Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.573415.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.573415.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.573415.com/dr62/www.beginagainmen.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.573415.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.85putao.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.85putao.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.85putao.com/dr62/www.engagementbuzz.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.85putao.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.alacatimacunu.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.alacatimacunu.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.alacatimacunu.com/dr62/www.g-labs.one |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.alacatimacunu.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.anastaciachetty.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.anastaciachetty.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.anastaciachetty.com/dr62/www.85putao.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.anastaciachetty.comReferer: |
Source: explorer.exe, 00000001.00000000.256946409.0000000007A84000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.517521328.0000000007A84000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/autoit3/J |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.bathroadtraders.co.uk |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.bathroadtraders.co.uk/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.bathroadtraders.co.uk/dr62/www.alacatimacunu.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.bathroadtraders.co.ukReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.beginagainmen.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.beginagainmen.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.beginagainmen.com/dr62/www.ctjhxv3.vip |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.beginagainmen.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ctjhxv3.vip |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ctjhxv3.vip/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ctjhxv3.vip/dr62/www.myenergyusage.co.uk |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ctjhxv3.vipReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ecoskiusa.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ecoskiusa.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ecoskiusa.com/dr62/www.lipcarehub.africa |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.ecoskiusa.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.engagementbuzz.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.engagementbuzz.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.engagementbuzz.com/dr62/www.raffletokens.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.engagementbuzz.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.g-labs.one |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.g-labs.one/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.g-labs.oneReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.jingduxueyue.site |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.jingduxueyue.site/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.jingduxueyue.site/dr62/www.bathroadtraders.co.uk |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.jingduxueyue.siteReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.lipcarehub.africa |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.lipcarehub.africa/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.lipcarehub.africa/dr62/www.anastaciachetty.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.lipcarehub.africaReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.myenergyusage.co.uk |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.myenergyusage.co.uk/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.myenergyusage.co.uk/dr62/www.jingduxueyue.site |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.myenergyusage.co.ukReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.pilcoh.online |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.pilcoh.online/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.pilcoh.online/dr62/www.573415.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.pilcoh.onlineReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.raffletokens.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.raffletokens.com/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.raffletokens.com/dr62/www.pilcoh.online |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.raffletokens.comReferer: |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.rodeosonline.uk |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.rodeosonline.uk/dr62/ |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.rodeosonline.uk/dr62/www.ecoskiusa.com |
Source: explorer.exe, 00000001.00000002.517521328.0000000007D2B000.00000004.00000001.00020000.00000000.sdmp | String found in binary or memory: http://www.rodeosonline.ukReferer: |
Source: explorer.exe, 00000001.00000002.523897898.0000000013CBF000.00000004.80000000.00040000.00000000.sdmp, help.exe, 00000002.00000002.512081375.00000000041BF000.00000004.10000000.00040000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: S22Ls0H4Sz.exe, type: SAMPLE | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: S22Ls0H4Sz.exe, type: SAMPLE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: S22Ls0H4Sz.exe, type: SAMPLE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 0.2.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 0.2.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 0.2.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 0.0.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 0.0.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 0.0.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.514186613.00000000047C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_772cc62d Author: unknown |
Source: 00000002.00000002.510580627.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000002.00000002.510580627.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000002.00000002.510580627.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000000.243255948.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000000.00000000.243255948.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000000.00000000.243255948.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000002.00000002.510495926.0000000002DC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000002.00000002.510495926.0000000002DC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000002.00000002.510495926.0000000002DC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.283956267.00000000003B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000000.00000002.283956267.00000000003B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000000.00000002.283956267.00000000003B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.283734451.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000000.00000002.283734451.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000000.00000002.283734451.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000000.00000002.283263107.0000000000300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000000.00000002.283263107.0000000000300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000000.00000002.283263107.0000000000300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000002.00000002.509959112.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000002.00000002.509959112.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000002.00000002.509959112.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000002.00000002.512081375.0000000003CCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000002.00000002.512081375.0000000003CCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000002.00000002.512081375.0000000003CCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000002.00000002.510213713.0000000002CC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000002.00000002.510213713.0000000002CC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000002.00000002.510213713.0000000002CC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: 00000001.00000002.523897898.00000000137CF000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: 00000001.00000002.523897898.00000000137CF000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com |
Source: 00000001.00000002.523897898.00000000137CF000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group |
Source: Process Memory Space: S22Ls0H4Sz.exe PID: 5492, type: MEMORYSTR | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: Process Memory Space: explorer.exe PID: 3320, type: MEMORYSTR | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: Process Memory Space: help.exe PID: 1068, type: MEMORYSTR | Matched rule: Windows_Trojan_Formbook_1112e116 Author: unknown |
