Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
.....scr.exe

Overview

General Information

Sample name:.....scr.exe
renamed because original name is a hash value
Original sample name:-ICS 2 House BL filing format.xlsx................................................................................................scr.exe
Analysis ID:1629758
MD5:8bb239fb87b043c801faf13f8bba1228
SHA1:2e5a933bf9ff60c1703560d796e2642a7c9fcef7
SHA256:65b7cf7ab546e94fad0cbce12c9756dcb2af4aa833943beffdfcc448e00e4449
Tags:exeRemcosRATuser-threatcat_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • .....scr.exe (PID: 1848 cmdline: "C:\Users\user\Desktop\.....scr.exe" MD5: 8BB239FB87B043C801FAF13F8BBA1228)
    • .....scr.exe (PID: 5808 cmdline: "C:\Users\user\Desktop\.....scr.exe" MD5: 8BB239FB87B043C801FAF13F8BBA1228)
      • Adobe.exe (PID: 5528 cmdline: "C:\ProgramData\Adobe-Reader\Adobe.exe" MD5: 8BB239FB87B043C801FAF13F8BBA1228)
        • Adobe.exe (PID: 1268 cmdline: "C:\ProgramData\Adobe-Reader\Adobe.exe" MD5: 8BB239FB87B043C801FAF13F8BBA1228)
          • recover.exe (PID: 6352 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 2944 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 5808 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 1848 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 4464 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 940 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 6196 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 2172 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 2128 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 4024 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 6284 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 2300 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 4676 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7172 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7180 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7188 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7196 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7204 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7212 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7220 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7228 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7236 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7244 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7252 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7260 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7268 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7276 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7284 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7292 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7300 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7308 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7316 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7324 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7332 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
          • recover.exe (PID: 7340 cmdline: C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay" MD5: D38B657A068016768CA9F3B5E100B472)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["104.250.180.178:7902:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "Adobe.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Adobe-Reader-DTANWR", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Adobe-Reader", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.2080081154.0000000000BE7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            2.2......scr.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              2.2......scr.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                2.2......scr.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  2.2......scr.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6d758:$a1: Remcos restarted by watchdog!
                  • 0x6dda8:$a3: %02i:%02i:%02i:%03i
                  2.2......scr.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x679f4:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x67970:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x67970:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x67e70:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x684d8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x67a64:$str_b2: Executing file:
                  • 0x6889c:$str_b3: GetDirectListeningPort
                  • 0x682c8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x68448:$str_b7: \update.vbs
                  • 0x67a8c:$str_b9: Downloaded file:
                  • 0x67a78:$str_b10: Downloading file:
                  • 0x67b1c:$str_b12: Failed to upload file:
                  • 0x68864:$str_b13: StartForward
                  • 0x68884:$str_b14: StopForward
                  • 0x683a0:$str_b15: fso.DeleteFile "
                  • 0x68334:$str_b16: On Error Resume Next
                  • 0x683d0:$str_b17: fso.DeleteFolder "
                  • 0x67b0c:$str_b18: Uploaded file:
                  • 0x67acc:$str_b19: Unable to delete:
                  • 0x68368:$str_b20: while fso.FileExists("
                  • 0x67fa9:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 29 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Adobe-Reader\Adobe.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\.....scr.exe, ProcessId: 5808, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe-Reader-DTANWR
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Adobe-Reader\Adobe.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\.....scr.exe, ProcessId: 5808, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe-Reader-DTANWR
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-05T07:10:13.449562+010020365941Malware Command and Control Activity Detected192.168.2.549709104.250.180.1787902TCP
