Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hOe2JrpIAE.exe

Overview

General Information

Sample name:hOe2JrpIAE.exe
renamed because original name is a hash value
Original sample name:f3b25ff7dc9cfcab029413dbaab77efdb5017d72ff5c0cc4d88769de1def78a6.exe
Analysis ID:1466892
MD5:21a8497522de5b8b12067fca910e0469
SHA1:314794ef8b3b0fc2f1efc2a68e04caa0e371ff25
SHA256:f3b25ff7dc9cfcab029413dbaab77efdb5017d72ff5c0cc4d88769de1def78a6
Tags:exe
Infos:

Detection

FormBook, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hOe2JrpIAE.exe (PID: 4952 cmdline: "C:\Users\user\Desktop\hOe2JrpIAE.exe" MD5: 21A8497522DE5B8B12067FCA910E0469)
    • hOe2JrpIAE.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\hOe2JrpIAE.exe" MD5: 21A8497522DE5B8B12067FCA910E0469)
    • hOe2JrpIAE.exe (PID: 3524 cmdline: "C:\Users\user\Desktop\hOe2JrpIAE.exe" MD5: 21A8497522DE5B8B12067FCA910E0469)
    • hOe2JrpIAE.exe (PID: 1996 cmdline: "C:\Users\user\Desktop\hOe2JrpIAE.exe" MD5: 21A8497522DE5B8B12067FCA910E0469)
    • hOe2JrpIAE.exe (PID: 2796 cmdline: "C:\Users\user\Desktop\hOe2JrpIAE.exe" MD5: 21A8497522DE5B8B12067FCA910E0469)
      • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • netsh.exe (PID: 5712 cmdline: "C:\Windows\SysWOW64\netsh.exe" MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
          • cmd.exe (PID: 3580 cmdline: /c del "C:\Users\user\Desktop\hOe2JrpIAE.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 5504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.tires-book-robust.bond/cn26/"], "decoy": ["ajtsistemas.com", "kolotylo.info", "mraofficial.store", "shopcupsareus.com", "odishastatenews.in", "yipicircle.life", "bryve.shop", "tempotrekstore.com", "casinoslotsjoint.com", "xiaoshuoxyz.com", "art-birdsflyinghigh.com", "odvip438.com", "verlatservicios.com", "bilocoin.world", "lamaisonfacile.com", "guojiang-v37.xyz", "shsredgpoufnds.net", "thequorumcompany.com", "qf4h1tcpmgxor7b.skin", "daisyjoanniezu.cyou", "r41opxw1076r.shop", "scientificmetalscorp.co", "shopusuniform.com", "j0mui3.shop", "halqiuststone.com", "hasenkamp.dev", "549965.autos", "nadarrawellness.com", "31artspace.com", "americanidolizing.com", "vacaychateau.com", "c377b2xq.shop", "essere.love", "e2olyiab.shop", "skechersshoes-cz.com", "laurabodyboost.com", "laser-skin-treatment-19799.bond", "theburnscleanteam.com", "tiensbangladesh.net", "sothana.top", "hillingpowerhouse.com", "kingelecpos.com", "xn--y3rqw57i.com", "foton.africa", "emergencyresponsemd.com", "0pjke0.vip", "keepitkoming.shop", "lamyahkalimi.com", "dehamobilya.com", "pornerbros.top", "happyjumps.co", "pool-repair-35063.bond", "thepassionpact.shop", "elroi-mexico.com", "xztyvk.xyz", "origenworld.com", "licstarmfprabakar.com", "asfaua.com", "zenvip.club", "seo-andorra.com", "cgffwelcome.com", "sswpdx.com", "7jtsyx.pw", "australiangamesgroup.com"]}
SourceRuleDescriptionAuthorStrings
00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18849:$sqlite3step: 68 34 1C 7B E1
      • 0x1895c:$sqlite3step: 68 34 1C 7B E1
      • 0x18878:$sqlite3text: 68 38 2A 90 C5
      • 0x1899d:$sqlite3text: 68 38 2A 90 C5
      • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 29 entries
      SourceRuleDescriptionAuthorStrings
      0.2.hOe2JrpIAE.exe.3f99970.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0.2.hOe2JrpIAE.exe.7140000.12.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.hOe2JrpIAE.exe.5b50000.10.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 16 entries
                No Sigma rule has matched
                Timestamp:07/03/24-14:51:07.057746
                SID:2031412
                Source Port:49720
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:53:09.934739
                SID:2031412
                Source Port:49724
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:53:30.424657
                SID:2031412
                Source Port:49725
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:53:50.846445
                SID:2031412
                Source Port:49726
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:52:08.288538
                SID:2031412
                Source Port:49722
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:51:27.802913
                SID:2031412
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:52:28.804978
                SID:2031412
                Source Port:49723
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/03/24-14:50:47.686112
                SID:2031412
                Source Port:49719
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: hOe2JrpIAE.exeAvira: detected
                Source: http://www.tires-book-robust.bond/cn26/www.foton.africaAvira URL Cloud: Label: malware
                Source: http://www.tires-book-robust.bond/cn26/Avira URL Cloud: Label: malware
                Source: www.tires-book-robust.bond/cn26/Avira URL Cloud: Label: malware
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.tires-book-robust.bond/cn26/"], "decoy": ["ajtsistemas.com", "kolotylo.info", "mraofficial.store", "shopcupsareus.com", "odishastatenews.in", "yipicircle.life", "bryve.shop", "tempotrekstore.com", "casinoslotsjoint.com", "xiaoshuoxyz.com", "art-birdsflyinghigh.com", "odvip438.com", "verlatservicios.com", "bilocoin.world", "lamaisonfacile.com", "guojiang-v37.xyz", "shsredgpoufnds.net", "thequorumcompany.com", "qf4h1tcpmgxor7b.skin", "daisyjoanniezu.cyou", "r41opxw1076r.shop", "scientificmetalscorp.co", "shopusuniform.com", "j0mui3.shop", "halqiuststone.com", "hasenkamp.dev", "549965.autos", "nadarrawellness.com", "31artspace.com", "americanidolizing.com", "vacaychateau.com", "c377b2xq.shop", "essere.love", "e2olyiab.shop", "skechersshoes-cz.com", "laurabodyboost.com", "laser-skin-treatment-19799.bond", "theburnscleanteam.com", "tiensbangladesh.net", "sothana.top", "hillingpowerhouse.com", "kingelecpos.com", "xn--y3rqw57i.com", "foton.africa", "emergencyresponsemd.com", "0pjke0.vip", "keepitkoming.shop", "lamyahkalimi.com", "dehamobilya.com", "pornerbros.top", "happyjumps.co", "pool-repair-35063.bond", "thepassionpact.shop", "elroi-mexico.com", "xztyvk.xyz", "origenworld.com", "licstarmfprabakar.com", "asfaua.com", "zenvip.club", "seo-andorra.com", "cgffwelcome.com", "sswpdx.com", "7jtsyx.pw", "australiangamesgroup.com"]}
                Source: hOe2JrpIAE.exeReversingLabs: Detection: 68%
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: hOe2JrpIAE.exeJoe Sandbox ML: detected
                Source: hOe2JrpIAE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: hOe2JrpIAE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: XUhH.pdb source: hOe2JrpIAE.exe
                Source: Binary string: XUhH.pdbSHA256 source: hOe2JrpIAE.exe
                Source: Binary string: netsh.pdb source: hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B28000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2052100186.0000000001460000.00000040.10000000.00040000.00000000.sdmp, netsh.exe, netsh.exe, 00000008.00000002.4441556154.0000000001080000.00000040.80000000.00040000.00000000.sdmp
                Source: Binary string: netsh.pdbGCTL source: hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B28000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2052100186.0000000001460000.00000040.10000000.00040000.00000000.sdmp, netsh.exe, 00000008.00000002.4441556154.0000000001080000.00000040.80000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: hOe2JrpIAE.exe, 00000006.00000002.2051357395.0000000001110000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, 00000008.00000003.2052359711.0000000003AE9000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000003.2050482991.000000000393F000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003C90000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003E2E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: hOe2JrpIAE.exe, hOe2JrpIAE.exe, 00000006.00000002.2051357395.0000000001110000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, netsh.exe, 00000008.00000003.2052359711.0000000003AE9000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000003.2050482991.000000000393F000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003C90000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003E2E000.00000040.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 4x nop then pop edi6_2_00417D7F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 4x nop then pop edi6_2_00417DCA
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 4x nop then pop edi8_2_030C7D7F
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 4x nop then pop edi8_2_030C7DCA

                Networking

                barindex
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49719 -> 162.244.93.3:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49720 -> 199.59.243.226:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49721 -> 14.128.41.165:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49722 -> 34.149.87.45:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49723 -> 3.33.130.190:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49724 -> 52.60.87.163:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49725 -> 34.92.194.225:80
                Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49726 -> 3.33.130.190:80
                Source: C:\Windows\explorer.exeNetwork Connect: 199.59.243.226 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 162.244.93.3 80Jump to behavior
                Source: Malware configuration extractorURLs: www.tires-book-robust.bond/cn26/
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=CmFgnMATfu/lD1Rd1GHYmtbpicIpwpy90rRc4LoWjy4DICrpuFEBTKor21hYt8nWF2kM&Kr=YtxTb HTTP/1.1Host: www.tiensbangladesh.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=Wwa2UMOYo9JcJMQ5ME0Q+bO7/4aNL8yaSIJN/NKFPRQQ6eA3A90uIzxodQffq+AadB6M&Kr=YtxTb HTTP/1.1Host: www.shopusuniform.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=xh0AWH03uTuLb7lNYJWhmJpAztdjm7ZCIfIRc9jnByUCUf27hW5Mghto8D6CFT3eDifI&Kr=YtxTb HTTP/1.1Host: www.j0mui3.shopConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=vyOlf6d0gdkMF27YEBTjWR4sd91tQ6met0nuZUZfy4zFrLxX9BwP111ngtT6h4ZwTfCv&Kr=YtxTb HTTP/1.1Host: www.dehamobilya.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=pbSbn1rMiq1OPTP6ICdnvfWphahg9+3Gt5uoQw76hA6d6T1GJ+eKg+Q7XOnjWxnlol53&Kr=YtxTb HTTP/1.1Host: www.happyjumps.coConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=hM6dqt0bNRJ3wnqohXEckG+ra7BpyCFNN1yCjjYC1YEFAohibEIyfRXhhB3fmL/JtGSj&Kr=YtxTb HTTP/1.1Host: www.yipicircle.lifeConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: Joe Sandbox ViewIP Address: 199.59.243.226 199.59.243.226
                Source: Joe Sandbox ViewIP Address: 34.149.87.45 34.149.87.45
                Source: Joe Sandbox ViewIP Address: 34.149.87.45 34.149.87.45
                Source: Joe Sandbox ViewASN Name: BCPL-SGBGPNETGlobalASNSG BCPL-SGBGPNETGlobalASNSG
                Source: Joe Sandbox ViewASN Name: BODIS-NJUS BODIS-NJUS
                Source: Joe Sandbox ViewASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS
                Source: Joe Sandbox ViewASN Name: PONYNETUS PONYNETUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DAF82 getaddrinfo,setsockopt,recv,7_2_0E4DAF82
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=CmFgnMATfu/lD1Rd1GHYmtbpicIpwpy90rRc4LoWjy4DICrpuFEBTKor21hYt8nWF2kM&Kr=YtxTb HTTP/1.1Host: www.tiensbangladesh.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=Wwa2UMOYo9JcJMQ5ME0Q+bO7/4aNL8yaSIJN/NKFPRQQ6eA3A90uIzxodQffq+AadB6M&Kr=YtxTb HTTP/1.1Host: www.shopusuniform.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=xh0AWH03uTuLb7lNYJWhmJpAztdjm7ZCIfIRc9jnByUCUf27hW5Mghto8D6CFT3eDifI&Kr=YtxTb HTTP/1.1Host: www.j0mui3.shopConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=vyOlf6d0gdkMF27YEBTjWR4sd91tQ6met0nuZUZfy4zFrLxX9BwP111ngtT6h4ZwTfCv&Kr=YtxTb HTTP/1.1Host: www.dehamobilya.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=pbSbn1rMiq1OPTP6ICdnvfWphahg9+3Gt5uoQw76hA6d6T1GJ+eKg+Q7XOnjWxnlol53&Kr=YtxTb HTTP/1.1Host: www.happyjumps.coConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficHTTP traffic detected: GET /cn26/?V410V=hM6dqt0bNRJ3wnqohXEckG+ra7BpyCFNN1yCjjYC1YEFAohibEIyfRXhhB3fmL/JtGSj&Kr=YtxTb HTTP/1.1Host: www.yipicircle.lifeConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
                Source: global trafficDNS traffic detected: DNS query: www.theburnscleanteam.com
                Source: global trafficDNS traffic detected: DNS query: www.tiensbangladesh.net
                Source: global trafficDNS traffic detected: DNS query: www.shopusuniform.com
                Source: global trafficDNS traffic detected: DNS query: www.j0mui3.shop
                Source: global trafficDNS traffic detected: DNS query: www.cgffwelcome.com
                Source: global trafficDNS traffic detected: DNS query: www.dehamobilya.com
                Source: global trafficDNS traffic detected: DNS query: www.happyjumps.co
                Source: global trafficDNS traffic detected: DNS query: www.tires-book-robust.bond
                Source: global trafficDNS traffic detected: DNS query: www.foton.africa
                Source: global trafficDNS traffic detected: DNS query: www.e2olyiab.shop
                Source: global trafficDNS traffic detected: DNS query: www.yipicircle.life
                Source: global trafficDNS traffic detected: DNS query: www.tempotrekstore.com
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4446934807.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: hOe2JrpIAE.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: hOe2JrpIAE.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: explorer.exe, 00000007.00000000.2007072938.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4441584000.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4446934807.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4446934807.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: hOe2JrpIAE.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4446934807.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: explorer.exe, 00000007.00000002.4446934807.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                Source: explorer.exe, 00000007.00000000.2010237532.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000002.4446456942.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.2009741979.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                Source: hOe2JrpIAE.exeString found in binary or memory: http://tempuri.org/DataSet1.xsd
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ajtsistemas.com
                Source: explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ajtsistemas.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ajtsistemas.comReferer:
                Source: explorer.exe, 00000007.00000003.3777555916.000000000C8EB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.
