1045->1046 1054 6e3d981 1046->1054 1055 6e3d98e-6e3d990 1046->1055 1057 6e3d314-6e3d316 1050->1057 1051->1057 1194 6e3d981 call 6e3da50 1054->1194 1195 6e3d981 call 6e3da3d 1054->1195 1059 6e3d992 1055->1059 1060 6e3d997-6e3d99a 1055->1060 1057->981 1061 6e3d31c-6e3d338 call 6e36510 1057->1061 1059->1060 1060->1026 1065 6e3d99c-6e3d9ab 1060->1065 1078 6e3d347-6e3d353 1061->1078 1079 6e3d33a-6e3d33f 1061->1079 1064 6e3d987-6e3d989 1064->1055 1070 6e3da12-6e3da27 1065->1070 1071 6e3d9ad-6e3da10 call 6e36510 1065->1071 1082 6e3da28 1070->1082 1071->1070 1078->963 1083 6e3d355-6e3d3a2 1078->1083 1079->1078 1082->1082 1083->981 1149 6e3d6c1-6e3d6c6 1148->1149 1150 6e3d6ce-6e3d6d7 1148->1150 1149->1150 1150->1000 1151 6e3d6dd-6e3d6f0 1150->1151 1153 6e3d6f6-6e3d6fc 1151->1153 1154 6e3d8ca-6e3d8d4 1151->1154 1155 6e3d70b-6e3d714 1153->1155 1156 6e3d6fe-6e3d703 1153->1156 1154->1147 1154->1148 1155->1000 1157 6e3d71a-6e3d73b 1155->1157 1156->1155 1160 6e3d74a-6e3d753 1157->1160 1161 6e3d73d-6e3d742 1157->1161 1160->1000 1162 6e3d759-6e3d776 1160->1162 1161->1160 1162->1154 1165 6e3d77c-6e3d782 1162->1165 1165->1000 1166 6e3d788-6e3d7a1 1165->1166 1168 6e3d7a7-6e3d7ce 1166->1168 1169 6e3d8bd-6e3d8c4 1166->1169 1168->1000 1172 6e3d7d4-6e3d7de 1168->1172 1169->1154 1169->1165 1172->1000 1173 6e3d7e4-6e3d7fb 1172->1173 1175 6e3d80a-6e3d825 1173->1175 1176 6e3d7fd-6e3d808 1173->1176 1175->1169 1181 6e3d82b-6e3d844 call 6e36510 1175->1181 1176->1175 1185 6e3d853-6e3d85c 1181->1185 1186 6e3d846-6e3d84b 1181->1186 1185->1000 1187 6e3d862-6e3d8b6 1185->1187 1186->1185 1187->1169 1194->1064 1195->1064
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: 01e89f04d46daecf62da236066bc8b0472e674ba16872542cd4644965723a984
                                          • Instruction ID: cf4af45f9398d20f1ccba1c8674485285eabee8b815a2eeedd6b8071e8013597
                                          • Opcode Fuzzy Hash: 01e89f04d46daecf62da236066bc8b0472e674ba16872542cd4644965723a984
                                          • Instruction Fuzzy Hash: 1B625F34A0131A8FCB15DF69D994A9DB7B6FF84304F209A68D0099F395DB75EC4ACB80

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1196 6e34b18-6e34b3c 1198 6e34b3e-6e34b41 1196->1198 1199 6e35220-6e35223 1198->1199 1200 6e34b47-6e34c3f 1198->1200 1201 6e35225-6e3523f 1199->1201 1202 6e35244-6e35246 1199->1202 1220 6e34cc2-6e34cc9 1200->1220 1221 6e34c45-6e34c8d 1200->1221 1201->1202 1203 6e35248 1202->1203 1204 6e3524d-6e35250 1202->1204 1203->1204 1204->1198 1207 6e35256-6e35263 1204->1207 1222 6e34ccf-6e34d3f 1220->1222 1223 6e34d4d-6e34d56 1220->1223 1243 6e34c92 call 6e353c0 1221->1243 1244 6e34c92 call 6e353d0 1221->1244 1245 6e34c92 call 6e353cc 1221->1245 1240 6e34d41 1222->1240 1241 6e34d4a 1222->1241 1223->1207 1234 6e34c98-6e34cb4 1238 6e34cb6 1234->1238 1239 6e34cbf-6e34cc0 1234->1239 1238->1239 1239->1220 1240->1241 1241->1223 1243->1234 1244->1234 1245->1234
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: e3ba77dacc043ac5882e5e96319b1fa227e938ec0380cc1c41f956d7c188b599
                                          • Instruction ID: 79ddd73946b666dc50092805b29e768613805918f0cf870dcf64e529ccd248f6
                                          • Opcode Fuzzy Hash: e3ba77dacc043ac5882e5e96319b1fa227e938ec0380cc1c41f956d7c188b599
                                          • Instruction Fuzzy Hash: 38617C34F003189FEB55DFA5C8587AEBAF6EB88300F208429D149AB395DF758C45CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2028 6e390b9-6e390c6 2030 6e390c8-6e390cc 2028->2030 2031 6e390cd-6e390ed 2028->2031 2030->2031 2032 6e390ef-6e390f2 2031->2032 2033 6e399b0-6e399b3 2032->2033 2034 6e390f8-6e3910d 2032->2034 2035 6e399b5-6e399d4 2033->2035 2036 6e399d9-6e399db 2033->2036 2042 6e39125-6e3913b 2034->2042 2043 6e3910f-6e39115 2034->2043 2035->2036 2038 6e399e2-6e399e5 2036->2038 2039 6e399dd 2036->2039 2038->2032 2040 6e399eb-6e399f5 2038->2040 2039->2038 2048 6e39146-6e39148 2042->2048 2044 6e39117 2043->2044 2045 6e39119-6e3911b 2043->2045 2044->2042 2045->2042 2049 6e39160-6e391d1 2048->2049 2050 6e3914a-6e39150 2048->2050 2061 6e391d3-6e391f6 2049->2061 2062 6e391fd-6e39219 2049->2062 2051 6e39152 2050->2051 2052 6e39154-6e39156 2050->2052 2051->2049 2052->2049 2061->2062 2067 6e39245-6e39260 2062->2067 2068 6e3921b-6e3923e 2062->2068 2073 6e39262-6e39284 2067->2073 2074 6e3928b-6e392a6 2067->2074 2068->2067 2073->2074 2079 6e392cb-6e392d9 2074->2079 2080 6e392a8-6e392c4 2074->2080 2081 6e392db-6e392e4 2079->2081 2082 6e392e9-6e39363 2079->2082 2080->2079 2081->2040 2088 6e393b0-6e393c5 2082->2088 2089 6e39365-6e39383 2082->2089 2088->2033 2093 6e39385-6e39394 2089->2093 2094 6e3939f-6e393ae 2089->2094 2093->2094 2094->2088 2094->2089
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: cbb82a634ca4e41cd4df0ca1b7667ffb410449181388cdbc2edcc1a37e9d82a8
                                          • Instruction ID: 457c2d72b3ad80f78101f09d833644078b989784c3651d58b3121ab7f5027558
                                          • Opcode Fuzzy Hash: cbb82a634ca4e41cd4df0ca1b7667ffb410449181388cdbc2edcc1a37e9d82a8
