Thanks for the analysis Languy. So it exploits JAVA and drops malware. Then the malware is executed. After the execution, it seems to be copying an executable to adobe plugins folder and
We will need to further anlayze whats going on. It seems it is trying to drop some files to adobe plugins folder and create shell keys. All of these would be blocked by CIS normally.
However there may be something iit is using that we must understand. Once we know what it is doing, i will let you know.
Be assured that if there are any problems in HIPS to lets such an infection, it will be fixed immediately to prevent this threat.