                Source: explorer.exe, 00000007.00000000.2013207443.000000000C8DD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.A
                Source: explorer.exe, 00000007.00000003.3098535056.000000000C8DD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3096521466.000000000C8DD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.B
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cgffwelcome.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cgffwelcome.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cgffwelcome.com/cn26/www.dehamobilya.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cgffwelcome.comReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dehamobilya.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dehamobilya.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dehamobilya.com/cn26/www.happyjumps.co
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dehamobilya.comReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e2olyiab.shop
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e2olyiab.shop/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e2olyiab.shop/cn26/www.yipicircle.life
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e2olyiab.shopReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foton.africa
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foton.africa/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foton.africa/cn26/www.e2olyiab.shop
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foton.africaReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.happyjumps.co
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.happyjumps.co/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.happyjumps.co/cn26/www.tires-book-robust.bond
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.happyjumps.coReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.j0mui3.shop
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.j0mui3.shop/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.j0mui3.shop/cn26/www.cgffwelcome.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.j0mui3.shopReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.scientificmetalscorp.co
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.scientificmetalscorp.co/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.scientificmetalscorp.co/cn26/www.ajtsistemas.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.scientificmetalscorp.coReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shopusuniform.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shopusuniform.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shopusuniform.com/cn26/www.j0mui3.shop
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.shopusuniform.comReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sswpdx.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sswpdx.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sswpdx.com/cn26/www.scientificmetalscorp.co
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sswpdx.comReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tempotrekstore.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tempotrekstore.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tempotrekstore.com/cn26/www.xztyvk.xyz
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tempotrekstore.comReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.theburnscleanteam.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.theburnscleanteam.com/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.theburnscleanteam.com/cn26/www.tiensbangladesh.net
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.theburnscleanteam.comReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tiensbangladesh.net
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tiensbangladesh.net/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tiensbangladesh.net/cn26/www.shopusuniform.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tiensbangladesh.netReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tires-book-robust.bond
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tires-book-robust.bond/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tires-book-robust.bond/cn26/www.foton.africa
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tires-book-robust.bondReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xztyvk.xyz
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xztyvk.xyz/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xztyvk.xyz/cn26/www.sswpdx.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xztyvk.xyzReferer:
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yipicircle.life
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yipicircle.life/cn26/
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yipicircle.life/cn26/www.tempotrekstore.com
                Source: explorer.exe, 00000007.00000002.4452222485.000000000C9A7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3094033490.000000000C9A7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yipicircle.lifeReferer:
                Source: explorer.exe, 00000007.00000003.3098637821.000000000C513000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4451078883.000000000C514000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2012740355.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                Source: explorer.exe, 00000007.00000000.2009042834.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                Source: explorer.exe, 00000007.00000002.4444797028.0000000007637000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2009042834.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: explorer.exe, 00000007.00000003.3094915197.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2007823850.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4443539368.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
                Source: explorer.exe, 00000007.00000003.3099099836.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3096597969.0000000009B7A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4447710215.0000000009B81000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                Source: explorer.exe, 00000007.00000003.3777677954.0000000009C96000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3098080000.0000000009C92000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3096597969.0000000009B7A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4447809365.0000000009D42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                Source: explorer.exe, 00000007.00000000.2012740355.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4450786934.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                Source: explorer.exe, 00000007.00000002.4446934807.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
                Source: explorer.exe, 00000007.00000002.4446934807.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon
                Source: hOe2JrpIAE.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                Source: explorer.exe, 00000007.00000002.4453541198.0000000010E2F000.00000004.80000000.00040000.00000000.sdmp, netsh.exe, 00000008.00000002.4443371821.00000000046CF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: 00000007.00000002.4452293523.000000000E4F2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
                Source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
                Source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
                Source: Process Memory Space: hOe2JrpIAE.exe PID: 4952, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: Process Memory Space: hOe2JrpIAE.exe PID: 2796, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: Process Memory Space: netsh.exe PID: 5712, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041A360 NtCreateFile,6_2_0041A360
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041A410 NtReadFile,6_2_0041A410
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041A490 NtClose,6_2_0041A490
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041A540 NtAllocateVirtualMemory,6_2_0041A540
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041A40E NtReadFile,6_2_0041A40E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182B60 NtClose,LdrInitializeThunk,6_2_01182B60
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_01182BF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182AD0 NtReadFile,LdrInitializeThunk,6_2_01182AD0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182D10 NtMapViewOfSection,LdrInitializeThunk,6_2_01182D10
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_01182D30
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182DD0 NtDelayExecution,LdrInitializeThunk,6_2_01182DD0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_01182DF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_01182C70
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_01182CA0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182F30 NtCreateSection,LdrInitializeThunk,6_2_01182F30
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182F90 NtProtectVirtualMemory,LdrInitializeThunk,6_2_01182F90
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182FB0 NtResumeThread,LdrInitializeThunk,6_2_01182FB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182FE0 NtCreateFile,LdrInitializeThunk,6_2_01182FE0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_01182E80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,6_2_01182EA0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01184340 NtSetContextThread,6_2_01184340
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01184650 NtSuspendThread,6_2_01184650
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182B80 NtQueryInformationFile,6_2_01182B80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182BA0 NtEnumerateValueKey,6_2_01182BA0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182BE0 NtQueryValueKey,6_2_01182BE0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182AB0 NtWaitForSingleObject,6_2_01182AB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182AF0 NtWriteFile,6_2_01182AF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182D00 NtSetInformationFile,6_2_01182D00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182DB0 NtEnumerateKey,6_2_01182DB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182C00 NtQueryInformationProcess,6_2_01182C00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182C60 NtCreateKey,6_2_01182C60
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182CC0 NtQueryVirtualMemory,6_2_01182CC0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182CF0 NtOpenProcess,6_2_01182CF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182F60 NtCreateProcessEx,6_2_01182F60
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182FA0 NtQuerySection,6_2_01182FA0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182E30 NtWriteVirtualMemory,6_2_01182E30
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182EE0 NtQueueApcThread,6_2_01182EE0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01183010 NtOpenDirectoryObject,6_2_01183010
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01183090 NtSetValueKey,6_2_01183090
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011835C0 NtCreateMutant,6_2_011835C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011839B0 NtGetContextThread,6_2_011839B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01183D10 NtOpenProcessToken,6_2_01183D10
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01183D70 NtOpenThread,6_2_01183D70
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DBE12 NtProtectVirtualMemory,7_2_0E4DBE12
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DA232 NtCreateFile,7_2_0E4DA232
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DBE0A NtProtectVirtualMemory,7_2_0E4DBE0A
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02B60 NtClose,LdrInitializeThunk,8_2_03D02B60
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02AD0 NtReadFile,LdrInitializeThunk,8_2_03D02AD0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02FE0 NtCreateFile,LdrInitializeThunk,8_2_03D02FE0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02F30 NtCreateSection,LdrInitializeThunk,8_2_03D02F30
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,8_2_03D02EA0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02DD0 NtDelayExecution,LdrInitializeThunk,8_2_03D02DD0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02DF0 NtQuerySystemInformation,LdrInitializeThunk,8_2_03D02DF0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02D10 NtMapViewOfSection,LdrInitializeThunk,8_2_03D02D10
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02CA0 NtQueryInformationToken,LdrInitializeThunk,8_2_03D02CA0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02C70 NtFreeVirtualMemory,LdrInitializeThunk,8_2_03D02C70
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02C60 NtCreateKey,LdrInitializeThunk,8_2_03D02C60
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D035C0 NtCreateMutant,LdrInitializeThunk,8_2_03D035C0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D04340 NtSetContextThread,8_2_03D04340
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D04650 NtSuspendThread,8_2_03D04650
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02BF0 NtAllocateVirtualMemory,8_2_03D02BF0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02BE0 NtQueryValueKey,8_2_03D02BE0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02B80 NtQueryInformationFile,8_2_03D02B80
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02BA0 NtEnumerateValueKey,8_2_03D02BA0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02AF0 NtWriteFile,8_2_03D02AF0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02AB0 NtWaitForSingleObject,8_2_03D02AB0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02F90 NtProtectVirtualMemory,8_2_03D02F90
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02FB0 NtResumeThread,8_2_03D02FB0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02FA0 NtQuerySection,8_2_03D02FA0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02F60 NtCreateProcessEx,8_2_03D02F60
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02EE0 NtQueueApcThread,8_2_03D02EE0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02E80 NtReadVirtualMemory,8_2_03D02E80
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02E30 NtWriteVirtualMemory,8_2_03D02E30
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02DB0 NtEnumerateKey,8_2_03D02DB0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02D00 NtSetInformationFile,8_2_03D02D00
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02D30 NtUnmapViewOfSection,8_2_03D02D30
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02CC0 NtQueryVirtualMemory,8_2_03D02CC0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02CF0 NtOpenProcess,8_2_03D02CF0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D02C00 NtQueryInformationProcess,8_2_03D02C00
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D03090 NtSetValueKey,8_2_03D03090
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D03010 NtOpenDirectoryObject,8_2_03D03010
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D039B0 NtGetContextThread,8_2_03D039B0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D03D70 NtOpenThread,8_2_03D03D70
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D03D10 NtOpenProcessToken,8_2_03D03D10
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CA360 NtCreateFile,8_2_030CA360
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CA410 NtReadFile,8_2_030CA410
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CA490 NtClose,8_2_030CA490
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CA40E NtReadFile,8_2_030CA40E
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,8_2_03AD9BAF
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03ADA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,RtlQueueApcWow64Thread,NtResumeThread,8_2_03ADA036
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,8_2_03AD9BB2
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03ADA042 NtQueryInformationProcess,8_2_03ADA042
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_02F776880_2_02F77688
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_02F700400_2_02F70040
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_02F776780_2_02F77678
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_02F70A000_2_02F70A00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_02F709F00_2_02F709F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0502211C0_2_0502211C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_050200400_2_05020040
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_050200060_2_05020006