                                          • Instruction Fuzzy Hash: B9515C34B002159FEB54DB75D994BAEB3FAFBC8644F108569C809EB384EB749C42CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2134 6e22de1-6e22de2 2135 6e22de4-6e22de8 2134->2135 2136 6e22dea 2134->2136 2135->2136 2137 6e22df2-6e22dfa 2136->2137 2138 6e22dec 2136->2138 2141 6e22e02 2137->2141 2142 6e22dfc-6e22dfe 2137->2142 2139 6e22dc1-6e22dd5 2138->2139 2140 6e22dee-6e22df0 2138->2140 2140->2137 2143 6e22e04-6e22e06 2141->2143 2144 6e22e0a-6e22e0b 2141->2144 2142->2141 2145 6e22e08-6e22e09 2143->2145 2146 6e22e0d-6e22e1a 2143->2146 2144->2146 2145->2144 2148 6e22e1c-6e22e21 2146->2148 2149 6e22e23-6e22e25 2148->2149 2150 6e22e27-6e22e29 2148->2150 2149->2150 2151 6e22e2b-6e22e2d 2150->2151 2152 6e22e2f-6e22e31 2150->2152 2151->2152 2153 6e22e33-6e22e35 2152->2153 2154 6e22e37-6e22e39 call 6e216e4 2152->2154 2153->2154 2174 6e22e3a call 6e22de1 2154->2174 2175 6e22e3a call 6e22e58 2154->2175 2157 6e22e3d-6e22e50 2157->2148 2158 6e22e52-6e22ebe 2157->2158 2161 6e22ec0-6e22ec6 2158->2161 2162 6e22ec9-6e22ed0 2158->2162 2161->2162 2163 6e22ed2-6e22ed8 2162->2163 2164 6e22edb-6e22f7a CreateWindowExW 2162->2164 2163->2164 2166 6e22f83-6e22fbb 2164->2166 2167 6e22f7c-6e22f82 2164->2167 2171 6e22fc8 2166->2171 2172 6e22fbd-6e22fc0 2166->2172 2167->2166 2173 6e22fc9 2171->2173 2172->2171 2173->2173 2174->2157 2175->2157
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7ee9d415baec934c66e7ad77fc4767eed75aff7553a1e8033824eb32984a7c1
                                          • Instruction ID: 36b7eb12f0de475aa1ad1f516b639054193adae0b50e354e3070087faa180f11
                                          • Opcode Fuzzy Hash: a7ee9d415baec934c66e7ad77fc4767eed75aff7553a1e8033824eb32984a7c1
                                          • Instruction Fuzzy Hash: C5716770C0035AEFDF12CFA8D8809DEBFB2AF89304F14916AE518AB220D7319945DF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2176 31eed40-31eed4b 2177 31eed4d-31eed74 2176->2177 2178 31eed75-31eed8b 2176->2178 2198 31eed8d call 31eee10 2178->2198 2199 31eed8d call 31eed30 2178->2199 2200 31eed8d call 31eed40 2178->2200 2201 31eed8d call 31eedd0 2178->2201 2181 31eed92-31eed94 2182 31eed9a-31eedf9 2181->2182 2183 31eed96-31eed99 2181->2183 2190 31eedff-31eee8c GlobalMemoryStatusEx 2182->2190 2191 31eedfb-31eedfe 2182->2191 2194 31eee8e-31eee94 2190->2194 2195 31eee95-31eeebd 2190->2195 2194->2195 2198->2181 2199->2181 2200->2181 2201->2181
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4105732081.00000000031E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_31e0000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efd9f57a97362a324a9019559e3be85e885f272962503c43f05c24b178134142
                                          • Instruction ID: 5c11ddeaa41f6b894d98caf90678bba91b8c3eb1e8a400bd5e4c9f3ebf12a10a
                                          • Opcode Fuzzy Hash: efd9f57a97362a324a9019559e3be85e885f272962503c43f05c24b178134142
                                          • Instruction Fuzzy Hash: 30411272D047998FC714DFB9D80429EBFF5EF89210F1885AAD444A7241DB349845CBE1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2202 6e22e58-6e22ebe 2203 6e22ec0-6e22ec6 2202->2203 2204 6e22ec9-6e22ed0 2202->2204 2203->2204 2205 6e22ed2-6e22ed8 2204->2205 2206 6e22edb-6e22f7a CreateWindowExW 2204->2206 2205->2206 2208 6e22f83-6e22fbb 2206->2208 2209 6e22f7c-6e22f82 2206->2209 2213 6e22fc8 2208->2213 2214 6e22fbd-6e22fc0 2208->2214 2209->2208 2215 6e22fc9 2213->2215 2214->2213 2215->2215
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06E22F6A
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 1f680421af63e2390323e055d796e922339a4d8d6c172a374ef830aefd45a777
                                          • Instruction ID: fd5c509db3278dbc5b85cfcdd56b26dd71bcc90564b994ca8cd60b46bd321d65
                                          • Opcode Fuzzy Hash: 1f680421af63e2390323e055d796e922339a4d8d6c172a374ef830aefd45a777
                                          • Instruction Fuzzy Hash: 8D41C0B1D00319DFDB14CFA9C884ADEFBB6BF48314F24852AE419AB210D7719985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2216 6e26694-6e27964 2219 6e27a14-6e27a34 call 6e2170c 2216->2219 2220 6e2796a-6e2796f 2216->2220 2227 6e27a37-6e27a44 2219->2227 2222 6e279c2-6e279fa CallWindowProcW 2220->2222 2223 6e27971-6e279a8 2220->2223 2225 6e27a03-6e27a12 2222->2225 2226 6e279fc-6e27a02 2222->2226 2229 6e279b1-6e279c0 2223->2229 2230 6e279aa-6e279b0 2223->2230 2225->2227 2226->2225 2229->2227 2230->2229
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 06E279E9
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: a074850e20a1da67c9e5eabacf6020f4c235a662b08e105ebf485f66f7646bf8
                                          • Instruction ID: 16e52ff596c0ff722644542f00a5dec5d566f05783305fd9ad2d3b3ec5787234
                                          • Opcode Fuzzy Hash: a074850e20a1da67c9e5eabacf6020f4c235a662b08e105ebf485f66f7646bf8
                                          • Instruction Fuzzy Hash: A44149B490031ACFDB54CF59C488AAABBF6FF88314F24C459D519AB320D774A941CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2246 6e2866c-6e286c8 2247 6e286d2-6e28710 OleGetClipboard 2246->2247 2248 6e28712-6e28718 2247->2248 2249 6e28719-6e28767 2247->2249 2248->2249 2254 6e28777 2249->2254 2255 6e28769-6e2876d 2249->2255 2257 6e28778 2254->2257 2255->2254 2256 6e2876f 2255->2256 2256->2254 2257->2257
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: Clipboard
                                          • String ID:
                                          • API String ID: 220874293-0
                                          • Opcode ID: 76b1ec2f248017135c4d9328301d4aa6f552b957552602723bcd85ed3be58c7d
                                          • Instruction ID: 2e5bb9ad2b9c78d556c79e5c5ac21b6dba57cd0944e6173034f7f86bfb7cf8b9
                                          • Opcode Fuzzy Hash: 76b1ec2f248017135c4d9328301d4aa6f552b957552602723bcd85ed3be58c7d