                  2025-03-05T07:10:15.086317+010020365941Malware Command and Control Activity Detected192.168.2.549710104.250.180.1787902TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-05T07:10:15.074009+010028033043Unknown Traffic192.168.2.549711178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["104.250.180.178:7902:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "Adobe.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Adobe-Reader-DTANWR", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Adobe-Reader", "Keylog folder": "remcos"}
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeReversingLabs: Detection: 26%
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeVirustotal: Detection: 33%Perma Link
                  Source: .....scr.exeVirustotal: Detection: 33%Perma Link
                  Source: .....scr.exeReversingLabs: Detection: 26%
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2080081154.0000000000BE7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Adobe.exe PID: 1268, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00433B64 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_00433B64
                  Source: .....scr.exe, 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_fe86d65b-f

                  Exploits

                  barindex
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00406ABC _wcslen,CoGetObject,2_2_00406ABC
                  Source: .....scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: .....scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: gxjs.pdbSHA256 source: .....scr.exe, Adobe.exe.2.dr
                  Source: Binary string: gxjs.pdb source: .....scr.exe, Adobe.exe.2.dr
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,2_2_004090DC
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040B6B5
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,2_2_0041C7E5
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040B8BA
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0044E989 FindFirstFileExA,2_2_0044E989
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,2_2_00408CDE
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419CEE
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,2_2_00407EDD
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00406F13 FindFirstFileW,FindNextFileW,2_2_00406F13
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_100010F1
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_10006580 FindFirstFileExA,4_2_10006580
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00407357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407357
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49709 -> 104.250.180.178:7902
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49710 -> 104.250.180.178:7902
                  Source: Malware configuration extractorIPs: 104.250.180.178
                  Source: global trafficTCP traffic: 192.168.2.5:49709 -> 104.250.180.178:7902
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 104.250.180.178 104.250.180.178
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: M247GB M247GB
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49711 -> 178.237.33.50:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: unknownTCP traffic detected without corresponding DNS query: 104.250.180.178
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004062E2 ShellExecuteW,URLDownloadToFileW,2_2_004062E2
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: .....scr.exe, Adobe.exe, 00000004.00000002.4509791383.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, Adobe.exe, 00000004.00000002.4509791383.00000000011E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: .....scr.exe, 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, .....scr.exe, 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                  Source: Adobe.exe, 00000004.00000002.4509186980.0000000001000000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: Adobe.exe, 00000004.00000002.4509486281.0000000001080000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00409D1E SetWindowsHookExA 0000000D,00409D0A,000000002_2_00409D1E
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040B158 OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B158
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041696E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0041696E
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040B158 OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B158
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00409E4A GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,2_2_00409E4A
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2080081154.0000000000BE7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Adobe.exe PID: 1268, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041CF2D SystemParametersInfoW,2_2_0041CF2D
                  Source: recover.exeProcess created: 70

                  System Summary

                  barindex
                  Source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00416861 ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_00416861
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_05DD618C0_2_05DD618C
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_05DD61830_2_05DD6183
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_05DD73A80_2_05DD73A8
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_0788A6870_2_0788A687
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_0788A6980_2_0788A698
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_078893F80_2_078893F8
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_0788AFC80_2_0788AFC8
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_07888FC00_2_07888FC0
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 0_2_07888B6B0_2_07888B6B