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055BA2300_2_055BA230
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055BE4600_2_055BE460
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055BA21F0_2_055BA21F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055B92C80_2_055B92C8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055B92B80_2_055B92B8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055BECD00_2_055BECD0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055BE8980_2_055BE898
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0725D6B80_2_0725D6B8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_072569B00_2_072569B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_072500370_2_07250037
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0725E0680_2_0725E068
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_072500400_2_07250040
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0725D0D00_2_0725D0D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0729BC280_2_0729BC28
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0729C0C80_2_0729C0C8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_07296A000_2_07296A00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_072900070_2_07290007
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_0729A8480_2_0729A848
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_072900400_2_07290040
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_004010306_2_00401030
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041E8916_2_0041E891
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041E1AF6_2_0041E1AF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_004012086_2_00401208
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041DBB66_2_0041DBB6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00402D876_2_00402D87
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00402D906_2_00402D90
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00409E5B6_2_00409E5B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00409E606_2_00409E60
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041DED86_2_0041DED8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041DFDF6_2_0041DFDF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041D78F6_2_0041D78F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00402FB06_2_00402FB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EA1186_2_011EA118
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011401006_2_01140100
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D81586_2_011D8158
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012041A26_2_012041A2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012101AA6_2_012101AA
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012081CC6_2_012081CC
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E20006_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120A3526_2_0120A352
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012103E66_2_012103E6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E3F06_2_0115E3F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F02746_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D02C06_2_011D02C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011505356_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012105916_2_01210591
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F44206_2_011F4420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012024466_2_01202446
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FE4F66_2_011FE4F6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011747506_2_01174750
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011507706_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114C7C06_2_0114C7C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116C6E06_2_0116C6E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011669626_2_01166962
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0121A9A66_2_0121A9A6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A06_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011528406_2_01152840
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115A8406_2_0115A840
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011368B86_2_011368B8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E8F06_2_0117E8F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120AB406_2_0120AB40
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01206BD76_2_01206BD7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA806_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011ECD1F6_2_011ECD1F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115AD006_2_0115AD00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01168DBF6_2_01168DBF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114ADE06_2_0114ADE0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150C006_2_01150C00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0CB56_2_011F0CB5
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140CF26_2_01140CF2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01170F306_2_01170F30
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F2F306_2_011F2F30
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01192F286_2_01192F28
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C4F406_2_011C4F40
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CEFA06_2_011CEFA0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01142FC86_2_01142FC8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115CFE06_2_0115CFE0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120EE266_2_0120EE26
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150E596_2_01150E59
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162E906_2_01162E90
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120CE936_2_0120CE93
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120EEDB6_2_0120EEDB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0121B16B6_2_0121B16B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113F1726_2_0113F172
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0118516C6_2_0118516C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115B1B06_2_0115B1B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120F0E06_2_0120F0E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012070E96_2_012070E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FF0CC6_2_011FF0CC
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011570C06_2_011570C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120132D6_2_0120132D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113D34C6_2_0113D34C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0119739A6_2_0119739A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011552A06_2_011552A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116B2C06_2_0116B2C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F12ED6_2_011F12ED
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012075716_2_01207571
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011ED5B06_2_011ED5B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012195C36_2_012195C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120F43F6_2_0120F43F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011414606_2_01141460
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120F7B06_2_0120F7B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011956306_2_01195630
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012016CC6_2_012016CC
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E59106_2_011E5910
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011599506_2_01159950
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116B9506_2_0116B950
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BD8006_2_011BD800
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011538E06_2_011538E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120FB766_2_0120FB76
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116FB806_2_0116FB80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0118DBF96_2_0118DBF9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C5BF06_2_011C5BF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01207A466_2_01207A46
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120FA496_2_0120FA49
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C3A6C6_2_011C3A6C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EDAAC6_2_011EDAAC
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01195AA06_2_01195AA0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F1AA36_2_011F1AA3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FDAC66_2_011FDAC6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01207D736_2_01207D73
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01153D406_2_01153D40
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01201D5A6_2_01201D5A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116FDC06_2_0116FDC0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C9C326_2_011C9C32
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120FCF26_2_0120FCF2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120FF096_2_0120FF09
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01151F926_2_01151F92
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120FFB16_2_0120FFB1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01159EB06_2_01159EB0
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DA2327_2_0E4DA232
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4D90367_2_0E4D9036
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4D00827_2_0E4D0082
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4D1D027_2_0E4D1D02
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4D79127_2_0E4D7912
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4D4B307_2_0E4D4B30
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4D4B327_2_0E4D4B32
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DD5CD7_2_0E4DD5CD
                Source: C:\Windows\explorer.exeCode function: 7_2_106160367_2_10616036
                Source: C:\Windows\explorer.exeCode function: 7_2_1060D0827_2_1060D082
                Source: C:\Windows\explorer.exeCode function: 7_2_1060ED027_2_1060ED02
                Source: C:\Windows\explorer.exeCode function: 7_2_106149127_2_10614912
                Source: C:\Windows\explorer.exeCode function: 7_2_1061A5CD7_2_1061A5CD
                Source: C:\Windows\explorer.exeCode function: 7_2_106172327_2_10617232
                Source: C:\Windows\explorer.exeCode function: 7_2_10611B307_2_10611B30
                Source: C:\Windows\explorer.exeCode function: 7_2_10611B327_2_10611B32
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01085EB08_2_01085EB0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CDE3F08_2_03CDE3F0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D903E68_2_03D903E6
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8A3528_2_03D8A352
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D502C08_2_03D502C0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D702748_2_03D70274
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D881CC8_2_03D881CC
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D901AA8_2_03D901AA
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D841A28_2_03D841A2
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D581588_2_03D58158
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CC01008_2_03CC0100
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D6A1188_2_03D6A118
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D620008_2_03D62000
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CCC7C08_2_03CCC7C0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CF47508_2_03CF4750
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD07708_2_03CD0770
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CEC6E08_2_03CEC6E0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D905918_2_03D90591
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD05358_2_03CD0535
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D7E4F68_2_03D7E4F6
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D824468_2_03D82446
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D744208_2_03D74420
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D86BD78_2_03D86BD7
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8AB408_2_03D8AB40
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CCEA808_2_03CCEA80
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD29A08_2_03CD29A0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D9A9A68_2_03D9A9A6
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CE69628_2_03CE6962
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CFE8F08_2_03CFE8F0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CB68B88_2_03CB68B8
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD28408_2_03CD2840
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CDA8408_2_03CDA840
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CC2FC88_2_03CC2FC8
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CDCFE08_2_03CDCFE0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D4EFA08_2_03D4EFA0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D44F408_2_03D44F40
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D72F308_2_03D72F30
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D12F288_2_03D12F28
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CF0F308_2_03CF0F30
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8EEDB8_2_03D8EEDB
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8CE938_2_03D8CE93
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CE2E908_2_03CE2E90
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD0E598_2_03CD0E59
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8EE268_2_03D8EE26
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CCADE08_2_03CCADE0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CE8DBF8_2_03CE8DBF
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D6CD1F8_2_03D6CD1F
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CDAD008_2_03CDAD00
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CC0CF28_2_03CC0CF2
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D70CB58_2_03D70CB5
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD0C008_2_03CD0C00
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D1739A8_2_03D1739A
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CBD34C8_2_03CBD34C
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8132D8_2_03D8132D
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CEB2C08_2_03CEB2C0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D712ED8_2_03D712ED
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD52A08_2_03CD52A0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CDB1B08_2_03CDB1B0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D9B16B8_2_03D9B16B
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CBF1728_2_03CBF172
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D0516C8_2_03D0516C
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD70C08_2_03CD70C0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D7F0CC8_2_03D7F0CC
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D870E98_2_03D870E9
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8F0E08_2_03D8F0E0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8F7B08_2_03D8F7B0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D816CC8_2_03D816CC
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D156308_2_03D15630
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D995C38_2_03D995C3
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D6D5B08_2_03D6D5B0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D875718_2_03D87571
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CC14608_2_03CC1460
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8F43F8_2_03D8F43F
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D45BF08_2_03D45BF0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D0DBF98_2_03D0DBF9
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CEFB808_2_03CEFB80
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8FB768_2_03D8FB76
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D7DAC68_2_03D7DAC6
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D15AA08_2_03D15AA0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D71AA38_2_03D71AA3
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D6DAAC8_2_03D6DAAC
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8FA498_2_03D8FA49
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D87A468_2_03D87A46
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D43A6C8_2_03D43A6C
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD99508_2_03CD9950