                                          • Instruction Fuzzy Hash: EE3122B4E01359DFDB10CFA9C984BCEBBF6AF48304F248059E408AB294DBB55949CF95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2233 6e280a8-6e28710 OleGetClipboard 2236 6e28712-6e28718 2233->2236 2237 6e28719-6e28767 2233->2237 2236->2237 2242 6e28777 2237->2242 2243 6e28769-6e2876d 2237->2243 2245 6e28778 2242->2245 2243->2242 2244 6e2876f 2243->2244 2244->2242 2245->2245
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: Clipboard
                                          • String ID:
                                          • API String ID: 220874293-0
                                          • Opcode ID: 17175836f355899fde8bea701716693d935ce2118703c1cfe3ec4bd4cdb14c17
                                          • Instruction ID: 2a6ad28a90da482fe33da36a0975b7786c0f69dabd7a038ccbf3ccb8b5604cbb
                                          • Opcode Fuzzy Hash: 17175836f355899fde8bea701716693d935ce2118703c1cfe3ec4bd4cdb14c17
                                          • Instruction Fuzzy Hash: E43101B0E01319DFDB50CFA9C984BDEBBF5AB48304F248059E404AB290D7B5A949CF95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2258 6e21d45-6e21d47 2259 6e21db4-6e21df0 2258->2259 2260 6e21d49-6e21d7f 2258->2260 2261 6e21df2-6e21df5 2259->2261 2262 6e21df8-6e21e23 GetModuleHandleW 2259->2262 2260->2259 2261->2262 2264 6e21e25-6e21e2b 2262->2264 2265 6e21e2c-6e21e40 2262->2265 2264->2265
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06E21E16
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 25aec2ee7e1e2629cbc646b988690d42238bbd2d86c7752d42e9395f30c63057
                                          • Instruction ID: 9fff35e04f5e877ea203cca688ca43463fb6d0e7f8f47a80e45bf31ad241f1c9
                                          • Opcode Fuzzy Hash: 25aec2ee7e1e2629cbc646b988690d42238bbd2d86c7752d42e9395f30c63057
                                          • Instruction Fuzzy Hash: 972178B5D00359CFCB14CFAAC8446DEBFF2EF89214F10846AC459AB250C774A945CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06E26B1F
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 9c683e74864d85d61d01991b5ddab5f2f0c7c0101110eac98e665f04ce7533da
                                          • Instruction ID: 713832c5fdc6ede3c8f6ff7a9271d11b01dc93a74b7614b270c8825e9e06dea5
                                          • Opcode Fuzzy Hash: 9c683e74864d85d61d01991b5ddab5f2f0c7c0101110eac98e665f04ce7533da
                                          • Instruction Fuzzy Hash: 982116B5900359DFDB10CFA9D884ADEBFF9EB48310F14801AE954A3310D774A940CFA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06E26B1F
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: bd25fab074c5b7defb3b68e2c468c4f98ee3b7df81833d04fd813a1807429d8e
                                          • Instruction ID: 05bb3dff21a7dd34d0cb1bd4ba112b418fbca06b3dd0087f38668c7e70e0229b
                                          • Opcode Fuzzy Hash: bd25fab074c5b7defb3b68e2c468c4f98ee3b7df81833d04fd813a1807429d8e
                                          • Instruction Fuzzy Hash: BC21E2B5900219DFDB10CFAAD984ADEBFF9EB48320F14841AE918A7310D374A940CFA5
                                          APIs
                                          • SetWindowsHookExA.USER32(0000000D,00000000,?,?,?,?,?,?,?,?,?,06E2A130,00000000,00000000), ref: 06E2A343
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: a41e69175dd19b079d41e94b88b234788f3cfc6a6fdcca3f7ef2576f0b5ecfbb
                                          • Instruction ID: 75b9fe33fa85fc1b6ab25bdd25137ba38bd3354e71b7b5423793f007416c19fc
                                          • Opcode Fuzzy Hash: a41e69175dd19b079d41e94b88b234788f3cfc6a6fdcca3f7ef2576f0b5ecfbb
                                          • Instruction Fuzzy Hash: F92138B1D04219DFCB14CF99C844BDEFBF5BB88320F148429E419A7250CB75A944CFA1
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,5505E7BA), ref: 031EEE7F
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4105732081.00000000031E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_31e0000_adobe.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 8051e5be6918d4b7d74ea6e2615301dba1de996e6191a00b4890e1f3155a03fd
                                          • Instruction ID: 165ff0977cc1779c0f9c1c15d554273a2aff27cdb97f1092d7706ccd2e3f3687
                                          • Opcode Fuzzy Hash: 8051e5be6918d4b7d74ea6e2615301dba1de996e6191a00b4890e1f3155a03fd
                                          • Instruction Fuzzy Hash: 9B1100B1C006699BCB10DFAAC544BDEFBF4EF48320F14816AD858A7241D379A954CFA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06E21E16
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 3f57b5314922f937e86a8ad4749ac9b194bfaae05813c36d671aa4220b3a9762
                                          • Instruction ID: 9b8be4dfa38edddf76653a6ca9461849bb68189bffabd766e4a9ae37d10503b0
                                          • Opcode Fuzzy Hash: 3f57b5314922f937e86a8ad4749ac9b194bfaae05813c36d671aa4220b3a9762
                                          • Instruction Fuzzy Hash: E411EFB5C00359CFCB10DF9AC844ADEBBF5EB48214F10842AD969A7610D375A645CFA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 06E21E16
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 2b4ec54bb11ce02fe65d0643b8156ae45a4477e8e9f7f87aacb13cd43890f7b8
                                          • Instruction ID: 048a3bac7122138ff96a23add89e9fb1b418dde96bfb189fae4731c3491e520d
                                          • Opcode Fuzzy Hash: 2b4ec54bb11ce02fe65d0643b8156ae45a4477e8e9f7f87aacb13cd43890f7b8
                                          • Instruction Fuzzy Hash: 8B1102B5C00359CFCB10CF9AC844ADEFBF5AF48214F10842AD569B7610C375A645CFA1