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0042809D2_2_0042809D
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0045412B2_2_0045412B
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004421C02_2_004421C0
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004281D72_2_004281D7
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043E1E02_2_0043E1E0
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041E29B2_2_0041E29B
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004373DA2_2_004373DA
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004383802_2_00438380
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004534722_2_00453472
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0042747E2_2_0042747E
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043E43D2_2_0043E43D
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004325A12_2_004325A1
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043774C2_2_0043774C
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041F8092_2_0041F809
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004379F62_2_004379F6
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004279F52_2_004279F5
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0044DAD92_2_0044DAD9
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00433C732_2_00433C73
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00413CA02_2_00413CA0
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00437CBD2_2_00437CBD
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043DD822_2_0043DD82
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00435F522_2_00435F52
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00437F782_2_00437F78
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043DFB12_2_0043DFB1
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_0733618C3_2_0733618C
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_073373A83_2_073373A8
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_073361833_2_07336183
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_0741A6873_2_0741A687
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_0741A6983_2_0741A698
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_074193F83_2_074193F8
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_07418FC03_2_07418FC0
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_0741AFC83_2_0741AFC8
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 3_2_07418B563_2_07418B56
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_100171944_2_10017194
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_1000B5C14_2_1000B5C1
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: String function: 004351E0 appears 55 times
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: String function: 00401F96 appears 49 times
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: String function: 00401EBF appears 32 times
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: String function: 00434ACF appears 43 times
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: String function: 00402117 appears 39 times
                  Source: .....scr.exe, 00000000.00000000.2055236190.0000000000F7E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegxjs.exe" vs .....scr.exe
                  Source: .....scr.exe, 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs .....scr.exe
                  Source: .....scr.exe, 00000000.00000002.2083588353.0000000007890000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs .....scr.exe
                  Source: .....scr.exe, 00000000.00000002.2072982789.000000000338B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs .....scr.exe
                  Source: .....scr.exe, 00000000.00000002.2067609331.000000000145E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs .....scr.exe
                  Source: .....scr.exe, 00000000.00000002.2083399936.0000000007790000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs .....scr.exe
                  Source: .....scr.exe, 00000002.00000002.2080081154.0000000000C11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegxjs.exe" vs .....scr.exe
                  Source: .....scr.exe, 00000002.00000002.2080081154.0000000000C57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs .....scr.exe
                  Source: .....scr.exeBinary or memory string: OriginalFilenamegxjs.exe" vs .....scr.exe
                  Source: .....scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: .....scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Adobe.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, yiBA6ThVAQLoMBwpE8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, yiBA6ThVAQLoMBwpE8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, yiBA6ThVAQLoMBwpE8.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, yiBA6ThVAQLoMBwpE8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, aoO0GZ8xRBNFTYFtKl.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, aoO0GZ8xRBNFTYFtKl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, aoO0GZ8xRBNFTYFtKl.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, aoO0GZ8xRBNFTYFtKl.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, aoO0GZ8xRBNFTYFtKl.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, aoO0GZ8xRBNFTYFtKl.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@10165/5@1/2
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00417AD9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_00417AD9
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040C03C GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,2_2_0040C03C
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041B9AB FindResourceA,LoadResource,LockResource,SizeofResource,2_2_0041B9AB
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AC43