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CEB9508_2_03CEB950
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D659108_2_03D65910
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD38E08_2_03CD38E0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D3D8008_2_03D3D800
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03C93FD28_2_03C93FD2
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03C93FD58_2_03C93FD5
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD1F928_2_03CD1F92
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8FFB18_2_03D8FFB1
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8FF098_2_03D8FF09
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD9EB08_2_03CD9EB0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CEFDC08_2_03CEFDC0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D81D5A8_2_03D81D5A
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CD3D408_2_03CD3D40
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D87D738_2_03D87D73
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D8FCF28_2_03D8FCF2
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03D49C328_2_03D49C32
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CE1AD8_2_030CE1AD
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CD78F8_2_030CD78F
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CE8918_2_030CE891
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030B2FB08_2_030B2FB0
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030B9E5B8_2_030B9E5B
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030B9E608_2_030B9E60
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030B2D878_2_030B2D87
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030B2D908_2_030B2D90
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03ADA0368_2_03ADA036
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD5B308_2_03AD5B30
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD5B328_2_03AD5B32
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03ADB2328_2_03ADB232
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD89128_2_03AD8912
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD10828_2_03AD1082
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03ADE5CD8_2_03ADE5CD
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03AD2D028_2_03AD2D02
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: String function: 011BEA12 appears 86 times
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: String function: 01197E54 appears 111 times
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: String function: 0113B970 appears 280 times
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: String function: 011CF290 appears 105 times
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: String function: 01185130 appears 58 times
                Source: C:\Windows\SysWOW64\netsh.exeCode function: String function: 03D17E54 appears 111 times
                Source: C:\Windows\SysWOW64\netsh.exeCode function: String function: 03D3EA12 appears 86 times
                Source: C:\Windows\SysWOW64\netsh.exeCode function: String function: 03CBB970 appears 280 times
                Source: C:\Windows\SysWOW64\netsh.exeCode function: String function: 03D4F290 appears 105 times
                Source: C:\Windows\SysWOW64\netsh.exeCode function: String function: 03D05130 appears 58 times
                Source: hOe2JrpIAE.exeStatic PE information: invalid certificate
                Source: hOe2JrpIAE.exe, 00000000.00000002.2007654678.0000000007420000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000000.00000002.2004466042.00000000011AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000000.00000000.1983396250.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXUhH.exeX vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenetsh.exej% vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000006.00000002.2052100186.000000000147C000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamenetsh.exej% vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenetsh.exej% vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exe, 00000006.00000002.2051357395.000000000123D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exeBinary or memory string: OriginalFilenameXUhH.exeX vs hOe2JrpIAE.exe
                Source: hOe2JrpIAE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: 00000007.00000002.4452293523.000000000E4F2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
                Source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
                Source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
                Source: Process Memory Space: hOe2JrpIAE.exe PID: 4952, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: Process Memory Space: hOe2JrpIAE.exe PID: 2796, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: Process Memory Space: netsh.exe PID: 5712, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: hOe2JrpIAE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.hOe2JrpIAE.exe.7140000.12.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.7140000.12.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpack, OV.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpack, OV.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpack, OV.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpack, OV.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, jLW4CR6YqLFnTWAfMo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, jLW4CR6YqLFnTWAfMo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, XfJx19P9NihkSJyVVW.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, jLW4CR6YqLFnTWAfMo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.evad.winEXE@14/1@12/5
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01087F40 DisplayMessageM,FormatMessageW,GetLastError,GetStdHandle,LocalFree,8_2_01087F40
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01088D48 CoInitializeEx,CoCreateInstance,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysAllocString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysAllocString,SysAllocString,VariantChangeType,VariantChangeType,VariantChangeType,VariantChangeType,VariantChangeType,VariantChangeType,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,8_2_01088D48
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hOe2JrpIAE.exe.logJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5504:120:WilError_03
                Source: hOe2JrpIAE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: hOe2JrpIAE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: hOe2JrpIAE.exeReversingLabs: Detection: 68%
                Source: unknownProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\netsh.exe "C:\Windows\SysWOW64\netsh.exe"
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\hOe2JrpIAE.exe"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\netsh.exe "C:\Windows\SysWOW64\netsh.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: hOe2JrpIAE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: hOe2JrpIAE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: hOe2JrpIAE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: XUhH.pdb source: hOe2JrpIAE.exe
                Source: Binary string: XUhH.pdbSHA256 source: hOe2JrpIAE.exe
                Source: Binary string: netsh.pdb source: hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B28000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2052100186.0000000001460000.00000040.10000000.00040000.00000000.sdmp, netsh.exe, netsh.exe, 00000008.00000002.4441556154.0000000001080000.00000040.80000000.00040000.00000000.sdmp
                Source: Binary string: netsh.pdbGCTL source: hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2050799849.0000000000B28000.00000004.00000020.00020000.00000000.sdmp, hOe2JrpIAE.exe, 00000006.00000002.2052100186.0000000001460000.00000040.10000000.00040000.00000000.sdmp, netsh.exe, 00000008.00000002.4441556154.0000000001080000.00000040.80000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: hOe2JrpIAE.exe, 00000006.00000002.2051357395.0000000001110000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, 00000008.00000003.2052359711.0000000003AE9000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000003.2050482991.000000000393F000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003C90000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003E2E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: hOe2JrpIAE.exe, hOe2JrpIAE.exe, 00000006.00000002.2051357395.0000000001110000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, netsh.exe, 00000008.00000003.2052359711.0000000003AE9000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000003.2050482991.000000000393F000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003C90000.00000040.00001000.00020000.00000000.sdmp, netsh.exe, 00000008.00000002.4442793444.0000000003E2E000.00000040.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 0.2.hOe2JrpIAE.exe.7140000.12.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                Source: 0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpack, OV.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpack, OV.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                Source: hOe2JrpIAE.exe, Main_Panel.cs.Net Code: InitializeComponent
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, XfJx19P9NihkSJyVVW.cs.Net Code: UJfBj2UJXq System.Reflection.Assembly.Load(byte[])
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, XfJx19P9NihkSJyVVW.cs.Net Code: UJfBj2UJXq System.Reflection.Assembly.Load(byte[])
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, XfJx19P9NihkSJyVVW.cs.Net Code: UJfBj2UJXq System.Reflection.Assembly.Load(byte[])
                Source: 7.2.explorer.exe.1093f840.0.raw.unpack, Main_Panel.cs.Net Code: InitializeComponent
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_055BB678 pushad ; ret 0_2_055BB679
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_07253262 push es; iretd 0_2_07253265
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_07292B5F pushfd ; ret 0_2_07292B60
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_07292C15 pushfd ; ret 0_2_07292C17
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 0_2_072948D2 push 0000007Fh; ret 0_2_072948D4
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041406A push edx; ret 6_2_0041406F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00417B13 push ebp; iretd 6_2_00417B1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041B387 pushad ; ret 6_2_0041B388
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041D4B5 push eax; ret 6_2_0041D508
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041D56C push eax; ret 6_2_0041D572
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041D502 push eax; ret 6_2_0041D508
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041D50B push eax; ret 6_2_0041D572
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0041664B push ds; ret 6_2_00416661
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0111225F pushad ; ret 6_2_011127F9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011127FA pushad ; ret 6_2_011127F9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011409AD push ecx; mov dword ptr [esp], ecx6_2_011409B6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0111283D push eax; iretd 6_2_01112858
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DDB02 push esp; retn 0000h7_2_0E4DDB03
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DDB1E push esp; retn 0000h7_2_0E4DDB1F
                Source: C:\Windows\explorer.exeCode function: 7_2_0E4DD9B5 push esp; retn 0000h7_2_0E4DDAE7
                Source: C:\Windows\explorer.exeCode function: 7_2_1061A9B5 push esp; retn 0000h7_2_1061AAE7
                Source: C:\Windows\explorer.exeCode function: 7_2_1061AB02 push esp; retn 0000h7_2_1061AB03
                Source: C:\Windows\explorer.exeCode function: 7_2_1061AB1E push esp; retn 0000h7_2_1061AB1F
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01089C4D push ecx; ret 8_2_01089C60
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03C9225F pushad ; ret 8_2_03C927F9
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03C927FA pushad ; ret 8_2_03C927F9
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03CC09AD push ecx; mov dword ptr [esp], ecx8_2_03CC09B6
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_03C9283D push eax; iretd 8_2_03C92858
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030CB387 pushad ; ret 8_2_030CB388
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030C406A push edx; ret 8_2_030C406F
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_030C664B push ds; ret 8_2_030C6661
                Source: hOe2JrpIAE.exeStatic PE information: section name: .text entropy: 7.965298829702422
                Source: 0.2.hOe2JrpIAE.exe.7140000.12.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                Source: 0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpack, OV.csHigh entropy of concatenated method names: 'eX9', 'RgtTUJcyZL', 'XXu', 'IXK', 'qX0', 'zXZ', 'Uvdq5j', 'yw', 'Os', 'Bx'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, gSYEfxJ3mWb53dtiApw.csHigh entropy of concatenated method names: 'Yi3HoWc5L7', 'r4XHUHDJSP', 'OCjHjmxt6E', 'jTRkjZWzA6RG2Z8YBNX', 'FNltarn0koU4d8iyLEu', 'VBlBq1n1PBx2faSGeLU'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, uWJe8fBUSmndOswZA9.csHigh entropy of concatenated method names: 'IglJlLW4CR', 'nqLJPFnTWA', 'fyuJhiRNre', 'lCvJwe7qUP', 'wU0JAMmgsd', 'K3QJfKGuj3', 'KoCcECBZbTQFG09ROB', 'ggS0MwriqKgLuSaCQX', 'b5MJJAU2rL', 'Lq0Jy14gi8'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, GpOKynzXxAx0mhsKjJ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lo4iYF5Gr6', 'CyXiAMdekV', 'fMviftxHZH', 'OTZib6UQSO', 'lqUiaU7jBL', 'ofJiiQlIXy', 'PV4iHIwKKn'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, jKBZbCDWTWf77lE54J.csHigh entropy of concatenated method names: 'YWmY6nvWtR', 'yvGYsZ5XYn', 'XbRYglkFsZ', 'gR9YI75Rpc', 'XEdYTXyBum', 'wwMYKJU4bN', 'Vb2Y8GJ88Y', 'TQjYdbA5pg', 'Y6eYGFKX45', 'phmYXEKLgq'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, w6kQefL8m0YoHQx3Me.csHigh entropy of concatenated method names: 'ToString', 'cU2fXCgBu3', 'QJlfIcgSyk', 'mnyfC2D76n', 'EjEfT3p2Q7', 'MfofKGos0v', 'lPhfnVUx35', 'pQpf8Kjduc', 'dfyfd7iX9L', 'Ll4f55UNYM'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, fqUPcmS4qlWLbVU0Mm.csHigh entropy of concatenated method names: 'cDE0F3qC3P', 'NL40ZtDNKF', 'RKfMC2O34L', 'vtAMT36ij8', 'tyAMKkLlJj', 'rsTMn4WvFc', 'xmBM8SZlu2', 'ENDMdod0eJ', 'XAXM5pY8ff', 'p0HMGsDObd'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, tUoopq5N8vkUC0wdsi.csHigh entropy of concatenated method names: 'nPAloudTWJ', 'kNtlUvUHB0', 'LTcljXJTtb', 'moMlx4h0U0', 'PqulFH69XZ', 'ylTlqrkmGA', 'pDTlZsJPSw', 'CCil6PBqqT', 'iMYlskPYU2', 'IQ1lSGm1Rd'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, mP2gWpWeNb4y9k4ghF.csHigh entropy of concatenated method names: 'Lqcb4Weao1', 't7Rb1nA39L', 'FQPaOmtoRD', 'z6uaJygZYm', 'e52bXdmmLy', 'JMMbRaUDkF', 'ygdbDxgZPJ', 'rWrbmHfpUt', 'Ealbu5si5R', 'umqbLrMxcK'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, Jjt1fo1sfRiO1974xp.csHigh entropy of concatenated method names: 'keAiJin9yY', 'OOuiy4B4nv', 'vnQiBYrNCv', 'Hj8i7CNVn5', 'OjoiQajaQc', 'fNTi0b2ZCW', 'gcJieMYmt5', 'ausatg3rjJ', 'e0Wa4FmkHL', 'iMja2cZDsh'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, T7ThVMJytj6r8Jm6bx6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gCbHmo6YXb', 'o8ZHucpJvn', 'TgfHLoEYvk', 'KdyH93xOqQ', 'tvhHNFbBfZ', 'WRiHWMdHy8', 'IdrHt9sO0X'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, RRfZn892i9PnkChBY8.csHigh entropy of concatenated method names: 'nembhc0aKy', 'vIAbwclyve', 'ToString', 'jQSb7T7jdD', 'bSbbQEl9FS', 'LxabMOHm3g', 'egnb0m7uF8', 'vqrbeDGfuF', 'yBrblpnjTE', 'FE1bPRtDih'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, pHJXoU8MHljljU27Z9.csHigh entropy of concatenated method names: 'jbRl7yHeS0', 'k2glMA81bF', 'dd3levqyjQ', 'bCFe1wPfbx', 'SSgezYlK52', 'SQnlOg5fjI', 'cHelJ5Gb1G', 'wxQl3wO8fU', 'h1Wly8dMPh', 'on5lBvfR8W'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, fG424W48tRQhx3CopQ.csHigh entropy of concatenated method names: 'XuUa7bTd4o', 'QFfaQMuHb5', 'j4CaMXJ7NJ', 'Wcua0b1dPT', 'bV2aeWuwOO', 'KOLalDGogP', 'cvUaPa9wG0', 'VlRav2mFv4', 'Y8tah1hhon', 'iwMawX0yUI'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, TRDyijQaiyiZRTkxOq.csHigh entropy of concatenated method names: 'Dispose', 'TkXJ2q4hop', 'Dnh3IGPHGX', 'TI4QQOteaK', 'p7GJ1424W8', 'WRQJzhx3Co', 'ProcessDialogKey', 'tQw3Ox1Pfh', 'YWu3J3GVp1', 'kSa33njt1f'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, Gsdn3QgKGuj3ABI1L9.csHigh entropy of concatenated method names: 'DdPecURHqM', 'BsDeQkeXBS', 'EB3e0X8Q5X', 'jlqel3WmDx', 'ziXePyu7m4', 'TkM0N5vpQC', 'uGe0WgM04k', 'y0y0tgJJNM', 'AOk04Bolp2', 'KrE02Trj8H'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, XfJx19P9NihkSJyVVW.csHigh entropy of concatenated method names: 'sXNycHJeF9', 'Tpdy7deA27', 'RLsyQ0M60C', 'RE0yMOdeDG', 'DE6y01QY5O', 'RpPyeEBPuI', 'fknyl4wsUS', 'E01yPoo7ag', 'xZIyvOmdra', 'w0tyhPv7y8'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, Qri0x7syuiRNrevCve.csHigh entropy of concatenated method names: 'J2aMxA0UM1', 'B6yMqDFdni', 'tpDM6tDVFl', 'mPSMshdccI', 'O34MAEKjqo', 'pQlMfKV6d4', 'AeHMborSHI', 'QrBMa4nAIt', 'dsbMi07RYD', 'xwLMHakJkF'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, tvOcrl3eIFMEK0gRcO.csHigh entropy of concatenated method names: 'abDj7cM5m', 'QdRxgAyi3', 'iLcqIiUb0', 'RTiZrfX2K', 'Qr6sxfsTp', 'cEoSXov0g', 'v8LZH9gJx5Gh7UvxH2', 'fxsGkOEmfZHALJnd6I', 'pXqNLXqPx37goTvdSS', 'JTPaPMS0i'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, rsRPv9JO8iJZ0C7ddKS.csHigh entropy of concatenated method names: 'aH3iogLVuU', 'HgjiUF1F2A', 'LuqijFmNcF', 'G6mixOE7A8', 'AeWiFvfy80', 'S8piqOQUeA', 'of2iZGnsqX', 'lkei6TIX6N', 'L1QisGbI1H', 'dGriSa8to2'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, vHjLiUmOYvJOUgmPGm.csHigh entropy of concatenated method names: 'GTnAGAiMDn', 'UmAARElWjW', 'm4NAm78BOR', 'rSUAuxnVQQ', 'XPLAIs8dFR', 'tb8ACN10DV', 'T7FATXVx5U', 'oGUAKObAGc', 'hixAn2YyXP', 'wyLA8C05xJ'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, jLW4CR6YqLFnTWAfMo.csHigh entropy of concatenated method names: 'rwqQmtdjy9', 'PUiQu6Ub38', 'sfdQLvdlAZ', 'VI7Q96X73F', 'kqMQNE0nGR', 'wOnQWByQFZ', 'L0gQtC2B6n', 'BkAQ4aW7D7', 'TqHQ2flayW', 'l0nQ1YQ7wv'