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06E27C35), ref: 06E27CBF
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: 26adee4d567ca0d7e9e649e66391e200b6d5f3455e613a36d57ade9eb577df7a
                                          • Instruction ID: c9e825f3e86d93a0bc5a0cfe5671342da4c5f6e210b24dd4aef236e5eb07a5e1
                                          • Opcode Fuzzy Hash: 26adee4d567ca0d7e9e649e66391e200b6d5f3455e613a36d57ade9eb577df7a
                                          • Instruction Fuzzy Hash: 4A1133B1804359CFCB10DFAAD885BDEBBF8EB48324F208419D559A7300C374A940CFA5
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06E28585
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 5e4d4a449632516ef421ddddc654b001d4a99bbf57d52f55c2b35b18405b5054
                                          • Instruction ID: 2de61f2d1b8e1aa2892e6437c8d3f36cc0b3a93c338ba511e01049a0fe817064
                                          • Opcode Fuzzy Hash: 5e4d4a449632516ef421ddddc654b001d4a99bbf57d52f55c2b35b18405b5054
                                          • Instruction Fuzzy Hash: A51142B4800358CFCB20CFA9D444BDEBFF5AB88324F24841AE119A7210C375A984CFA1
                                          APIs
                                          • OleInitialize.OLE32(00000000), ref: 06E28585
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: 3aa5923cf13539c94361cd5e174156c38878cebad8061982a3ebef2552913851
                                          • Instruction ID: 99c57ce496c0b65d4f71764f112f8d3ed9edd460c41e26ea0a76cc98d9b5b4fe
                                          • Opcode Fuzzy Hash: 3aa5923cf13539c94361cd5e174156c38878cebad8061982a3ebef2552913851
                                          • Instruction Fuzzy Hash: C31145B0800359CFCB20DF9AD448BDEBBF4EB48324F108459D519A7210D378A944CFA5
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06E27C35), ref: 06E27CBF
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117650673.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e20000_adobe.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: 923ad65da0e8803f40d1ea59a3000940720867a9d069d13288fcc9c5319e88aa
                                          • Instruction ID: 31ee9583c1e006ea505a995b20de3cc3d585d4a470801386731c911c7e26d822
                                          • Opcode Fuzzy Hash: 923ad65da0e8803f40d1ea59a3000940720867a9d069d13288fcc9c5319e88aa
                                          • Instruction Fuzzy Hash: 511130B1800259CFCB20CFAAD845BDEBFF8AB48324F20841AD558B7300D774A940CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: 21f7fed0a52b959ea1166be09fa4cbf07a25c255323d314be2732d67e36c782a
                                          • Instruction ID: a4a4728f1ba276e9bab6431a3c92eea415eb62a16b7808f013a273b5bb275a8d
                                          • Opcode Fuzzy Hash: 21f7fed0a52b959ea1166be09fa4cbf07a25c255323d314be2732d67e36c782a
                                          • Instruction Fuzzy Hash: 86418C34F102189FEB55DFA5C854BAEBBF6EF88700F208529E145AB3D5DB748C058B91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 7abd041a567c06ff16fe9d4b5120d9240efd0f3af6ccf126c05f19d0e8ce53c3
                                          • Instruction ID: 28a1a1f96e80e6b69f5533ab879f7f0fd2d40549a09e2f8e82279566a626e664
                                          • Opcode Fuzzy Hash: 7abd041a567c06ff16fe9d4b5120d9240efd0f3af6ccf126c05f19d0e8ce53c3
                                          • Instruction Fuzzy Hash: 3141CF70E103199FDB61DFA5C9986AEBBB2FF85304F204529D406EB244EB75D946CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 40564b30b17efce2b779982bca5add07acf350d851c815ea6e3f8d651881ffb7
                                          • Instruction ID: 7717696a72be9e0d0b376879b824a45f33957987f24b4cd1fc06bead2edd1a13
                                          • Opcode Fuzzy Hash: 40564b30b17efce2b779982bca5add07acf350d851c815ea6e3f8d651881ffb7
                                          • Instruction Fuzzy Hash: E841C370E103699FDB61DF65C98869EBBB2FF85304F204529D405EB244EB75E846CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: 4d79bd0cb53be47bc9ec45b247cd1d68c4bcf4e220b700f4bf65e803ccb2d7c7
                                          • Instruction ID: 61143d3fedc3b5f8289d8c3841a6d61fce854542468f8e8d6ae3bc1819285d9d
                                          • Opcode Fuzzy Hash: 4d79bd0cb53be47bc9ec45b247cd1d68c4bcf4e220b700f4bf65e803ccb2d7c7
                                          • Instruction Fuzzy Hash: 34313330B00315CFEB15AB70CA586AE7BE2AF89204F249578C146DB381DF39DD02CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: ecf18389f7c6c85bc4f8d480155ff257b48b011f3001a82647067eeba00fec5f
                                          • Instruction ID: 4c7abe95b1d0b795e365230d1ec6abeb4acaf56a02f6b801229cc9b3a110b2c0
                                          • Opcode Fuzzy Hash: ecf18389f7c6c85bc4f8d480155ff257b48b011f3001a82647067eeba00fec5f
                                          • Instruction Fuzzy Hash: 7C310430B003158FEB55AB74CA586AE7BE3ABC8204F209528D546DB384DF39DD45CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 9905842aa361adfe12c9009c447b68a56f4a456381d1fa5ccbef2864554d3a60
                                          • Instruction ID: 51a6a3c4b3474a0b16e3db0aa4146415a8a38abf7cb9d1a73598e6a7dad05526
                                          • Opcode Fuzzy Hash: 9905842aa361adfe12c9009c447b68a56f4a456381d1fa5ccbef2864554d3a60
                                          • Instruction Fuzzy Hash: 01115C70F102249FDB509B788805B6E7BF5AF4C714F108469E94AE7390EB759900CB85