                  Source: C:\Users\user\Desktop\.....scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\.....scr.exe.logJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMutant created: NULL
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMutant created: \Sessions\1\BaseNamedObjects\Adobe-Reader-DTANWR
                  Source: .....scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: .....scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\.....scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Adobe.exe, 00000004.00000002.4509186980.0000000001000000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: .....scr.exeVirustotal: Detection: 33%
                  Source: .....scr.exeReversingLabs: Detection: 26%
                  Source: C:\Users\user\Desktop\.....scr.exeFile read: C:\Users\user\Desktop\.....scr.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\.....scr.exe "C:\Users\user\Desktop\.....scr.exe"
                  Source: C:\Users\user\Desktop\.....scr.exeProcess created: C:\Users\user\Desktop\.....scr.exe "C:\Users\user\Desktop\.....scr.exe"
                  Source: C:\Users\user\Desktop\.....scr.exeProcess created: C:\ProgramData\Adobe-Reader\Adobe.exe "C:\ProgramData\Adobe-Reader\Adobe.exe"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\ProgramData\Adobe-Reader\Adobe.exe "C:\ProgramData\Adobe-Reader\Adobe.exe"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"
                  Source: C:\Users\user\Desktop\.....scr.exeProcess created: C:\Users\user\Desktop\.....scr.exe "C:\Users\user\Desktop\.....scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess created: C:\ProgramData\Adobe-Reader\Adobe.exe "C:\ProgramData\Adobe-Reader\Adobe.exe" Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\ProgramData\Adobe-Reader\Adobe.exe "C:\ProgramData\Adobe-Reader\Adobe.exe"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: iconcodecservice.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: twext.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: starttiledata.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: acppage.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: msi.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: aepic.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: iconcodecservice.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: .....scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: .....scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: .....scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: gxjs.pdbSHA256 source: .....scr.exe, Adobe.exe.2.dr
                  Source: Binary string: gxjs.pdb source: .....scr.exe, Adobe.exe.2.dr

                  Data Obfuscation

                  barindex
                  Source: 0.2......scr.exe.347f0d0.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, aoO0GZ8xRBNFTYFtKl.cs.Net Code: COjjOcBrgi System.Reflection.Assembly.Load(byte[])
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, aoO0GZ8xRBNFTYFtKl.cs.Net Code: COjjOcBrgi System.Reflection.Assembly.Load(byte[])
                  Source: 0.2......scr.exe.7790000.4.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: .....scr.exeStatic PE information: 0xA8F7BB46 [Fri Oct 31 06:33:42 2059 UTC]
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041D0CF
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004570CF push ecx; ret 2_2_004570E2
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00435226 push ecx; ret 2_2_00435239
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0045D9ED push esi; ret 2_2_0045D9F6
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00457A00 push eax; ret 2_2_00457A1E
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_10002806 push ecx; ret 4_2_10002819
                  Source: .....scr.exeStatic PE information: section name: .text entropy: 7.8744796025572485
                  Source: Adobe.exe.2.drStatic PE information: section name: .text entropy: 7.8744796025572485
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, aoO0GZ8xRBNFTYFtKl.csHigh entropy of concatenated method names: 'sJ5ldIKhgF', 'CB4lTFbYk4', 'G2OlCDb2dJ', 'iRZlLA9gDK', 'NqelXqje5C', 'WQllZiaxtP', 'jNylxchPBP', 'Nj5lsZTHUL', 'obyle7U2Dy', 'g2KlFOJKIT'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, lUxvuspYQIg23v5LlK.csHigh entropy of concatenated method names: 'uPsxTG9MCq', 'aAxxLWbEgd', 'jRExZNA5rv', 'i0UZpWgB3a', 'jUyZzjb5KD', 'sdvxAGAjMy', 'wZoxI35qvb', 'ayJxUO8cY5', 'AFwxlbbfPd', 'BIBxj9lyX2'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, dH4i4QlkYJQNYI5oma.csHigh entropy of concatenated method names: 'wc7xaHB9tP', 'QIBxqfuyID', 'ATXxOrN7yv', 'BMDx8tiLka', 'uLkxrulx5s', 'W15xYNgcYS', 'JwAxmHyLqy', 'JwmxK10WwI', 'tHtx1shugl', 'aDTxVIfpoC'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, yiBA6ThVAQLoMBwpE8.csHigh entropy of concatenated method names: 'JlOCGi06u0', 'omBC6a3pjT', 'pGsCDQtTiG', 'yqdCt2K9AL', 'ePFChYgEke', 'n0eCkhDU3y', 'FHDCNX8ojS', 'zJ8CPeY94d', 'AHOCExVRQa', 'F1hCpLMQtF'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, fTUItVdmiCytMeKX2H.csHigh entropy of concatenated method names: 'OoxuvCgZPp', 'wGxu3ctbx1', 'EZUuGDLON4', 'SJCu67yQj6', 'H6luRQl3vL', 'orCu7Hria6', 'Fg5uJYCVPT', 'geyu5nCYol', 'KlVuHnko80', 'NLKuQaqrd1'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, vAPKEEKKBkIrw6Zp2qY.csHigh entropy of concatenated method names: 'eeJSprqDRX', 'Cv7SzbfJab', 'E8MnAbtyXv', 'd81nIwCSVW', 'BqxnUuFjgA', 'gSTnlXYU9P', 'Y5rnjCaqJL', 'cLtnd3gpMO', 'IYXnTFak8g', 'HufnCb6tDh'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, jioyy21UDmni2gydf1.csHigh entropy of concatenated method names: 'svt4cneTMJ', 'R6E4RPCITw', 'xKI472aciU', 'VDh4JApjNm', 'BOd45LNYC9', 'PSp4HkDp2Z', 'Hjt4Q4Apab', 'Ato4MJeEoK', 'HpE49kcA88', 'Pbw4vRTvjm'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, ba5gRELn97Em3r2tov.csHigh entropy of concatenated method names: 'Dispose', 'EJvIEe2lVV', 'uWTURPiBJU', 'rsnwhxB5KI', 'Pv9IpVlpZ7', 'W39IzMl1Aq', 'ProcessDialogKey', 'B7SUAtAFYk', 'lf8UIRA4wH', 'OleUUlVqI8'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, d1AdoogCYqrmRNSKls.csHigh entropy of concatenated method names: 'CDkL8P4Dew', 'NumLYEKr4w', 'R9gLKZdF9h', 'VYVL17llvA', 'StlLuie96F', 's3MLBq502W', 'EcMLbb12As', 'WnMLiyReku', 'oH0L47h409', 'wcnLS3V4aV'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, WeuISm2dF3ZsNwmsmG.