                Source: 0.2.hOe2JrpIAE.exe.7420000.13.raw.unpack, nx1Pfh21Wu3GVp1PSa.csHigh entropy of concatenated method names: 'OiWagDlWZd', 'DD8aIfaMm5', 'wHFaCyPw2v', 'wUnaTk55yD', 'tTjamCRrNc', 'UDnaKlsyO6', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpack, OV.csHigh entropy of concatenated method names: 'eX9', 'RgtTUJcyZL', 'XXu', 'IXK', 'qX0', 'zXZ', 'Uvdq5j', 'yw', 'Os', 'Bx'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, gSYEfxJ3mWb53dtiApw.csHigh entropy of concatenated method names: 'Yi3HoWc5L7', 'r4XHUHDJSP', 'OCjHjmxt6E', 'jTRkjZWzA6RG2Z8YBNX', 'FNltarn0koU4d8iyLEu', 'VBlBq1n1PBx2faSGeLU'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, uWJe8fBUSmndOswZA9.csHigh entropy of concatenated method names: 'IglJlLW4CR', 'nqLJPFnTWA', 'fyuJhiRNre', 'lCvJwe7qUP', 'wU0JAMmgsd', 'K3QJfKGuj3', 'KoCcECBZbTQFG09ROB', 'ggS0MwriqKgLuSaCQX', 'b5MJJAU2rL', 'Lq0Jy14gi8'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, GpOKynzXxAx0mhsKjJ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lo4iYF5Gr6', 'CyXiAMdekV', 'fMviftxHZH', 'OTZib6UQSO', 'lqUiaU7jBL', 'ofJiiQlIXy', 'PV4iHIwKKn'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, jKBZbCDWTWf77lE54J.csHigh entropy of concatenated method names: 'YWmY6nvWtR', 'yvGYsZ5XYn', 'XbRYglkFsZ', 'gR9YI75Rpc', 'XEdYTXyBum', 'wwMYKJU4bN', 'Vb2Y8GJ88Y', 'TQjYdbA5pg', 'Y6eYGFKX45', 'phmYXEKLgq'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, w6kQefL8m0YoHQx3Me.csHigh entropy of concatenated method names: 'ToString', 'cU2fXCgBu3', 'QJlfIcgSyk', 'mnyfC2D76n', 'EjEfT3p2Q7', 'MfofKGos0v', 'lPhfnVUx35', 'pQpf8Kjduc', 'dfyfd7iX9L', 'Ll4f55UNYM'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, fqUPcmS4qlWLbVU0Mm.csHigh entropy of concatenated method names: 'cDE0F3qC3P', 'NL40ZtDNKF', 'RKfMC2O34L', 'vtAMT36ij8', 'tyAMKkLlJj', 'rsTMn4WvFc', 'xmBM8SZlu2', 'ENDMdod0eJ', 'XAXM5pY8ff', 'p0HMGsDObd'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, tUoopq5N8vkUC0wdsi.csHigh entropy of concatenated method names: 'nPAloudTWJ', 'kNtlUvUHB0', 'LTcljXJTtb', 'moMlx4h0U0', 'PqulFH69XZ', 'ylTlqrkmGA', 'pDTlZsJPSw', 'CCil6PBqqT', 'iMYlskPYU2', 'IQ1lSGm1Rd'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, mP2gWpWeNb4y9k4ghF.csHigh entropy of concatenated method names: 'Lqcb4Weao1', 't7Rb1nA39L', 'FQPaOmtoRD', 'z6uaJygZYm', 'e52bXdmmLy', 'JMMbRaUDkF', 'ygdbDxgZPJ', 'rWrbmHfpUt', 'Ealbu5si5R', 'umqbLrMxcK'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, Jjt1fo1sfRiO1974xp.csHigh entropy of concatenated method names: 'keAiJin9yY', 'OOuiy4B4nv', 'vnQiBYrNCv', 'Hj8i7CNVn5', 'OjoiQajaQc', 'fNTi0b2ZCW', 'gcJieMYmt5', 'ausatg3rjJ', 'e0Wa4FmkHL', 'iMja2cZDsh'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, T7ThVMJytj6r8Jm6bx6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gCbHmo6YXb', 'o8ZHucpJvn', 'TgfHLoEYvk', 'KdyH93xOqQ', 'tvhHNFbBfZ', 'WRiHWMdHy8', 'IdrHt9sO0X'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, RRfZn892i9PnkChBY8.csHigh entropy of concatenated method names: 'nembhc0aKy', 'vIAbwclyve', 'ToString', 'jQSb7T7jdD', 'bSbbQEl9FS', 'LxabMOHm3g', 'egnb0m7uF8', 'vqrbeDGfuF', 'yBrblpnjTE', 'FE1bPRtDih'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, pHJXoU8MHljljU27Z9.csHigh entropy of concatenated method names: 'jbRl7yHeS0', 'k2glMA81bF', 'dd3levqyjQ', 'bCFe1wPfbx', 'SSgezYlK52', 'SQnlOg5fjI', 'cHelJ5Gb1G', 'wxQl3wO8fU', 'h1Wly8dMPh', 'on5lBvfR8W'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, fG424W48tRQhx3CopQ.csHigh entropy of concatenated method names: 'XuUa7bTd4o', 'QFfaQMuHb5', 'j4CaMXJ7NJ', 'Wcua0b1dPT', 'bV2aeWuwOO', 'KOLalDGogP', 'cvUaPa9wG0', 'VlRav2mFv4', 'Y8tah1hhon', 'iwMawX0yUI'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, TRDyijQaiyiZRTkxOq.csHigh entropy of concatenated method names: 'Dispose', 'TkXJ2q4hop', 'Dnh3IGPHGX', 'TI4QQOteaK', 'p7GJ1424W8', 'WRQJzhx3Co', 'ProcessDialogKey', 'tQw3Ox1Pfh', 'YWu3J3GVp1', 'kSa33njt1f'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, Gsdn3QgKGuj3ABI1L9.csHigh entropy of concatenated method names: 'DdPecURHqM', 'BsDeQkeXBS', 'EB3e0X8Q5X', 'jlqel3WmDx', 'ziXePyu7m4', 'TkM0N5vpQC', 'uGe0WgM04k', 'y0y0tgJJNM', 'AOk04Bolp2', 'KrE02Trj8H'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, XfJx19P9NihkSJyVVW.csHigh entropy of concatenated method names: 'sXNycHJeF9', 'Tpdy7deA27', 'RLsyQ0M60C', 'RE0yMOdeDG', 'DE6y01QY5O', 'RpPyeEBPuI', 'fknyl4wsUS', 'E01yPoo7ag', 'xZIyvOmdra', 'w0tyhPv7y8'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, Qri0x7syuiRNrevCve.csHigh entropy of concatenated method names: 'J2aMxA0UM1', 'B6yMqDFdni', 'tpDM6tDVFl', 'mPSMshdccI', 'O34MAEKjqo', 'pQlMfKV6d4', 'AeHMborSHI', 'QrBMa4nAIt', 'dsbMi07RYD', 'xwLMHakJkF'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, tvOcrl3eIFMEK0gRcO.csHigh entropy of concatenated method names: 'abDj7cM5m', 'QdRxgAyi3', 'iLcqIiUb0', 'RTiZrfX2K', 'Qr6sxfsTp', 'cEoSXov0g', 'v8LZH9gJx5Gh7UvxH2', 'fxsGkOEmfZHALJnd6I', 'pXqNLXqPx37goTvdSS', 'JTPaPMS0i'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, rsRPv9JO8iJZ0C7ddKS.csHigh entropy of concatenated method names: 'aH3iogLVuU', 'HgjiUF1F2A', 'LuqijFmNcF', 'G6mixOE7A8', 'AeWiFvfy80', 'S8piqOQUeA', 'of2iZGnsqX', 'lkei6TIX6N', 'L1QisGbI1H', 'dGriSa8to2'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, vHjLiUmOYvJOUgmPGm.csHigh entropy of concatenated method names: 'GTnAGAiMDn', 'UmAARElWjW', 'm4NAm78BOR', 'rSUAuxnVQQ', 'XPLAIs8dFR', 'tb8ACN10DV', 'T7FATXVx5U', 'oGUAKObAGc', 'hixAn2YyXP', 'wyLA8C05xJ'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, jLW4CR6YqLFnTWAfMo.csHigh entropy of concatenated method names: 'rwqQmtdjy9', 'PUiQu6Ub38', 'sfdQLvdlAZ', 'VI7Q96X73F', 'kqMQNE0nGR', 'wOnQWByQFZ', 'L0gQtC2B6n', 'BkAQ4aW7D7', 'TqHQ2flayW', 'l0nQ1YQ7wv'
                Source: 0.2.hOe2JrpIAE.exe.435c150.8.raw.unpack, nx1Pfh21Wu3GVp1PSa.csHigh entropy of concatenated method names: 'OiWagDlWZd', 'DD8aIfaMm5', 'wHFaCyPw2v', 'wUnaTk55yD', 'tTjamCRrNc', 'UDnaKlsyO6', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, gSYEfxJ3mWb53dtiApw.csHigh entropy of concatenated method names: 'Yi3HoWc5L7', 'r4XHUHDJSP', 'OCjHjmxt6E', 'jTRkjZWzA6RG2Z8YBNX', 'FNltarn0koU4d8iyLEu', 'VBlBq1n1PBx2faSGeLU'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, uWJe8fBUSmndOswZA9.csHigh entropy of concatenated method names: 'IglJlLW4CR', 'nqLJPFnTWA', 'fyuJhiRNre', 'lCvJwe7qUP', 'wU0JAMmgsd', 'K3QJfKGuj3', 'KoCcECBZbTQFG09ROB', 'ggS0MwriqKgLuSaCQX', 'b5MJJAU2rL', 'Lq0Jy14gi8'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, GpOKynzXxAx0mhsKjJ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lo4iYF5Gr6', 'CyXiAMdekV', 'fMviftxHZH', 'OTZib6UQSO', 'lqUiaU7jBL', 'ofJiiQlIXy', 'PV4iHIwKKn'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, jKBZbCDWTWf77lE54J.csHigh entropy of concatenated method names: 'YWmY6nvWtR', 'yvGYsZ5XYn', 'XbRYglkFsZ', 'gR9YI75Rpc', 'XEdYTXyBum', 'wwMYKJU4bN', 'Vb2Y8GJ88Y', 'TQjYdbA5pg', 'Y6eYGFKX45', 'phmYXEKLgq'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, w6kQefL8m0YoHQx3Me.csHigh entropy of concatenated method names: 'ToString', 'cU2fXCgBu3', 'QJlfIcgSyk', 'mnyfC2D76n', 'EjEfT3p2Q7', 'MfofKGos0v', 'lPhfnVUx35', 'pQpf8Kjduc', 'dfyfd7iX9L', 'Ll4f55UNYM'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, fqUPcmS4qlWLbVU0Mm.csHigh entropy of concatenated method names: 'cDE0F3qC3P', 'NL40ZtDNKF', 'RKfMC2O34L', 'vtAMT36ij8', 'tyAMKkLlJj', 'rsTMn4WvFc', 'xmBM8SZlu2', 'ENDMdod0eJ', 'XAXM5pY8ff', 'p0HMGsDObd'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, tUoopq5N8vkUC0wdsi.csHigh entropy of concatenated method names: 'nPAloudTWJ', 'kNtlUvUHB0', 'LTcljXJTtb', 'moMlx4h0U0', 'PqulFH69XZ', 'ylTlqrkmGA', 'pDTlZsJPSw', 'CCil6PBqqT', 'iMYlskPYU2', 'IQ1lSGm1Rd'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, mP2gWpWeNb4y9k4ghF.csHigh entropy of concatenated method names: 'Lqcb4Weao1', 't7Rb1nA39L', 'FQPaOmtoRD', 'z6uaJygZYm', 'e52bXdmmLy', 'JMMbRaUDkF', 'ygdbDxgZPJ', 'rWrbmHfpUt', 'Ealbu5si5R', 'umqbLrMxcK'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, Jjt1fo1sfRiO1974xp.csHigh entropy of concatenated method names: 'keAiJin9yY', 'OOuiy4B4nv', 'vnQiBYrNCv', 'Hj8i7CNVn5', 'OjoiQajaQc', 'fNTi0b2ZCW', 'gcJieMYmt5', 'ausatg3rjJ', 'e0Wa4FmkHL', 'iMja2cZDsh'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, T7ThVMJytj6r8Jm6bx6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gCbHmo6YXb', 'o8ZHucpJvn', 'TgfHLoEYvk', 'KdyH93xOqQ', 'tvhHNFbBfZ', 'WRiHWMdHy8', 'IdrHt9sO0X'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, RRfZn892i9PnkChBY8.csHigh entropy of concatenated method names: 'nembhc0aKy', 'vIAbwclyve', 'ToString', 'jQSb7T7jdD', 'bSbbQEl9FS', 'LxabMOHm3g', 'egnb0m7uF8', 'vqrbeDGfuF', 'yBrblpnjTE', 'FE1bPRtDih'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, pHJXoU8MHljljU27Z9.csHigh entropy of concatenated method names: 'jbRl7yHeS0', 'k2glMA81bF', 'dd3levqyjQ', 'bCFe1wPfbx', 'SSgezYlK52', 'SQnlOg5fjI', 'cHelJ5Gb1G', 'wxQl3wO8fU', 'h1Wly8dMPh', 'on5lBvfR8W'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, fG424W48tRQhx3CopQ.csHigh entropy of concatenated method names: 'XuUa7bTd4o', 'QFfaQMuHb5', 'j4CaMXJ7NJ', 'Wcua0b1dPT', 'bV2aeWuwOO', 'KOLalDGogP', 'cvUaPa9wG0', 'VlRav2mFv4', 'Y8tah1hhon', 'iwMawX0yUI'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, TRDyijQaiyiZRTkxOq.csHigh entropy of concatenated method names: 'Dispose', 'TkXJ2q4hop', 'Dnh3IGPHGX', 'TI4QQOteaK', 'p7GJ1424W8', 'WRQJzhx3Co', 'ProcessDialogKey', 'tQw3Ox1Pfh', 'YWu3J3GVp1', 'kSa33njt1f'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, Gsdn3QgKGuj3ABI1L9.csHigh entropy of concatenated method names: 'DdPecURHqM', 'BsDeQkeXBS', 'EB3e0X8Q5X', 'jlqel3WmDx', 'ziXePyu7m4', 'TkM0N5vpQC', 'uGe0WgM04k', 'y0y0tgJJNM', 'AOk04Bolp2', 'KrE02Trj8H'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, XfJx19P9NihkSJyVVW.csHigh entropy of concatenated method names: 'sXNycHJeF9', 'Tpdy7deA27', 'RLsyQ0M60C', 'RE0yMOdeDG', 'DE6y01QY5O', 'RpPyeEBPuI', 'fknyl4wsUS', 'E01yPoo7ag', 'xZIyvOmdra', 'w0tyhPv7y8'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, Qri0x7syuiRNrevCve.csHigh entropy of concatenated method names: 'J2aMxA0UM1', 'B6yMqDFdni', 'tpDM6tDVFl', 'mPSMshdccI', 'O34MAEKjqo', 'pQlMfKV6d4', 'AeHMborSHI', 'QrBMa4nAIt', 'dsbMi07RYD', 'xwLMHakJkF'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, tvOcrl3eIFMEK0gRcO.csHigh entropy of concatenated method names: 'abDj7cM5m', 'QdRxgAyi3', 'iLcqIiUb0', 'RTiZrfX2K', 'Qr6sxfsTp', 'cEoSXov0g', 'v8LZH9gJx5Gh7UvxH2', 'fxsGkOEmfZHALJnd6I', 'pXqNLXqPx37goTvdSS', 'JTPaPMS0i'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, rsRPv9JO8iJZ0C7ddKS.csHigh entropy of concatenated method names: 'aH3iogLVuU', 'HgjiUF1F2A', 'LuqijFmNcF', 'G6mixOE7A8', 'AeWiFvfy80', 'S8piqOQUeA', 'of2iZGnsqX', 'lkei6TIX6N', 'L1QisGbI1H', 'dGriSa8to2'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, vHjLiUmOYvJOUgmPGm.csHigh entropy of concatenated method names: 'GTnAGAiMDn', 'UmAARElWjW', 'm4NAm78BOR', 'rSUAuxnVQQ', 'XPLAIs8dFR', 'tb8ACN10DV', 'T7FATXVx5U', 'oGUAKObAGc', 'hixAn2YyXP', 'wyLA8C05xJ'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, jLW4CR6YqLFnTWAfMo.csHigh entropy of concatenated method names: 'rwqQmtdjy9', 'PUiQu6Ub38', 'sfdQLvdlAZ', 'VI7Q96X73F', 'kqMQNE0nGR', 'wOnQWByQFZ', 'L0gQtC2B6n', 'BkAQ4aW7D7', 'TqHQ2flayW', 'l0nQ1YQ7wv'
                Source: 0.2.hOe2JrpIAE.exe.42ec130.9.raw.unpack, nx1Pfh21Wu3GVp1PSa.csHigh entropy of concatenated method names: 'OiWagDlWZd', 'DD8aIfaMm5', 'wHFaCyPw2v', 'wUnaTk55yD', 'tTjamCRrNc', 'UDnaKlsyO6', 'Next', 'Next', 'Next', 'NextBytes'
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI/Special instruction interceptor: Address: 7FF8C88F0774
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI/Special instruction interceptor: Address: 7FF8C88ED8A4
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88F0774
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88ED8A4
                Source: C:\Windows\SysWOW64\netsh.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeRDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
                Source: C:\Windows\SysWOW64\netsh.exeRDTSC instruction interceptor: First address: 30B9904 second address: 30B990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
                Source: C:\Windows\SysWOW64\netsh.exeRDTSC instruction interceptor: First address: 30B9B7E second address: 30B9B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 13E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 2F90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 4F90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 7C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 8C20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 8ED0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: 9ED0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00409AB0 rdtsc 6_2_00409AB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3135Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 6805Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 882Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 868Jump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeWindow / User API: threadDelayed 9799Jump to behavior
                Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_7-13934
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeAPI coverage: 1.6 %
                Source: C:\Windows\SysWOW64\netsh.exeAPI coverage: 1.4 %
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exe TID: 3748Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 1968Thread sleep count: 3135 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1968Thread sleep time: -6270000s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 1968Thread sleep count: 6805 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1968Thread sleep time: -13610000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exe TID: 4524Thread sleep count: 172 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\netsh.exe TID: 4524Thread sleep time: -344000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exe TID: 4524Thread sleep count: 9799 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\netsh.exe TID: 4524Thread sleep time: -19598000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\netsh.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: explorer.exe, 00000007.00000002.4447809365.0000000009C96000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
                Source: explorer.exe, 00000007.00000002.4444797028.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
                Source: explorer.exe, 00000007.00000000.2010640411.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4446934807.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
                Source: explorer.exe, 00000007.00000002.4447710215.0000000009B81000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                Source: explorer.exe, 00000007.00000003.3777482422.0000000009B72000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
                Source: explorer.exe, 00000007.00000002.4447809365.0000000009C96000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