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: |
                                          • API String ID: 0-2343686810
                                          • Opcode ID: 06dcf305d60c6466a33c353d44a157a68c27593efb1f119e2094a01bf52d77b9
                                          • Instruction ID: 163b02ad84017d1955ce4556a56730cf8c8d9e19f798caa9bf76d88ed4b09207
                                          • Opcode Fuzzy Hash: 06dcf305d60c6466a33c353d44a157a68c27593efb1f119e2094a01bf52d77b9
                                          • Instruction Fuzzy Hash: 5F114C74F102249FDB54DB798804B6E7BF5AF4C714F104469E94ADB3A0DB759900CB85
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1b031354b3b5da9d5f548d2634659dc72262d2055ccab6195ff698fcb1f0ea56
                                          • Instruction ID: 3ed5420dc60493f5c5f8d4663f8351c8288b701b8d443f51d6d5aae4d7655e63
                                          • Opcode Fuzzy Hash: 1b031354b3b5da9d5f548d2634659dc72262d2055ccab6195ff698fcb1f0ea56
                                          • Instruction Fuzzy Hash: D8A1B834F003199FEF64CBA8C5987AEB7B6EB99314F205925E406EB391CA35DC81C751
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fb42d48d238926630c1a111f2dbdf3704b792043f1eac3ea3c86f273477f5be4
                                          • Instruction ID: 15666e48036dec52d33759060cb3dc6c67f227e85a7b91c03cb16ce4d04a87af
                                          • Opcode Fuzzy Hash: fb42d48d238926630c1a111f2dbdf3704b792043f1eac3ea3c86f273477f5be4
                                          • Instruction Fuzzy Hash: 5861D171F001214FDF549A7EC88866FAADBAFC4224B15443AD80EDB361DEA6DD0287D2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4f07d3ca07eaeae4e46f46180a8eb71a443394fa12f08cb664cf8f55a27a4ee
                                          • Instruction ID: fc0eeb638f46f6cd6142ed17d02ae437f7fd6f9c83026750b588d59a425e94f9
                                          • Opcode Fuzzy Hash: d4f07d3ca07eaeae4e46f46180a8eb71a443394fa12f08cb664cf8f55a27a4ee
                                          • Instruction Fuzzy Hash: F0815C35F002199FDB54DFA9C5586AEB7F2AF89304F209529D40AEB384EB34EC42CB51
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 17b59e024408a0bfe6d85dae99d152e88aa4204582705fbce3e0b88d3bcfad8a
                                          • Instruction ID: 4ea4ed99140b17f9fb29a03d4c0606707579b35cc6d39c25ec72a3bec4a34c0a
                                          • Opcode Fuzzy Hash: 17b59e024408a0bfe6d85dae99d152e88aa4204582705fbce3e0b88d3bcfad8a
                                          • Instruction Fuzzy Hash: 33814C34F102199FDF54DFA9D5546AEB7F6AB89304F209429D40AEB384EB34EC42CB51
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f62ae401a1894bb9ebfbfb1820b5e7f3eb44654bec3dc22baf95aa1e20ad23e
                                          • Instruction ID: 31dd6cb1b00ebb9bb6991022d221d6dabfc4d849411d2bab85eebf2b7ed4d4e6
                                          • Opcode Fuzzy Hash: 3f62ae401a1894bb9ebfbfb1820b5e7f3eb44654bec3dc22baf95aa1e20ad23e
                                          • Instruction Fuzzy Hash: E5916E34E102198BDF50DF68C880B9DB7B1FF89304F208699D549AB295EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 11d4af58f4ed06bec17fb4b6490928038c077da7a760ba249496d2301166fb58
                                          • Instruction ID: 100c4316fb5ac6e1e3bc57e3a7287e7a19dac76c832336f8d7701c74a8cda44e
                                          • Opcode Fuzzy Hash: 11d4af58f4ed06bec17fb4b6490928038c077da7a760ba249496d2301166fb58
                                          • Instruction Fuzzy Hash: F6915D34E102198BDF60DF68C880B9DB7B1FF89304F208599D549AB395EB71AA85CF91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3afcad58dbdd43e7756cd42f6d59d0283611f2f65ef45fb0b74ac16d6574285e
                                          • Instruction ID: 9b96f15423ddadbe262aa5de6f782ccd33dcbfd17571a87e1db64397ce51c23a
                                          • Opcode Fuzzy Hash: 3afcad58dbdd43e7756cd42f6d59d0283611f2f65ef45fb0b74ac16d6574285e
                                          • Instruction Fuzzy Hash: F8914E34E10619CBDF60DF68C880B9DB7B1FF89304F208599D549AB395EB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be5b86531c1bdde87e13a34392e0d57ab35ab2e2ea3da7d709498b7f2b7ad0bd
                                          • Instruction ID: 05e54d92e3fc7bd4fb596a7b083cdb1062b3aa0577b4145e89f0ce1ddbe9e88b
                                          • Opcode Fuzzy Hash: be5b86531c1bdde87e13a34392e0d57ab35ab2e2ea3da7d709498b7f2b7ad0bd
                                          • Instruction Fuzzy Hash: 26715974E012189FDB54DBA9D984AAEBBF6FF88304F24942AD005EB355DB30EC46CB40
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad86499df24a53160200fadba3e9e9e2df6ba4fd28ad4fc3841d460a8b27db54
                                          • Instruction ID: ed6275451ac37ee3dde84626d584d86bf3e6aea864b7d405eed4473c8f93e18d
                                          • Opcode Fuzzy Hash: ad86499df24a53160200fadba3e9e9e2df6ba4fd28ad4fc3841d460a8b27db54
                                          • Instruction Fuzzy Hash: 33714A74E012199FDB54DBA9D984AAEBBF6FF88304F24946AD005EB355DB30EC46CB40
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f05f4a12f7d2101b1b77b6b3f9ec2c821ec053995746640a1cbd5535d81200cf
                                          • Instruction ID: 506ae31e8b894674866c7326d566f59cc6d98e9ca4f9ba5fd62c651b36e7194e
                                          • Opcode Fuzzy Hash: f05f4a12f7d2101b1b77b6b3f9ec2c821ec053995746640a1cbd5535d81200cf