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'OGFUENROgY', 'dDlUpwOHbO', 'UEPUzxvJ8W', 'LavlAFknFP', 'rmolInNqr7', 'uvLlUqefZq', 'pQ1llH6APR', 'Gir5Uv48RRfyc6MaS5l'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, rINN7gcadR8xPw0Sdu.csHigh entropy of concatenated method names: 'fSMWKggT94', 'ribW1VXy8S', 'PxhWcibIKI', 'F2YWRjh9UL', 'cdDWJhqlLe', 'LCxW5hdVRc', 'lKGWQCb7Dw', 'rtsWMMaA31', 'WCBWv6m58n', 'tXgW2NjiP0'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, Qi6YAXr3JJxQHEJOwX.csHigh entropy of concatenated method names: 'I6rbPHpdcg', 'lqrbpapVWc', 'BAwiAZIgWm', 'ihViIrMFQL', 'Q6wb2LlNdL', 'ovJb3UmBOy', 'Mgkbo7uLR9', 'EfibGqh3Qy', 'Mwgb6dWLcp', 'EXSbDjlRNA'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, FDbgkrQ3SU5mkbEMng.csHigh entropy of concatenated method names: 'IwCZDIC5C7', 'pt3ZtNcFm4', 'S1bZh37YTd', 'ToString', 'avkZkla8sY', 'xmMZNnlXIG', 'h3XBrwKpNudXpIv8GP9', 'ljqkekKEfmJcjy3ydqL', 'hoqTInKGqFTXyx402IM'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, E5NHonJupZL7sg6rCY.csHigh entropy of concatenated method names: 'V9rZdLDgJ6', 'GfRZCtPJE2', 'S5SZXmiC88', 'gCJZxYfKyS', 'qcmZs1ljGN', 'xQrXhS8Wf8', 'xlZXkwwAvn', 'Re8XNVnPsA', 'cvJXPjbM8U', 'LoWXEsZs29'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, Ug65fMFbRObqE4krK9.csHigh entropy of concatenated method names: 'TFNbFhgyJQ', 'D2GbfOpQPf', 'ToString', 'URybTq1yGh', 'nqjbCXyAWl', 'pLgbLYNUHm', 'RpobXly94m', 'fOqbZkYf9u', 't4GbxV6jgv', 'QH3bsat7DN'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, iV67N53I7TqPJT6C9v.csHigh entropy of concatenated method names: 'uXNO71F3S', 'm2J8gQedm', 'T1YYlDyiG', 'MnUm9QhCt', 'DYK1RV06x', 'TlrVgHY08', 'MZqJfpkgl6Dircggcv', 'bunGMCZtsZ0ltNvJkf', 'DIxiLw5w9', 'n2CSrjylN'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, meQGsqRdplvgWpHZgm.csHigh entropy of concatenated method names: 'yP4IxqbZEe', 'bVEIsyWpuG', 'TiUIF1Lobf', 'dHXIfd3DOH', 'CUrIuupOTQ', 'GVeIB6ND8d', 'WMgnydJQLAagwfxI9p', 'cmBkslPtQl1WGHT0PD', 'OkBIILNOhX', 'GEXIlPSCgx'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, CBtRNvKNNuqPd0AOGJv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EOqS2LALr3', 'VrXS38VtHo', 'eIQSoLUvy6', 'aPfSGE1Rh6', 'cjtS6NVNXd', 'lbWSDSyDvu', 'UnyStSIjS4'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, xAFaraHMSBjMIaHTK6.csHigh entropy of concatenated method names: 'ToString', 'xxKB2nA4ju', 'BV1BRjYvDC', 'uDdB7avGEg', 'LDUBJVie5B', 'rGGB51GIb0', 'bjuBHTffWs', 'G3bBQ3N1Gs', 'BDcBMJJyN4', 'HO2B9RU5jC'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, Lg0Fj100kmv0AFJw3v.csHigh entropy of concatenated method names: 's9n4uNn2Jj', 'yyp4bm4f0s', 'gTk44cPTbp', 'vml4nCil3y', 'MNH4yoBKgt', 'A364gagCk6', 'Dispose', 'y8QiTIIIpO', 'IqXiCdLd35', 'mYfiLSMPiv'
                  Source: 0.2......scr.exe.7890000.5.raw.unpack, eRU05xzX1aYA8ffgRk.csHigh entropy of concatenated method names: 'fmoSY1Zavc', 'OFPSKlcuoK', 'QITS1P7DOL', 'sjRScRvn5w', 'QvqSRgQQmH', 'lGJSJtpxGN', 'bfvS5Toasi', 'VTESgNI7JP', 'UB9SafVRBk', 'yEPSqX3q8q'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, aoO0GZ8xRBNFTYFtKl.csHigh entropy of concatenated method names: 'sJ5ldIKhgF', 'CB4lTFbYk4', 'G2OlCDb2dJ', 'iRZlLA9gDK', 'NqelXqje5C', 'WQllZiaxtP', 'jNylxchPBP', 'Nj5lsZTHUL', 'obyle7U2Dy', 'g2KlFOJKIT'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, lUxvuspYQIg23v5LlK.csHigh entropy of concatenated method names: 'uPsxTG9MCq', 'aAxxLWbEgd', 'jRExZNA5rv', 'i0UZpWgB3a', 'jUyZzjb5KD', 'sdvxAGAjMy', 'wZoxI35qvb', 'ayJxUO8cY5', 'AFwxlbbfPd', 'BIBxj9lyX2'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, dH4i4QlkYJQNYI5oma.csHigh entropy of concatenated method names: 'wc7xaHB9tP', 'QIBxqfuyID', 'ATXxOrN7yv', 'BMDx8tiLka', 'uLkxrulx5s', 'W15xYNgcYS', 'JwAxmHyLqy', 'JwmxK10WwI', 'tHtx1shugl', 'aDTxVIfpoC'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, yiBA6ThVAQLoMBwpE8.csHigh entropy of concatenated method names: 'JlOCGi06u0', 'omBC6a3pjT', 'pGsCDQtTiG', 'yqdCt2K9AL', 'ePFChYgEke', 'n0eCkhDU3y', 'FHDCNX8ojS', 'zJ8CPeY94d', 'AHOCExVRQa', 'F1hCpLMQtF'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, fTUItVdmiCytMeKX2H.csHigh entropy of concatenated method names: 'OoxuvCgZPp', 'wGxu3ctbx1', 'EZUuGDLON4', 'SJCu67yQj6', 'H6luRQl3vL', 'orCu7Hria6', 'Fg5uJYCVPT', 'geyu5nCYol', 'KlVuHnko80', 'NLKuQaqrd1'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, vAPKEEKKBkIrw6Zp2qY.csHigh entropy of concatenated method names: 'eeJSprqDRX', 'Cv7SzbfJab', 'E8MnAbtyXv', 'd81nIwCSVW', 'BqxnUuFjgA', 'gSTnlXYU9P', 'Y5rnjCaqJL', 'cLtnd3gpMO', 'IYXnTFak8g', 'HufnCb6tDh'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, jioyy21UDmni2gydf1.csHigh entropy of concatenated method names: 'svt4cneTMJ', 'R6E4RPCITw', 'xKI472aciU', 'VDh4JApjNm', 'BOd45LNYC9', 'PSp4HkDp2Z', 'Hjt4Q4Apab', 'Ato4MJeEoK', 'HpE49kcA88', 'Pbw4vRTvjm'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, ba5gRELn97Em3r2tov.csHigh entropy of concatenated method names: 'Dispose', 'EJvIEe2lVV', 'uWTURPiBJU', 'rsnwhxB5KI', 'Pv9IpVlpZ7', 'W39IzMl1Aq', 'ProcessDialogKey', 'B7SUAtAFYk', 'lf8UIRA4wH', 'OleUUlVqI8'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, d1AdoogCYqrmRNSKls.csHigh entropy of concatenated method names: 'CDkL8P4Dew', 'NumLYEKr4w', 'R9gLKZdF9h', 'VYVL17llvA', 'StlLuie96F', 's3MLBq502W', 'EcMLbb12As', 'WnMLiyReku', 'oH0L47h409', 'wcnLS3V4aV'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, WeuISm2dF3ZsNwmsmG.