                Source: explorer.exe, 00000007.00000003.3094915197.0000000003549000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                Source: explorer.exe, 00000007.00000002.4447809365.0000000009C96000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                Source: explorer.exe, 00000007.00000002.4441584000.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
                Source: explorer.exe, 00000007.00000003.3094915197.0000000003549000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
                Source: explorer.exe, 00000007.00000002.4444797028.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
                Source: explorer.exe, 00000007.00000000.2010640411.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4446934807.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: explorer.exe, 00000007.00000003.3094915197.0000000003549000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
                Source: explorer.exe, 00000007.00000003.3094915197.0000000003549000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
                Source: explorer.exe, 00000007.00000002.4447710215.0000000009B81000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
                Source: explorer.exe, 00000007.00000002.4447809365.0000000009C96000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
                Source: explorer.exe, 00000007.00000002.4441584000.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                Source: explorer.exe, 00000007.00000002.4446934807.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000007.00000000.2009042834.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_00409AB0 rdtsc 6_2_00409AB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0040ACF0 LdrLoadDll,6_2_0040ACF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EA118 mov ecx, dword ptr fs:[00000030h]6_2_011EA118
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EA118 mov eax, dword ptr fs:[00000030h]6_2_011EA118
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EA118 mov eax, dword ptr fs:[00000030h]6_2_011EA118
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EA118 mov eax, dword ptr fs:[00000030h]6_2_011EA118
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov eax, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov ecx, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov eax, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov eax, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov ecx, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov eax, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov eax, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov ecx, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov eax, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE10E mov ecx, dword ptr fs:[00000030h]6_2_011EE10E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01170124 mov eax, dword ptr fs:[00000030h]6_2_01170124
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01200115 mov eax, dword ptr fs:[00000030h]6_2_01200115
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146154 mov eax, dword ptr fs:[00000030h]6_2_01146154
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146154 mov eax, dword ptr fs:[00000030h]6_2_01146154
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113C156 mov eax, dword ptr fs:[00000030h]6_2_0113C156
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D8158 mov eax, dword ptr fs:[00000030h]6_2_011D8158
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214164 mov eax, dword ptr fs:[00000030h]6_2_01214164
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214164 mov eax, dword ptr fs:[00000030h]6_2_01214164
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D4144 mov eax, dword ptr fs:[00000030h]6_2_011D4144
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D4144 mov eax, dword ptr fs:[00000030h]6_2_011D4144
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D4144 mov ecx, dword ptr fs:[00000030h]6_2_011D4144
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D4144 mov eax, dword ptr fs:[00000030h]6_2_011D4144
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D4144 mov eax, dword ptr fs:[00000030h]6_2_011D4144
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C019F mov eax, dword ptr fs:[00000030h]6_2_011C019F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C019F mov eax, dword ptr fs:[00000030h]6_2_011C019F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C019F mov eax, dword ptr fs:[00000030h]6_2_011C019F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C019F mov eax, dword ptr fs:[00000030h]6_2_011C019F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113A197 mov eax, dword ptr fs:[00000030h]6_2_0113A197
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113A197 mov eax, dword ptr fs:[00000030h]6_2_0113A197
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113A197 mov eax, dword ptr fs:[00000030h]6_2_0113A197
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FC188 mov eax, dword ptr fs:[00000030h]6_2_011FC188
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FC188 mov eax, dword ptr fs:[00000030h]6_2_011FC188
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01180185 mov eax, dword ptr fs:[00000030h]6_2_01180185
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E4180 mov eax, dword ptr fs:[00000030h]6_2_011E4180
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E4180 mov eax, dword ptr fs:[00000030h]6_2_011E4180
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012161E5 mov eax, dword ptr fs:[00000030h]6_2_012161E5
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE1D0 mov eax, dword ptr fs:[00000030h]6_2_011BE1D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE1D0 mov eax, dword ptr fs:[00000030h]6_2_011BE1D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE1D0 mov ecx, dword ptr fs:[00000030h]6_2_011BE1D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE1D0 mov eax, dword ptr fs:[00000030h]6_2_011BE1D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE1D0 mov eax, dword ptr fs:[00000030h]6_2_011BE1D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012061C3 mov eax, dword ptr fs:[00000030h]6_2_012061C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012061C3 mov eax, dword ptr fs:[00000030h]6_2_012061C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011701F8 mov eax, dword ptr fs:[00000030h]6_2_011701F8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E016 mov eax, dword ptr fs:[00000030h]6_2_0115E016
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E016 mov eax, dword ptr fs:[00000030h]6_2_0115E016
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E016 mov eax, dword ptr fs:[00000030h]6_2_0115E016
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E016 mov eax, dword ptr fs:[00000030h]6_2_0115E016
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C4000 mov ecx, dword ptr fs:[00000030h]6_2_011C4000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E2000 mov eax, dword ptr fs:[00000030h]6_2_011E2000
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D6030 mov eax, dword ptr fs:[00000030h]6_2_011D6030
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113A020 mov eax, dword ptr fs:[00000030h]6_2_0113A020
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113C020 mov eax, dword ptr fs:[00000030h]6_2_0113C020
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01142050 mov eax, dword ptr fs:[00000030h]6_2_01142050
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6050 mov eax, dword ptr fs:[00000030h]6_2_011C6050
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116C073 mov eax, dword ptr fs:[00000030h]6_2_0116C073
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012060B8 mov eax, dword ptr fs:[00000030h]6_2_012060B8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012060B8 mov ecx, dword ptr fs:[00000030h]6_2_012060B8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114208A mov eax, dword ptr fs:[00000030h]6_2_0114208A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011380A0 mov eax, dword ptr fs:[00000030h]6_2_011380A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D80A8 mov eax, dword ptr fs:[00000030h]6_2_011D80A8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C20DE mov eax, dword ptr fs:[00000030h]6_2_011C20DE
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113C0F0 mov eax, dword ptr fs:[00000030h]6_2_0113C0F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011820F0 mov ecx, dword ptr fs:[00000030h]6_2_011820F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113A0E3 mov ecx, dword ptr fs:[00000030h]6_2_0113A0E3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C60E0 mov eax, dword ptr fs:[00000030h]6_2_011C60E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011480E9 mov eax, dword ptr fs:[00000030h]6_2_011480E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113C310 mov ecx, dword ptr fs:[00000030h]6_2_0113C310
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01218324 mov eax, dword ptr fs:[00000030h]6_2_01218324
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01218324 mov ecx, dword ptr fs:[00000030h]6_2_01218324
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01218324 mov eax, dword ptr fs:[00000030h]6_2_01218324
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01218324 mov eax, dword ptr fs:[00000030h]6_2_01218324
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01160310 mov ecx, dword ptr fs:[00000030h]6_2_01160310
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A30B mov eax, dword ptr fs:[00000030h]6_2_0117A30B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A30B mov eax, dword ptr fs:[00000030h]6_2_0117A30B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A30B mov eax, dword ptr fs:[00000030h]6_2_0117A30B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C035C mov eax, dword ptr fs:[00000030h]6_2_011C035C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C035C mov eax, dword ptr fs:[00000030h]6_2_011C035C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C035C mov eax, dword ptr fs:[00000030h]6_2_011C035C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C035C mov ecx, dword ptr fs:[00000030h]6_2_011C035C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C035C mov eax, dword ptr fs:[00000030h]6_2_011C035C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C035C mov eax, dword ptr fs:[00000030h]6_2_011C035C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E8350 mov ecx, dword ptr fs:[00000030h]6_2_011E8350
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C2349 mov eax, dword ptr fs:[00000030h]6_2_011C2349
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E437C mov eax, dword ptr fs:[00000030h]6_2_011E437C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0121634F mov eax, dword ptr fs:[00000030h]6_2_0121634F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120A352 mov eax, dword ptr fs:[00000030h]6_2_0120A352
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01138397 mov eax, dword ptr fs:[00000030h]6_2_01138397
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01138397 mov eax, dword ptr fs:[00000030h]6_2_01138397
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01138397 mov eax, dword ptr fs:[00000030h]6_2_01138397
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116438F mov eax, dword ptr fs:[00000030h]6_2_0116438F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116438F mov eax, dword ptr fs:[00000030h]6_2_0116438F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113E388 mov eax, dword ptr fs:[00000030h]6_2_0113E388
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113E388 mov eax, dword ptr fs:[00000030h]6_2_0113E388
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113E388 mov eax, dword ptr fs:[00000030h]6_2_0113E388
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE3DB mov eax, dword ptr fs:[00000030h]6_2_011EE3DB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE3DB mov eax, dword ptr fs:[00000030h]6_2_011EE3DB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE3DB mov ecx, dword ptr fs:[00000030h]6_2_011EE3DB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EE3DB mov eax, dword ptr fs:[00000030h]6_2_011EE3DB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E43D4 mov eax, dword ptr fs:[00000030h]6_2_011E43D4
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E43D4 mov eax, dword ptr fs:[00000030h]6_2_011E43D4
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FC3CD mov eax, dword ptr fs:[00000030h]6_2_011FC3CD
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A3C0 mov eax, dword ptr fs:[00000030h]6_2_0114A3C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A3C0 mov eax, dword ptr fs:[00000030h]6_2_0114A3C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A3C0 mov eax, dword ptr fs:[00000030h]6_2_0114A3C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A3C0 mov eax, dword ptr fs:[00000030h]6_2_0114A3C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A3C0 mov eax, dword ptr fs:[00000030h]6_2_0114A3C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A3C0 mov eax, dword ptr fs:[00000030h]6_2_0114A3C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011483C0 mov eax, dword ptr fs:[00000030h]6_2_011483C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011483C0 mov eax, dword ptr fs:[00000030h]6_2_011483C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011483C0 mov eax, dword ptr fs:[00000030h]6_2_011483C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011483C0 mov eax, dword ptr fs:[00000030h]6_2_011483C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C63C0 mov eax, dword ptr fs:[00000030h]6_2_011C63C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E3F0 mov eax, dword ptr fs:[00000030h]6_2_0115E3F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E3F0 mov eax, dword ptr fs:[00000030h]6_2_0115E3F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E3F0 mov eax, dword ptr fs:[00000030h]6_2_0115E3F0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011763FF mov eax, dword ptr fs:[00000030h]6_2_011763FF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011503E9 mov eax, dword ptr fs:[00000030h]6_2_011503E9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113823B mov eax, dword ptr fs:[00000030h]6_2_0113823B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113A250 mov eax, dword ptr fs:[00000030h]6_2_0113A250
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146259 mov eax, dword ptr fs:[00000030h]6_2_01146259
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FA250 mov eax, dword ptr fs:[00000030h]6_2_011FA250
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FA250 mov eax, dword ptr fs:[00000030h]6_2_011FA250
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C8243 mov eax, dword ptr fs:[00000030h]6_2_011C8243
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C8243 mov ecx, dword ptr fs:[00000030h]6_2_011C8243
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F0274 mov eax, dword ptr fs:[00000030h]6_2_011F0274
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144260 mov eax, dword ptr fs:[00000030h]6_2_01144260
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144260 mov eax, dword ptr fs:[00000030h]6_2_01144260
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144260 mov eax, dword ptr fs:[00000030h]6_2_01144260
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113826B mov eax, dword ptr fs:[00000030h]6_2_0113826B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0121625D mov eax, dword ptr fs:[00000030h]6_2_0121625D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E284 mov eax, dword ptr fs:[00000030h]6_2_0117E284
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E284 mov eax, dword ptr fs:[00000030h]6_2_0117E284
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C0283 mov eax, dword ptr fs:[00000030h]6_2_011C0283
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C0283 mov eax, dword ptr fs:[00000030h]6_2_011C0283
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C0283 mov eax, dword ptr fs:[00000030h]6_2_011C0283