                                          • Instruction Fuzzy Hash: 3B51E171E01219DFDF24EB78E49C6ADB7B2EF84319F20887AD00ADB250DB358845CB81
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dac99ae9f90dcce6adbc4466f958c1e1f9329a4f1667913be5680a6d43065e53
                                          • Instruction ID: 9ce099e5822f4499367e10015ada71516c581b921201205a74b208528cbc9771
                                          • Opcode Fuzzy Hash: dac99ae9f90dcce6adbc4466f958c1e1f9329a4f1667913be5680a6d43065e53
                                          • Instruction Fuzzy Hash: EA51B470F10324EFEF745AADD95877F2A5EDB89314F20582AE00ADB3D5C929CC4583A2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e533140b6db97046851a6b2552f5f1b0e36c9001b7362549880b97993776f751
                                          • Instruction ID: 72a74d078830ea7b335d615eded2ac435b96383c83fc5e659ab82a2c7c9e9be3
                                          • Opcode Fuzzy Hash: e533140b6db97046851a6b2552f5f1b0e36c9001b7362549880b97993776f751
                                          • Instruction Fuzzy Hash: E6518070F103249FEF649AADD95877F265EDB89314F20582AE00ADB3D5C929CC8583A2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35dccd8a548ec8cf1805125391397fe60011019e5c1a2334e3a7cae3e8a70d9a
                                          • Instruction ID: 358302a873dba26ab5c803fdba780ad1fcec11b622c0ecb9aca644c8c01e03af
                                          • Opcode Fuzzy Hash: 35dccd8a548ec8cf1805125391397fe60011019e5c1a2334e3a7cae3e8a70d9a
                                          • Instruction Fuzzy Hash: 71415971E007199BDF74CEA9D884AAFFBF2EB84214F20592AD156D7640D330E856CB90
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 109892b6befda5204873ae016ff47b9fe57fd611e83b6de9584ad9402af33aa4
                                          • Instruction ID: f4030b54906de599e20594e956268558d7dc712b3f2016aefb5d7f091a09d388
                                          • Opcode Fuzzy Hash: 109892b6befda5204873ae016ff47b9fe57fd611e83b6de9584ad9402af33aa4
                                          • Instruction Fuzzy Hash: 4C31C030E103199FCB58CFA5D9986AEBBB2FF89304F109519E955EB340DB71A94ACB40
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 79e0e6e1e4278fc82f05d49596b03a8058ed0601a89becd7334c0e2e2c234ff5
                                          • Instruction ID: 51a27659b1219141138dfd35d7508f1fc8a3b572422ab9a8c42fc04ea62b4ad2
                                          • Opcode Fuzzy Hash: 79e0e6e1e4278fc82f05d49596b03a8058ed0601a89becd7334c0e2e2c234ff5
                                          • Instruction Fuzzy Hash: 5F31E370E103199FDF25CFA5C99469EBBB2FF84304F108929E405AB340EBB0E946CB80
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: af59757ae316cc20995a4d4523dfb84a5cc1a418c133fc16c435703567813b86
                                          • Instruction ID: 6105f175639f4dd06191f0034fbb073e8bb657c0d47360f59315a62233948bf2
                                          • Opcode Fuzzy Hash: af59757ae316cc20995a4d4523dfb84a5cc1a418c133fc16c435703567813b86
                                          • Instruction Fuzzy Hash: 68318F30E102199FCB59CF65D99869EBBB2FF89304F109929E945EB340DB31ED46CB50
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7c2a3b11a64a8cc27c99c8d205e082229e2ea4c391f3fdfd65d43ecc10853ac0
                                          • Instruction ID: 9332f289a08039d24568115e0307817a6691912465f805fdd523da9b390f997b
                                          • Opcode Fuzzy Hash: 7c2a3b11a64a8cc27c99c8d205e082229e2ea4c391f3fdfd65d43ecc10853ac0
                                          • Instruction Fuzzy Hash: DC217C75E003259FDB10CFA9E840AAEBBB5FB48714F108125E919E7380E735DC01CB91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3eedf8bbdc86f2bf3094d366c70b67b60b2d99fef6fad9ed7fd1b378576787c0
                                          • Instruction ID: 38ea86876a2ff44fd7712ad17bc52d3743c03c0de03e7ef85daf3ec6e83f3137
                                          • Opcode Fuzzy Hash: 3eedf8bbdc86f2bf3094d366c70b67b60b2d99fef6fad9ed7fd1b378576787c0
                                          • Instruction Fuzzy Hash: B8215A75E003259FEB50CF69E880AAEB7F5FB48714F209429E915E7240E735DD01CB91
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4105343307.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_301d000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 581b07ae93a208f0a92c311bcdc71c96da29f0b747f01573f20f6c8bc6ea1023
                                          • Instruction ID: 378d5e9e3d7d42df2332324174751c1b7f7b1ca8bbb6887df2862c6ce91c1265
                                          • Opcode Fuzzy Hash: 581b07ae93a208f0a92c311bcdc71c96da29f0b747f01573f20f6c8bc6ea1023
                                          • Instruction Fuzzy Hash: BE212975504204DFCB15DF54D9C0B3AFBA5FB84314F24CAADD9094B256C336D457CA62
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4105343307.000000000301D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0301D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_301d000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 820d04a9d89753488621694e02129e72190818857c01dd2256ff685f5fa9d179
                                          • Instruction ID: 013ce42b57843bcdf4b7c3005c96ca4fb574d9309b0dd0121721cc241f230042
                                          • Opcode Fuzzy Hash: 820d04a9d89753488621694e02129e72190818857c01dd2256ff685f5fa9d179
                                          • Instruction Fuzzy Hash: 5D216D751093C09FCB03CF64D990711BFB5EB46214F29C5DBD8898F2A7C23A985ACB62