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'OGFUENROgY', 'dDlUpwOHbO', 'UEPUzxvJ8W', 'LavlAFknFP', 'rmolInNqr7', 'uvLlUqefZq', 'pQ1llH6APR', 'Gir5Uv48RRfyc6MaS5l'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, rINN7gcadR8xPw0Sdu.csHigh entropy of concatenated method names: 'fSMWKggT94', 'ribW1VXy8S', 'PxhWcibIKI', 'F2YWRjh9UL', 'cdDWJhqlLe', 'LCxW5hdVRc', 'lKGWQCb7Dw', 'rtsWMMaA31', 'WCBWv6m58n', 'tXgW2NjiP0'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, Qi6YAXr3JJxQHEJOwX.csHigh entropy of concatenated method names: 'I6rbPHpdcg', 'lqrbpapVWc', 'BAwiAZIgWm', 'ihViIrMFQL', 'Q6wb2LlNdL', 'ovJb3UmBOy', 'Mgkbo7uLR9', 'EfibGqh3Qy', 'Mwgb6dWLcp', 'EXSbDjlRNA'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, FDbgkrQ3SU5mkbEMng.csHigh entropy of concatenated method names: 'IwCZDIC5C7', 'pt3ZtNcFm4', 'S1bZh37YTd', 'ToString', 'avkZkla8sY', 'xmMZNnlXIG', 'h3XBrwKpNudXpIv8GP9', 'ljqkekKEfmJcjy3ydqL', 'hoqTInKGqFTXyx402IM'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, E5NHonJupZL7sg6rCY.csHigh entropy of concatenated method names: 'V9rZdLDgJ6', 'GfRZCtPJE2', 'S5SZXmiC88', 'gCJZxYfKyS', 'qcmZs1ljGN', 'xQrXhS8Wf8', 'xlZXkwwAvn', 'Re8XNVnPsA', 'cvJXPjbM8U', 'LoWXEsZs29'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, Ug65fMFbRObqE4krK9.csHigh entropy of concatenated method names: 'TFNbFhgyJQ', 'D2GbfOpQPf', 'ToString', 'URybTq1yGh', 'nqjbCXyAWl', 'pLgbLYNUHm', 'RpobXly94m', 'fOqbZkYf9u', 't4GbxV6jgv', 'QH3bsat7DN'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, iV67N53I7TqPJT6C9v.csHigh entropy of concatenated method names: 'uXNO71F3S', 'm2J8gQedm', 'T1YYlDyiG', 'MnUm9QhCt', 'DYK1RV06x', 'TlrVgHY08', 'MZqJfpkgl6Dircggcv', 'bunGMCZtsZ0ltNvJkf', 'DIxiLw5w9', 'n2CSrjylN'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, meQGsqRdplvgWpHZgm.csHigh entropy of concatenated method names: 'yP4IxqbZEe', 'bVEIsyWpuG', 'TiUIF1Lobf', 'dHXIfd3DOH', 'CUrIuupOTQ', 'GVeIB6ND8d', 'WMgnydJQLAagwfxI9p', 'cmBkslPtQl1WGHT0PD', 'OkBIILNOhX', 'GEXIlPSCgx'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, CBtRNvKNNuqPd0AOGJv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'EOqS2LALr3', 'VrXS38VtHo', 'eIQSoLUvy6', 'aPfSGE1Rh6', 'cjtS6NVNXd', 'lbWSDSyDvu', 'UnyStSIjS4'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, xAFaraHMSBjMIaHTK6.csHigh entropy of concatenated method names: 'ToString', 'xxKB2nA4ju', 'BV1BRjYvDC', 'uDdB7avGEg', 'LDUBJVie5B', 'rGGB51GIb0', 'bjuBHTffWs', 'G3bBQ3N1Gs', 'BDcBMJJyN4', 'HO2B9RU5jC'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, Lg0Fj100kmv0AFJw3v.csHigh entropy of concatenated method names: 's9n4uNn2Jj', 'yyp4bm4f0s', 'gTk44cPTbp', 'vml4nCil3y', 'MNH4yoBKgt', 'A364gagCk6', 'Dispose', 'y8QiTIIIpO', 'IqXiCdLd35', 'mYfiLSMPiv'
                  Source: 0.2......scr.exe.44f98c8.3.raw.unpack, eRU05xzX1aYA8ffgRk.csHigh entropy of concatenated method names: 'fmoSY1Zavc', 'OFPSKlcuoK', 'QITS1P7DOL', 'sjRScRvn5w', 'QvqSRgQQmH', 'lGJSJtpxGN', 'bfvS5Toasi', 'VTESgNI7JP', 'UB9SafVRBk', 'yEPSqX3q8q'
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004062E2 ShellExecuteW,URLDownloadToFileW,2_2_004062E2
                  Source: C:\Users\user\Desktop\.....scr.exeFile created: C:\ProgramData\Adobe-Reader\Adobe.exeJump to dropped file
                  Source: C:\Users\user\Desktop\.....scr.exeFile created: C:\ProgramData\Adobe-Reader\Adobe.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\.....scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Adobe-Reader-DTANWRJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041AC43 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AC43
                  Source: C:\Users\user\Desktop\.....scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Adobe-Reader-DTANWRJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Adobe-Reader-DTANWRJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Adobe-Reader-DTANWRJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Adobe-Reader-DTANWRJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041D0CF
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Adobe.exe PID: 5528, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: 18E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: 3150000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: 91D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: A1D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: A3D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: B3D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: 2D10000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: 4D10000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: 8990000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: 9990000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: 9B80000 memory reserve | memory write watchJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory allocated: AB80000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_0041A941
                  Source: C:\Users\user\Desktop\.....scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeWindow / User API: threadDelayed 3988Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeWindow / User API: threadDelayed 5798Jump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeEvaded block: after key decisiongraph_2-47987
                  Source: C:\Users\user\Desktop\.....scr.exeEvaded block: after key decisiongraph_2-47828
                  Source: C:\Users\user\Desktop\.....scr.exeEvaded block: after key decisiongraph_2-47962
                  Source: C:\Users\user\Desktop\.....scr.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-47790
                  Source: C:\Users\user\Desktop\.....scr.exeAPI coverage: 6.9 %