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011502A0 mov eax, dword ptr fs:[00000030h]6_2_011502A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011502A0 mov eax, dword ptr fs:[00000030h]6_2_011502A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D62A0 mov eax, dword ptr fs:[00000030h]6_2_011D62A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D62A0 mov ecx, dword ptr fs:[00000030h]6_2_011D62A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D62A0 mov eax, dword ptr fs:[00000030h]6_2_011D62A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D62A0 mov eax, dword ptr fs:[00000030h]6_2_011D62A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D62A0 mov eax, dword ptr fs:[00000030h]6_2_011D62A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D62A0 mov eax, dword ptr fs:[00000030h]6_2_011D62A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A2C3 mov eax, dword ptr fs:[00000030h]6_2_0114A2C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A2C3 mov eax, dword ptr fs:[00000030h]6_2_0114A2C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A2C3 mov eax, dword ptr fs:[00000030h]6_2_0114A2C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A2C3 mov eax, dword ptr fs:[00000030h]6_2_0114A2C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A2C3 mov eax, dword ptr fs:[00000030h]6_2_0114A2C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011502E1 mov eax, dword ptr fs:[00000030h]6_2_011502E1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011502E1 mov eax, dword ptr fs:[00000030h]6_2_011502E1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011502E1 mov eax, dword ptr fs:[00000030h]6_2_011502E1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012162D6 mov eax, dword ptr fs:[00000030h]6_2_012162D6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D6500 mov eax, dword ptr fs:[00000030h]6_2_011D6500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150535 mov eax, dword ptr fs:[00000030h]6_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150535 mov eax, dword ptr fs:[00000030h]6_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150535 mov eax, dword ptr fs:[00000030h]6_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150535 mov eax, dword ptr fs:[00000030h]6_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150535 mov eax, dword ptr fs:[00000030h]6_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150535 mov eax, dword ptr fs:[00000030h]6_2_01150535
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214500 mov eax, dword ptr fs:[00000030h]6_2_01214500
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E53E mov eax, dword ptr fs:[00000030h]6_2_0116E53E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E53E mov eax, dword ptr fs:[00000030h]6_2_0116E53E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E53E mov eax, dword ptr fs:[00000030h]6_2_0116E53E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E53E mov eax, dword ptr fs:[00000030h]6_2_0116E53E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E53E mov eax, dword ptr fs:[00000030h]6_2_0116E53E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01148550 mov eax, dword ptr fs:[00000030h]6_2_01148550
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01148550 mov eax, dword ptr fs:[00000030h]6_2_01148550
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117656A mov eax, dword ptr fs:[00000030h]6_2_0117656A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117656A mov eax, dword ptr fs:[00000030h]6_2_0117656A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117656A mov eax, dword ptr fs:[00000030h]6_2_0117656A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E59C mov eax, dword ptr fs:[00000030h]6_2_0117E59C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01142582 mov eax, dword ptr fs:[00000030h]6_2_01142582
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01142582 mov ecx, dword ptr fs:[00000030h]6_2_01142582
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01174588 mov eax, dword ptr fs:[00000030h]6_2_01174588
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011645B1 mov eax, dword ptr fs:[00000030h]6_2_011645B1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011645B1 mov eax, dword ptr fs:[00000030h]6_2_011645B1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C05A7 mov eax, dword ptr fs:[00000030h]6_2_011C05A7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C05A7 mov eax, dword ptr fs:[00000030h]6_2_011C05A7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C05A7 mov eax, dword ptr fs:[00000030h]6_2_011C05A7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011465D0 mov eax, dword ptr fs:[00000030h]6_2_011465D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A5D0 mov eax, dword ptr fs:[00000030h]6_2_0117A5D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A5D0 mov eax, dword ptr fs:[00000030h]6_2_0117A5D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E5CF mov eax, dword ptr fs:[00000030h]6_2_0117E5CF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E5CF mov eax, dword ptr fs:[00000030h]6_2_0117E5CF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E5E7 mov eax, dword ptr fs:[00000030h]6_2_0116E5E7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011425E0 mov eax, dword ptr fs:[00000030h]6_2_011425E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C5ED mov eax, dword ptr fs:[00000030h]6_2_0117C5ED
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C5ED mov eax, dword ptr fs:[00000030h]6_2_0117C5ED
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01178402 mov eax, dword ptr fs:[00000030h]6_2_01178402
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01178402 mov eax, dword ptr fs:[00000030h]6_2_01178402
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01178402 mov eax, dword ptr fs:[00000030h]6_2_01178402
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A430 mov eax, dword ptr fs:[00000030h]6_2_0117A430
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113E420 mov eax, dword ptr fs:[00000030h]6_2_0113E420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113E420 mov eax, dword ptr fs:[00000030h]6_2_0113E420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113E420 mov eax, dword ptr fs:[00000030h]6_2_0113E420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113C427 mov eax, dword ptr fs:[00000030h]6_2_0113C427
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C6420 mov eax, dword ptr fs:[00000030h]6_2_011C6420
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FA456 mov eax, dword ptr fs:[00000030h]6_2_011FA456
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116245A mov eax, dword ptr fs:[00000030h]6_2_0116245A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113645D mov eax, dword ptr fs:[00000030h]6_2_0113645D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117E443 mov eax, dword ptr fs:[00000030h]6_2_0117E443
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116A470 mov eax, dword ptr fs:[00000030h]6_2_0116A470
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116A470 mov eax, dword ptr fs:[00000030h]6_2_0116A470
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116A470 mov eax, dword ptr fs:[00000030h]6_2_0116A470
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CC460 mov ecx, dword ptr fs:[00000030h]6_2_011CC460
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011FA49A mov eax, dword ptr fs:[00000030h]6_2_011FA49A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011744B0 mov ecx, dword ptr fs:[00000030h]6_2_011744B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CA4B0 mov eax, dword ptr fs:[00000030h]6_2_011CA4B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011464AB mov eax, dword ptr fs:[00000030h]6_2_011464AB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011404E5 mov ecx, dword ptr fs:[00000030h]6_2_011404E5
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140710 mov eax, dword ptr fs:[00000030h]6_2_01140710
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01170710 mov eax, dword ptr fs:[00000030h]6_2_01170710
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C700 mov eax, dword ptr fs:[00000030h]6_2_0117C700
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117273C mov eax, dword ptr fs:[00000030h]6_2_0117273C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117273C mov ecx, dword ptr fs:[00000030h]6_2_0117273C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117273C mov eax, dword ptr fs:[00000030h]6_2_0117273C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BC730 mov eax, dword ptr fs:[00000030h]6_2_011BC730
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C720 mov eax, dword ptr fs:[00000030h]6_2_0117C720
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C720 mov eax, dword ptr fs:[00000030h]6_2_0117C720
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CE75D mov eax, dword ptr fs:[00000030h]6_2_011CE75D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140750 mov eax, dword ptr fs:[00000030h]6_2_01140750
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182750 mov eax, dword ptr fs:[00000030h]6_2_01182750
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182750 mov eax, dword ptr fs:[00000030h]6_2_01182750
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C4755 mov eax, dword ptr fs:[00000030h]6_2_011C4755
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117674D mov esi, dword ptr fs:[00000030h]6_2_0117674D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117674D mov eax, dword ptr fs:[00000030h]6_2_0117674D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117674D mov eax, dword ptr fs:[00000030h]6_2_0117674D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01148770 mov eax, dword ptr fs:[00000030h]6_2_01148770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150770 mov eax, dword ptr fs:[00000030h]6_2_01150770
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E678E mov eax, dword ptr fs:[00000030h]6_2_011E678E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011407AF mov eax, dword ptr fs:[00000030h]6_2_011407AF
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F47A0 mov eax, dword ptr fs:[00000030h]6_2_011F47A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114C7C0 mov eax, dword ptr fs:[00000030h]6_2_0114C7C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C07C3 mov eax, dword ptr fs:[00000030h]6_2_011C07C3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011447FB mov eax, dword ptr fs:[00000030h]6_2_011447FB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011447FB mov eax, dword ptr fs:[00000030h]6_2_011447FB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011627ED mov eax, dword ptr fs:[00000030h]6_2_011627ED
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011627ED mov eax, dword ptr fs:[00000030h]6_2_011627ED
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011627ED mov eax, dword ptr fs:[00000030h]6_2_011627ED
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CE7E1 mov eax, dword ptr fs:[00000030h]6_2_011CE7E1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01182619 mov eax, dword ptr fs:[00000030h]6_2_01182619
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE609 mov eax, dword ptr fs:[00000030h]6_2_011BE609
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115260B mov eax, dword ptr fs:[00000030h]6_2_0115260B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115E627 mov eax, dword ptr fs:[00000030h]6_2_0115E627
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01176620 mov eax, dword ptr fs:[00000030h]6_2_01176620
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01178620 mov eax, dword ptr fs:[00000030h]6_2_01178620
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114262C mov eax, dword ptr fs:[00000030h]6_2_0114262C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120866E mov eax, dword ptr fs:[00000030h]6_2_0120866E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120866E mov eax, dword ptr fs:[00000030h]6_2_0120866E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0115C640 mov eax, dword ptr fs:[00000030h]6_2_0115C640
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01172674 mov eax, dword ptr fs:[00000030h]6_2_01172674
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A660 mov eax, dword ptr fs:[00000030h]6_2_0117A660
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A660 mov eax, dword ptr fs:[00000030h]6_2_0117A660
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144690 mov eax, dword ptr fs:[00000030h]6_2_01144690
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144690 mov eax, dword ptr fs:[00000030h]6_2_01144690
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011766B0 mov eax, dword ptr fs:[00000030h]6_2_011766B0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C6A6 mov eax, dword ptr fs:[00000030h]6_2_0117C6A6
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A6C7 mov ebx, dword ptr fs:[00000030h]6_2_0117A6C7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A6C7 mov eax, dword ptr fs:[00000030h]6_2_0117A6C7
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE6F2 mov eax, dword ptr fs:[00000030h]6_2_011BE6F2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE6F2 mov eax, dword ptr fs:[00000030h]6_2_011BE6F2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE6F2 mov eax, dword ptr fs:[00000030h]6_2_011BE6F2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE6F2 mov eax, dword ptr fs:[00000030h]6_2_011BE6F2
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C06F1 mov eax, dword ptr fs:[00000030h]6_2_011C06F1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C06F1 mov eax, dword ptr fs:[00000030h]6_2_011C06F1
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01138918 mov eax, dword ptr fs:[00000030h]6_2_01138918
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01138918 mov eax, dword ptr fs:[00000030h]6_2_01138918
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CC912 mov eax, dword ptr fs:[00000030h]6_2_011CC912
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE908 mov eax, dword ptr fs:[00000030h]6_2_011BE908
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BE908 mov eax, dword ptr fs:[00000030h]6_2_011BE908
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C892A mov eax, dword ptr fs:[00000030h]6_2_011C892A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D892B mov eax, dword ptr fs:[00000030h]6_2_011D892B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C0946 mov eax, dword ptr fs:[00000030h]6_2_011C0946
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CC97C mov eax, dword ptr fs:[00000030h]6_2_011CC97C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214940 mov eax, dword ptr fs:[00000030h]6_2_01214940
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E4978 mov eax, dword ptr fs:[00000030h]6_2_011E4978
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E4978 mov eax, dword ptr fs:[00000030h]6_2_011E4978
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01166962 mov eax, dword ptr fs:[00000030h]6_2_01166962
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01166962 mov eax, dword ptr fs:[00000030h]6_2_01166962
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01166962 mov eax, dword ptr fs:[00000030h]6_2_01166962
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0118096E mov eax, dword ptr fs:[00000030h]6_2_0118096E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0118096E mov edx, dword ptr fs:[00000030h]6_2_0118096E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0118096E mov eax, dword ptr fs:[00000030h]6_2_0118096E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C89B3 mov esi, dword ptr fs:[00000030h]6_2_011C89B3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C89B3 mov eax, dword ptr fs:[00000030h]6_2_011C89B3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011C89B3 mov eax, dword ptr fs:[00000030h]6_2_011C89B3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011529A0 mov eax, dword ptr fs:[00000030h]6_2_011529A0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011409AD mov eax, dword ptr fs:[00000030h]6_2_011409AD
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011409AD mov eax, dword ptr fs:[00000030h]6_2_011409AD
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A9D0 mov eax, dword ptr fs:[00000030h]6_2_0114A9D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A9D0 mov eax, dword ptr fs:[00000030h]6_2_0114A9D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A9D0 mov eax, dword ptr fs:[00000030h]6_2_0114A9D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A9D0 mov eax, dword ptr fs:[00000030h]6_2_0114A9D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A9D0 mov eax, dword ptr fs:[00000030h]6_2_0114A9D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114A9D0 mov eax, dword ptr fs:[00000030h]6_2_0114A9D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011749D0 mov eax, dword ptr fs:[00000030h]6_2_011749D0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D69C0 mov eax, dword ptr fs:[00000030h]6_2_011D69C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011729F9 mov eax, dword ptr fs:[00000030h]6_2_011729F9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011729F9 mov eax, dword ptr fs:[00000030h]6_2_011729F9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120A9D3 mov eax, dword ptr fs:[00000030h]6_2_0120A9D3