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1282c07078b5f89c335b2e3985013ce2aef17e046ad9fb9538a671e8eedbd0b
                                          • Instruction ID: d53cff2099975733f8bd7791d9f805a0401f77271811f08b09a1e0b6d09e2c3b
                                          • Opcode Fuzzy Hash: d1282c07078b5f89c335b2e3985013ce2aef17e046ad9fb9538a671e8eedbd0b
                                          • Instruction Fuzzy Hash: C711E971F112244BDFA89A79D46816EB6A7EBC4315F20947AD40ADB354EE35CC01C780
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2501a887440d34267497dbabcef1f7efd53969b7d8d729f700b47e81dc99f7a8
                                          • Instruction ID: 20e6660aec7041fd992a1277857addd0e92035dd54686e41816f04750e95a90e
                                          • Opcode Fuzzy Hash: 2501a887440d34267497dbabcef1f7efd53969b7d8d729f700b47e81dc99f7a8
                                          • Instruction Fuzzy Hash: E3115235B101299FDB549A69D818AEE73EBEBC8215F104535D40AE7384EE659C028BD2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff9328838c6e5445b077ede6985d3139da3b98ff5c30b5ac9d8b27cd1f58880f
                                          • Instruction ID: ffffeb7154adbfc4abcbd6830bc0d47874c51bac6a3b5fa94fd6aabf595d248b
                                          • Opcode Fuzzy Hash: ff9328838c6e5445b077ede6985d3139da3b98ff5c30b5ac9d8b27cd1f58880f
                                          • Instruction Fuzzy Hash: E9012871F102240FDB61863DE85472A77E6DBCA318F109439E00DC7342DE61CC078381
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2731382096cab40e797bdbc23d2947cc17d2250dc74b6e13a4aa08b2dc21f8f1
                                          • Instruction ID: 7e1893f0c8c1b3d0756d42e229d3515a9e200b69271407d98381dbfc64a838d8
                                          • Opcode Fuzzy Hash: 2731382096cab40e797bdbc23d2947cc17d2250dc74b6e13a4aa08b2dc21f8f1
                                          • Instruction Fuzzy Hash: D021C2B1D01269EFCB00CF9AD985ADEFBB4FB48314F10812AE918A7340D375A544CFA5
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6993ea8b07f4319862503aaf915954e026e6f0a675e23c3e64fdd23d0bd6e6e6
                                          • Instruction ID: 75966cd3fc97d7c19c8e1f6ca385371043494e7940cbf85ec7298d55234f166c
                                          • Opcode Fuzzy Hash: 6993ea8b07f4319862503aaf915954e026e6f0a675e23c3e64fdd23d0bd6e6e6
                                          • Instruction Fuzzy Hash: BC01D435B106249BDBA49AAE995472BAADADBC9714F14943EE10AC7380ED21DC068391
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b025d18ef6bf778a497ab23912d8a14d423bd409ba564b48080df8c3a117b545
                                          • Instruction ID: 31b724967f5272a1eacd20abaf9fb844d72b365620d37c8b10a6d853e86cc256
                                          • Opcode Fuzzy Hash: b025d18ef6bf778a497ab23912d8a14d423bd409ba564b48080df8c3a117b545
                                          • Instruction Fuzzy Hash: 5B01D432B102295FDB549AA8DC19BEF73FBDBC8215F140136D409E7380EE699C0287D2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d7ba345ed17c9d33130286a4eece26dd9bda211387f054d73556e9e2daf45f1
                                          • Instruction ID: ba40c55470b999a84a14630208ff2e3ccad3cfd9e41ba665935052c4ea145b1e
                                          • Opcode Fuzzy Hash: 9d7ba345ed17c9d33130286a4eece26dd9bda211387f054d73556e9e2daf45f1
                                          • Instruction Fuzzy Hash: CA01D635B106249FDB64DAAED55472BB7DADBC9718F10D43AE50ECB380DE22DC028395
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efff77192c65a8c21a0f45094a816e825861cad8fe37002d3cf13977d921e9a5
                                          • Instruction ID: 82624233c0def5d91b9ee254955eb0195ae73202e8a298c9e02ae9090f250109
                                          • Opcode Fuzzy Hash: efff77192c65a8c21a0f45094a816e825861cad8fe37002d3cf13977d921e9a5
                                          • Instruction Fuzzy Hash: AA11C2B1D01269EFCB00CF9AD884ACEFBB4FB48314F10812AE518A7240C374A544CFA5
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 093d4a7390f09d17307c75ba452929ca3b0dbb18e0b0b5eed8d8e1e92d283573
                                          • Instruction ID: 0367f9317c3312e6bca1326c8f8a192039601e559e16fec9f7a7b169ef03ea70
                                          • Opcode Fuzzy Hash: 093d4a7390f09d17307c75ba452929ca3b0dbb18e0b0b5eed8d8e1e92d283573
                                          • Instruction Fuzzy Hash: E601D635B101245BDB64D9AED55472BB6DADBC9718F10D43AE50EC7380DD21DC028395
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b00236d14c7a89ad496f9c2a9e97fc4f889ffac27c308ece6f7f53c457fe77b3
                                          • Instruction ID: 14beea6992e8090b074f68308fa9b9b2e635f79e16211d23a02d1c44cab6a5c3
                                          • Opcode Fuzzy Hash: b00236d14c7a89ad496f9c2a9e97fc4f889ffac27c308ece6f7f53c457fe77b3
                                          • Instruction Fuzzy Hash: ED01D171F101241BDB64956EE85872E67DADBC9628F109439E00ECB341DE61DC078385
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3fc766dfca6fb1752fd47bfd1bf3b0bd5b5154b536c53fb6cdcec9133ee6d966
                                          • Instruction ID: d289c5b2e7e0db1401a6f80656ca31724f2e22ad63598f2569f9a40ba732ce17
                                          • Opcode Fuzzy Hash: 3fc766dfca6fb1752fd47bfd1bf3b0bd5b5154b536c53fb6cdcec9133ee6d966
                                          • Instruction Fuzzy Hash: 8501A735B102140FE790D7BED55876E77D5EB89718F109939E48AD7380DD26DC418781