                  Source: C:\Users\user\Desktop\.....scr.exe TID: 5548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exe TID: 5996Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exe TID: 348Thread sleep count: 3988 > 30Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exe TID: 348Thread sleep time: -11964000s >= -30000sJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exe TID: 7064Thread sleep count: 48 > 30Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exe TID: 348Thread sleep count: 5798 > 30Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exe TID: 348Thread sleep time: -17394000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004090DC __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,2_2_004090DC
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040B6B5 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040B6B5
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041C7E5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,2_2_0041C7E5
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0040B8BA FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040B8BA
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0044E989 FindFirstFileExA,2_2_0044E989
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00408CDE __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,2_2_00408CDE
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00419CEE FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419CEE
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00407EDD __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,2_2_00407EDD
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00406F13 FindFirstFileW,FindNextFileW,2_2_00406F13
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_100010F1
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_10006580 FindFirstFileExA,4_2_10006580
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00407357 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407357
                  Source: C:\Users\user\Desktop\.....scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
                  Source: Adobe.exe, 00000004.00000002.4509791383.00000000011FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWe8
                  Source: Adobe.exe, 00000004.00000002.4509791383.00000000011FC000.00000004.00000020.00020000.00000000.sdmp, Adobe.exe, 00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043B88D
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041D0CF LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041D0CF
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004438F4 mov eax, dword ptr fs:[00000030h]2_2_004438F4
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_10004AB4 mov eax, dword ptr fs:[00000030h]4_2_10004AB4
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00411999 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,2_2_00411999
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00435398 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00435398
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0043B88D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043B88D
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00434D6E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00434D6E
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00434F01 SetUnhandledExceptionFilter,2_2_00434F01
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_100060E2
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_10002639
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeCode function: 4_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_10002B1C
                  Source: C:\Users\user\Desktop\.....scr.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\.....scr.exeMemory written: C:\Users\user\Desktop\.....scr.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\ProgramData\Adobe-Reader\Adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeSection loaded: NULL target: unknown protection: execute and read and writeJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2685008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 263A008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 281C008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2AE6008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2642008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 3FC008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 3C3008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 3198008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 3170008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2962008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2AB0008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2632008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 27FE008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2957008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2DDE008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2702008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2727008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2EBA008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 2C0E008
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeMemory written: C:\Windows\SysWOW64\recover.exe base: 272A008
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004197D9 mouse_event,2_2_004197D9
                  Source: C:\Users\user\Desktop\.....scr.exeProcess created: C:\Users\user\Desktop\.....scr.exe "C:\Users\user\Desktop\.....scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeProcess created: C:\ProgramData\Adobe-Reader\Adobe.exe "C:\ProgramData\Adobe-Reader\Adobe.exe" Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\ProgramData\Adobe-Reader\Adobe.exe "C:\ProgramData\Adobe-Reader\Adobe.exe"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: C:\Windows\SysWOW64\recover.exe C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nsylwtlxiay"Jump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeProcess created: unknown unknownJump to behavior