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CE9E0 mov eax, dword ptr fs:[00000030h]6_2_011CE9E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CC810 mov eax, dword ptr fs:[00000030h]6_2_011CC810
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162835 mov eax, dword ptr fs:[00000030h]6_2_01162835
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162835 mov eax, dword ptr fs:[00000030h]6_2_01162835
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162835 mov eax, dword ptr fs:[00000030h]6_2_01162835
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162835 mov ecx, dword ptr fs:[00000030h]6_2_01162835
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162835 mov eax, dword ptr fs:[00000030h]6_2_01162835
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01162835 mov eax, dword ptr fs:[00000030h]6_2_01162835
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E483A mov eax, dword ptr fs:[00000030h]6_2_011E483A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E483A mov eax, dword ptr fs:[00000030h]6_2_011E483A
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117A830 mov eax, dword ptr fs:[00000030h]6_2_0117A830
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01170854 mov eax, dword ptr fs:[00000030h]6_2_01170854
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144859 mov eax, dword ptr fs:[00000030h]6_2_01144859
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01144859 mov eax, dword ptr fs:[00000030h]6_2_01144859
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01152840 mov ecx, dword ptr fs:[00000030h]6_2_01152840
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D6870 mov eax, dword ptr fs:[00000030h]6_2_011D6870
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D6870 mov eax, dword ptr fs:[00000030h]6_2_011D6870
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CE872 mov eax, dword ptr fs:[00000030h]6_2_011CE872
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CE872 mov eax, dword ptr fs:[00000030h]6_2_011CE872
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CC89D mov eax, dword ptr fs:[00000030h]6_2_011CC89D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140887 mov eax, dword ptr fs:[00000030h]6_2_01140887
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120A8E4 mov eax, dword ptr fs:[00000030h]6_2_0120A8E4
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116E8C0 mov eax, dword ptr fs:[00000030h]6_2_0116E8C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_012108C0 mov eax, dword ptr fs:[00000030h]6_2_012108C0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C8F9 mov eax, dword ptr fs:[00000030h]6_2_0117C8F9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117C8F9 mov eax, dword ptr fs:[00000030h]6_2_0117C8F9
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BEB1D mov eax, dword ptr fs:[00000030h]6_2_011BEB1D
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01208B28 mov eax, dword ptr fs:[00000030h]6_2_01208B28
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01208B28 mov eax, dword ptr fs:[00000030h]6_2_01208B28
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214B00 mov eax, dword ptr fs:[00000030h]6_2_01214B00
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116EB20 mov eax, dword ptr fs:[00000030h]6_2_0116EB20
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116EB20 mov eax, dword ptr fs:[00000030h]6_2_0116EB20
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01138B50 mov eax, dword ptr fs:[00000030h]6_2_01138B50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EEB50 mov eax, dword ptr fs:[00000030h]6_2_011EEB50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F4B4B mov eax, dword ptr fs:[00000030h]6_2_011F4B4B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F4B4B mov eax, dword ptr fs:[00000030h]6_2_011F4B4B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011E8B42 mov eax, dword ptr fs:[00000030h]6_2_011E8B42
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D6B40 mov eax, dword ptr fs:[00000030h]6_2_011D6B40
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011D6B40 mov eax, dword ptr fs:[00000030h]6_2_011D6B40
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0120AB40 mov eax, dword ptr fs:[00000030h]6_2_0120AB40
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0113CB7E mov eax, dword ptr fs:[00000030h]6_2_0113CB7E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01212B57 mov eax, dword ptr fs:[00000030h]6_2_01212B57
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01212B57 mov eax, dword ptr fs:[00000030h]6_2_01212B57
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01212B57 mov eax, dword ptr fs:[00000030h]6_2_01212B57
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01212B57 mov eax, dword ptr fs:[00000030h]6_2_01212B57
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150BBE mov eax, dword ptr fs:[00000030h]6_2_01150BBE
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150BBE mov eax, dword ptr fs:[00000030h]6_2_01150BBE
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F4BB0 mov eax, dword ptr fs:[00000030h]6_2_011F4BB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011F4BB0 mov eax, dword ptr fs:[00000030h]6_2_011F4BB0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EEBD0 mov eax, dword ptr fs:[00000030h]6_2_011EEBD0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140BCD mov eax, dword ptr fs:[00000030h]6_2_01140BCD
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140BCD mov eax, dword ptr fs:[00000030h]6_2_01140BCD
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01140BCD mov eax, dword ptr fs:[00000030h]6_2_01140BCD
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01160BCB mov eax, dword ptr fs:[00000030h]6_2_01160BCB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01160BCB mov eax, dword ptr fs:[00000030h]6_2_01160BCB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01160BCB mov eax, dword ptr fs:[00000030h]6_2_01160BCB
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01148BF0 mov eax, dword ptr fs:[00000030h]6_2_01148BF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01148BF0 mov eax, dword ptr fs:[00000030h]6_2_01148BF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01148BF0 mov eax, dword ptr fs:[00000030h]6_2_01148BF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116EBFC mov eax, dword ptr fs:[00000030h]6_2_0116EBFC
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CCBF0 mov eax, dword ptr fs:[00000030h]6_2_011CCBF0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011CCA11 mov eax, dword ptr fs:[00000030h]6_2_011CCA11
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01164A35 mov eax, dword ptr fs:[00000030h]6_2_01164A35
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01164A35 mov eax, dword ptr fs:[00000030h]6_2_01164A35
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117CA38 mov eax, dword ptr fs:[00000030h]6_2_0117CA38
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117CA24 mov eax, dword ptr fs:[00000030h]6_2_0117CA24
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0116EA2E mov eax, dword ptr fs:[00000030h]6_2_0116EA2E
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01146A50 mov eax, dword ptr fs:[00000030h]6_2_01146A50
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150A5B mov eax, dword ptr fs:[00000030h]6_2_01150A5B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01150A5B mov eax, dword ptr fs:[00000030h]6_2_01150A5B
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BCA72 mov eax, dword ptr fs:[00000030h]6_2_011BCA72
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011BCA72 mov eax, dword ptr fs:[00000030h]6_2_011BCA72
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117CA6F mov eax, dword ptr fs:[00000030h]6_2_0117CA6F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117CA6F mov eax, dword ptr fs:[00000030h]6_2_0117CA6F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0117CA6F mov eax, dword ptr fs:[00000030h]6_2_0117CA6F
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_011EEA60 mov eax, dword ptr fs:[00000030h]6_2_011EEA60
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01178A90 mov edx, dword ptr fs:[00000030h]6_2_01178A90
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_0114EA80 mov eax, dword ptr fs:[00000030h]6_2_0114EA80
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeCode function: 6_2_01214A80 mov eax, dword ptr fs:[00000030h]6_2_01214A80
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01083A08 _wcsicmp,_wcsicmp,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,_wcsupr,GetProcessHeap,HeapFree,8_2_01083A08
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01089930 SetUnhandledExceptionFilter,8_2_01089930
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_010896E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_010896E0
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 199.59.243.226 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 162.244.93.3 80Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeNtClose: Indirect: 0xB0A56C
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeNtQueueApcThread: Indirect: 0xB0A4F2Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeMemory written: C:\Users\user\Desktop\hOe2JrpIAE.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: NULL target: C:\Windows\SysWOW64\netsh.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection loaded: NULL target: C:\Windows\SysWOW64\netsh.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeThread register set: target process: 1028Jump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeThread register set: target process: 1028Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeSection unmapped: C:\Windows\SysWOW64\netsh.exe base address: 1080000Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeProcess created: C:\Users\user\Desktop\hOe2JrpIAE.exe "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\hOe2JrpIAE.exe"Jump to behavior
                Source: explorer.exe, 00000007.00000003.3099099836.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2010640411.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000003.3096597969.0000000009B7A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
                Source: explorer.exe, 00000007.00000002.4442723269.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.2007472655.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: explorer.exe, 00000007.00000002.4442723269.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.2008880814.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.2007472655.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000007.00000002.4442723269.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.2007472655.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000007.00000002.4442723269.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.2007472655.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000007.00000000.2007072938.0000000000EF8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000002.4441584000.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeQueries volume information: C:\Users\user\Desktop\hOe2JrpIAE.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_01089B55 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,8_2_01089B55
                Source: C:\Windows\SysWOW64\netsh.exeCode function: 8_2_010892E8 memset,GetVersionExW,8_2_010892E8
                Source: C:\Users\user\Desktop\hOe2JrpIAE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\netsh.exe "C:\Windows\SysWOW64\netsh.exe"

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.3f99970.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.7140000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.5b50000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.7140000.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.340bcdc.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.33e7f58.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.340acc4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2005358517.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2007353143.0000000005B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005886630.0000000003F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2007470548.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005358517.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.hOe2JrpIAE.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.4442472439.0000000003890000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441795626.00000000030B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005886630.0000000004188000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2050328168.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.4441970832.0000000003170000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.3f99970.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.7140000.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.5b50000.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.3f99970.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.5b50000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.7140000.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.340bcdc.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.33e7f58.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.2fc84c8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.hOe2JrpIAE.exe.340acc4.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2005358517.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2007353143.0000000005B50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005886630.0000000003F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2007470548.0000000007140000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2005358517.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Shared Modules
                1
                DLL Side-Loading
                612
                Process Injection
                1
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Abuse Elevation Control Mechanism
                11
                Disable or Modify Tools
                LSASS Memory231
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                41
                Virtualization/Sandbox Evasion
                Security Account Manager2
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook612
                Process Injection
                NTDS41
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture12
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Abuse Elevation Control Mechanism
                Cached Domain Credentials214
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
                Obfuscated Files or Information
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                Software Packing
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1466892 Sample: hOe2JrpIAE.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 37 yipicircle.life 2->37 39 www.yipicircle.life 2->39 41 18 other IPs or domains 2->41 49 Snort IDS alert for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 10 other signatures 2->55 11 hOe2JrpIAE.exe 3 2->11         started        signatures3 process4 file5 35 C:\Users\user\AppData\...\hOe2JrpIAE.exe.log, ASCII 11->35 dropped 61 Tries to detect virtualization through RDTSC time measurements 11->61 63 Injects a PE file into a foreign processes 11->63 65 Switches to a custom stack to bypass stack traces 11->65 15 hOe2JrpIAE.exe 11->15         started        18 hOe2JrpIAE.exe 11->18         started        20 hOe2JrpIAE.exe 11->20         started        22 hOe2JrpIAE.exe 11->22         started        signatures6 process7 signatures8 75 Modifies the context of a thread in another process (thread injection) 15->75 77 Maps a DLL or memory area into another process 15->77 79 Sample uses process hollowing technique 15->79 81 2 other signatures 15->81 24 explorer.exe 79 1 15->24 injected process9 dnsIp10 43 www.tiensbangladesh.net 162.244.93.3, 49719, 80 PONYNETUS United States 24->43 45 www.shopusuniform.com 199.59.243.226, 49720, 80 BODIS-NJUS United States 24->45 47 3 other IPs or domains 24->47 57 System process connects to network (likely due to code injection or exploit) 24->57 59 Uses netsh to modify the Windows network and firewall settings 24->59 28 netsh.exe 24->28         started        signatures11 process12 signatures13 67 Modifies the context of a thread in another process (thread injection) 28->67 69 Maps a DLL or memory area into another process 28->69 71 Tries to detect virtualization through RDTSC time measurements 28->71 73 Switches to a custom stack to bypass stack traces 28->73 31 cmd.exe 1 28->31         started        process14 process15 33 conhost.exe 31->33         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.