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a5e5ad773b24299b4e3d621679a8fa1ab58a9178e0b027e8da56f9330cb0a1d
                                          • Instruction ID: 0300a07d815104d278fb5430b983317769e151899aa09864b95dd2a2908612fa
                                          • Opcode Fuzzy Hash: 8a5e5ad773b24299b4e3d621679a8fa1ab58a9178e0b027e8da56f9330cb0a1d
                                          • Instruction Fuzzy Hash: 0301F935B101100FEBA0DABED55872A73D5E789708F109838E44ECB340DD21DC428780
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bdb077c67de0b4b90f7a91d0aa1b26d93c5bcde944d219f7c54716bbe77da255
                                          • Instruction ID: 6b7a00a1ae54dcafdeef191abda48200cd5a9b7b16d038b517ef4e47f7c8e0a6
                                          • Opcode Fuzzy Hash: bdb077c67de0b4b90f7a91d0aa1b26d93c5bcde944d219f7c54716bbe77da255
                                          • Instruction Fuzzy Hash: FA01A934B102241FEB60DA6ED55471A77D5E789718F109838E44ACB340DD26DC4187C1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c8883d8af0270b6d7da13efec86c9d2c810feb199c1523cdb0c601dfc8bfe321
                                          • Instruction ID: 927ef48ddcdbe367343c65825e73e15517c704a4a553ef94cd36ad33aee25e3f
                                          • Opcode Fuzzy Hash: c8883d8af0270b6d7da13efec86c9d2c810feb199c1523cdb0c601dfc8bfe321
                                          • Instruction Fuzzy Hash: E2E09AB1E14328BBCB90EAB4899E79E77ADEB42218F2194A5D444CB201E176CA02C391
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 855b8f916cf71a7561db9cf985b91b5813bcbb63e041c98f4dffd035ac9af7e7
                                          • Instruction ID: f69bce9dffa6011bb5ae241d52b31cbe03bd71e0df16285a3cfc00b1dde28324
                                          • Opcode Fuzzy Hash: 855b8f916cf71a7561db9cf985b91b5813bcbb63e041c98f4dffd035ac9af7e7
                                          • Instruction Fuzzy Hash: D7E04F70E14268BBDF50DA74895D76A77ACEB42208F2094A4D405CB201E236CA02C741
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                                          • Instruction ID: e6683acf5053b49ee74d305e108de274e5bc97037a88574b16026f2c1070e94c
                                          • Opcode Fuzzy Hash: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                                          • Instruction Fuzzy Hash: F2E012B1E14328BBDF50DEB4C95D75EB7ADEB42218F2094B5D409DB201E676DE02C741
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: d4c5c63c006a128a3bbb2bdbba4378563050b61bac5f60ebc952df0a2f15bd97
                                          • Instruction ID: 466afb0749ab614c7c23a7e99ccb28f256dcbf23d489396c1cbe61dbde9e590d
                                          • Opcode Fuzzy Hash: d4c5c63c006a128a3bbb2bdbba4378563050b61bac5f60ebc952df0a2f15bd97
                                          • Instruction Fuzzy Hash: D0123A74E003298FDF68DF65C958A9EB7B2FF88304F2095A9D409AB254DB30DD85CB85
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: 13d1e641b16648f0ff467fe11716e0a93766a311d6f270f9c1a993c7fa6cb01f
                                          • Instruction ID: 3f5601bcce924ead230979897c1edb48afdb503d5a8d8bcaeed51d9d9f844cd6
                                          • Opcode Fuzzy Hash: 13d1e641b16648f0ff467fe11716e0a93766a311d6f270f9c1a993c7fa6cb01f
                                          • Instruction Fuzzy Hash: 81918D34A003199FEB68DF69D548BAEB7F6FF88304F209439D441AB294DB759C85CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: 3d8e845433336b03a324e2491fe8e703822a13f5136a944a9d199e8c217d9c41
                                          • Instruction ID: d6eb8b0888f85bf63c3bdf91abb6f6646b83ff31b75e8b9200988daec155b286
                                          • Opcode Fuzzy Hash: 3d8e845433336b03a324e2491fe8e703822a13f5136a944a9d199e8c217d9c41
                                          • Instruction Fuzzy Hash: 54F15A74A01318DFDB58DBA5C594A6EB7B3FF88300F208468D4159B3A8CB75EC82CB85
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 4e460c69058e5311ab32e09620d56def23a149e53137c3b711faacdac069771f
                                          • Instruction ID: 432c3b16517c81860aa953dee3d7be6f9394646c1d27f4124e173375a43712b9
                                          • Opcode Fuzzy Hash: 4e460c69058e5311ab32e09620d56def23a149e53137c3b711faacdac069771f
                                          • Instruction Fuzzy Hash: 55B14D34A103188FDB58DF69D59869EB7B2FF88304F249969E006DB395DB75DC82CB80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: edb025f1a64a3ef40b6fafc8c4ef762ca45bdd83c3b5d5c398867dbf648bb6fb
                                          • Instruction ID: f30950ef846354d0b9a5caf86a5f060c7773d1b89d4522f284f98162bd21da96
                                          • Opcode Fuzzy Hash: edb025f1a64a3ef40b6fafc8c4ef762ca45bdd83c3b5d5c398867dbf648bb6fb
                                          • Instruction Fuzzy Hash: A451CF34B013119FEB58DB69C948A6FB7E6FF88304F1095A8E4469F3A5DA31EC44CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.4117741284.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6e30000_adobe.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: e778607dca52180c1771341658c7a9e0ac00b1eb65c85354dcc1df5e51880ce0
                                          • Instruction ID: e8d086c126401d7b865bc0087324be6a23d56a17bf9e6aa607ec1f6c73cb5f2f
                                          • Opcode Fuzzy Hash: e778607dca52180c1771341658c7a9e0ac00b1eb65c85354dcc1df5e51880ce0
                                          • Instruction Fuzzy Hash: 8D518E34E103188FDF69DB69D5886ADB3B2FB88309F249939D8469B354DB31DC81CB91