                  Source: Adobe.exe, 00000004.00000002.4509791383.00000000011C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: Adobe.exe, 00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmp, Adobe.exe, 00000004.00000002.4509791383.00000000011C0000.00000004.00000020.00020000.00000000.sdmp, Adobe.exe, 00000004.00000002.4509791383.00000000011E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_00435034 cpuid 2_2_00435034
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: EnumSystemLocalesW,2_2_004520E2
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: EnumSystemLocalesW,2_2_00452097
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: EnumSystemLocalesW,2_2_0045217D
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetLocaleInfoA,2_2_0040F26B
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_0045220A
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: EnumSystemLocalesW,2_2_0044844E
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetLocaleInfoW,2_2_0045245A
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00452583
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetLocaleInfoW,2_2_0045268A
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00452757
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: GetLocaleInfoW,2_2_00448937
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_00451E1F
                  Source: C:\Users\user\Desktop\.....scr.exeQueries volume information: C:\Users\user\Desktop\.....scr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeQueries volume information: C:\ProgramData\Adobe-Reader\Adobe.exe VolumeInformationJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\ProgramData\Adobe-Reader\Adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041A1AD __EH_prolog,GdiplusStartup,CreateDirectoryW,Sleep,GetLocalTime,Sleep,2_2_0041A1AD
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_0041BB0E GetUserNameW,2_2_0041BB0E
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: 2_2_004491DA _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,2_2_004491DA
                  Source: C:\Users\user\Desktop\.....scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2080081154.0000000000BE7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Adobe.exe PID: 1268, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0040B59B
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0040B6B5
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: \key3.db2_2_0040B6B5

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2......scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.43b3590.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2......scr.exe.4339970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4509656819.0000000001187000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2080081154.0000000000BE7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2077752023.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2079572873.0000000004339000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .....scr.exe PID: 5808, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Adobe.exe PID: 1268, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\.....scr.exeCode function: cmd.exe2_2_00405091
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  1
                  Deobfuscate/Decode Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  11
                  Registry Run Keys / Startup Folder
                  1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Windows Service
                  12
                  Software Packing
                  NTDS4
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
                  Process Injection
                  1
                  Timestomp
                  LSA Secrets33
                  System Information Discovery
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                  Registry Run Keys / Startup Folder
                  1
                  DLL Side-Loading
                  Cached Domain Credentials121
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Bypass User Account Control
                  DCSync31
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Masquerading
                  Proc Filesystem2
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Access Token Manipulation
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1629758 Sample: .....scr.exe Startdate: 05/03/2025 Architecture: WINDOWS Score: 100 39 geoplugin.net 2->39 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 7 other signatures 2->55 10 .....scr.exe 3 2->10         started        signatures3 process4 file5 33 C:\Users\user\AppData\...\.....scr.exe.log, ASCII 10->33 dropped 61 Contains functionality to bypass UAC (CMSTPLUA) 10->61 63 Contains functionalty to change the wallpaper 10->63 65 Contains functionality to steal Chrome passwords or cookies 10->65 67 3 other signatures 10->67 14 .....scr.exe 2 4 10->14         started        signatures6 process7 file8 35 C:\ProgramData\Adobe-Reader\Adobe.exe, PE32 14->35 dropped 37 C:\ProgramData\...\Adobe.exe:Zone.Identifier, ASCII 14->37 dropped 69 Creates autostart registry keys with suspicious names 14->69 18 Adobe.exe 3 14->18         started        signatures9 process10 signatures11 45 Multi AV Scanner detection for dropped file 18->45 47 Injects a PE file into a foreign processes 18->47 21 Adobe.exe 4 14 18->21         started        process12 dnsIp13 41 104.250.180.178, 49709, 49710, 7902 M247GB United States 21->41 43 geoplugin.net 178.237.33.50, 49711, 80 ATOM86-ASATOM86NL Netherlands 21->43 57 Writes to foreign memory regions 21->57 59 Maps a DLL or memory area into another process 21->59 25 recover.exe 21->25         started        27 recover.exe 21->27         started        29 recover.exe 21->29         started        31 32 other processes 21->31 signatures14 process15

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.