Source: S22Ls0H4Sz.exe, type: SAMPLE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: S22Ls0H4Sz.exe, type: SAMPLE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: S22Ls0H4Sz.exe, type: SAMPLE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 0.2.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 0.2.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 0.2.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 0.0.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 0.0.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 0.0.S22Ls0H4Sz.exe.380000.0.unpack, type: UNPACKEDPE | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.514186613.00000000047C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18 |
Source: 00000002.00000002.510580627.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000002.00000002.510580627.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000002.00000002.510580627.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000000.243255948.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000000.00000000.243255948.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000000.00000000.243255948.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000002.00000002.510495926.0000000002DC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000002.00000002.510495926.0000000002DC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000002.00000002.510495926.0000000002DC0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.283956267.00000000003B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000000.00000002.283956267.00000000003B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000000.00000002.283956267.00000000003B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.283734451.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000000.00000002.283734451.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000000.00000002.283734451.0000000000381000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000000.00000002.283263107.0000000000300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000000.00000002.283263107.0000000000300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000000.00000002.283263107.0000000000300000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000002.00000002.509959112.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000002.00000002.509959112.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000002.00000002.509959112.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000002.00000002.512081375.0000000003CCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000002.00000002.512081375.0000000003CCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000002.00000002.512081375.0000000003CCF000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000002.00000002.510213713.0000000002CC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000002.00000002.510213713.0000000002CC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000002.00000002.510213713.0000000002CC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: 00000001.00000002.523897898.00000000137CF000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: 00000001.00000002.523897898.00000000137CF000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE |
Source: 00000001.00000002.523897898.00000000137CF000.00000004.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research |
Source: Process Memory Space: S22Ls0H4Sz.exe PID: 5492, type: MEMORYSTR | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: Process Memory Space: explorer.exe PID: 3320, type: MEMORYSTR | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: Process Memory Space: help.exe PID: 1068, type: MEMORYSTR | Matched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A350 NtCreateFile, | 0_2_0039A350 |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A400 NtReadFile, | 0_2_0039A400 |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A480 NtClose, | 0_2_0039A480 |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A530 NtAllocateVirtualMemory, | 0_2_0039A530 |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A34A NtCreateFile, | 0_2_0039A34A |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A47A NtClose, | 0_2_0039A47A |
Source: C:\Users\user\Desktop\S22Ls0H4Sz.exe | Code function: 0_2_0039A44A NtReadFile, | 0_2_0039A44A |
Source: C:\Windows\explorer.exe | Code function: 1_2_047A8232 NtCreateFile, | 1_2_047A8232 |
Source: C:\Windows\explorer.exe | Code function: 1_2_047A9E12 NtProtectVirtualMemory, | 1_2_047A9E12 |
Source: C:\Windows\explorer.exe | Code function: 1_2_047A9E0A NtProtectVirtualMemory, | 1_2_047A9E0A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809780 NtMapViewOfSection,LdrInitializeThunk, | 2_2_03809780 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809FE0 NtCreateMutant,LdrInitializeThunk, | 2_2_03809FE0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809710 NtQueryInformationToken,LdrInitializeThunk, | 2_2_03809710 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038096D0 NtCreateKey,LdrInitializeThunk, | 2_2_038096D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038096E0 NtFreeVirtualMemory,LdrInitializeThunk, | 2_2_038096E0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809650 NtQueryValueKey,LdrInitializeThunk, | 2_2_03809650 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809A50 NtCreateFile,LdrInitializeThunk, | 2_2_03809A50 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809660 NtAllocateVirtualMemory,LdrInitializeThunk, | 2_2_03809660 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038099A0 NtCreateSection,LdrInitializeThunk, | 2_2_038099A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038095D0 NtClose,LdrInitializeThunk, | 2_2_038095D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809910 NtAdjustPrivilegesToken,LdrInitializeThunk, | 2_2_03809910 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809540 NtReadFile,LdrInitializeThunk, | 2_2_03809540 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809840 NtDelayExecution,LdrInitializeThunk, | 2_2_03809840 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809860 NtQuerySystemInformation,LdrInitializeThunk, | 2_2_03809860 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038097A0 NtUnmapViewOfSection, | 2_2_038097A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0380A3B0 NtGetContextThread, | 2_2_0380A3B0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809B00 NtSetValueKey, | 2_2_03809B00 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0380A710 NtOpenProcessToken, | 2_2_0380A710 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809730 NtQueryVirtualMemory, | 2_2_03809730 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809760 NtOpenProcess, | 2_2_03809760 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809770 NtSetInformationFile, | 2_2_03809770 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0380A770 NtOpenThread, | 2_2_0380A770 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809A80 NtOpenDirectoryObject, | 2_2_03809A80 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809A00 NtProtectVirtualMemory, | 2_2_03809A00 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809610 NtEnumerateValueKey, | 2_2_03809610 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809A10 NtQuerySection, | 2_2_03809A10 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809A20 NtResumeThread, | 2_2_03809A20 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809670 NtQueryInformationProcess, | 2_2_03809670 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038099D0 NtCreateProcessEx, | 2_2_038099D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038095F0 NtQueryInformationFile, | 2_2_038095F0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809520 NtWaitForSingleObject, | 2_2_03809520 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0380AD30 NtSetContextThread, | 2_2_0380AD30 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809950 NtQueueApcThread, | 2_2_03809950 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809560 NtWriteFile, | 2_2_03809560 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038098A0 NtWriteVirtualMemory, | 2_2_038098A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038098F0 NtReadVirtualMemory, | 2_2_038098F0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03809820 NtEnumerateKey, | 2_2_03809820 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0380B040 NtSuspendThread, | 2_2_0380B040 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA350 NtCreateFile, | 2_2_02DDA350 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA480 NtClose, | 2_2_02DDA480 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA400 NtReadFile, | 2_2_02DDA400 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA530 NtAllocateVirtualMemory, | 2_2_02DDA530 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA34A NtCreateFile, | 2_2_02DDA34A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA44A NtReadFile, | 2_2_02DDA44A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_02DDA47A NtClose, | 2_2_02DDA47A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388138A mov eax, dword ptr fs:[00000030h] | 2_2_0388138A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F3B7A mov eax, dword ptr fs:[00000030h] | 2_2_037F3B7A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F3B7A mov eax, dword ptr fs:[00000030h] | 2_2_037F3B7A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0387D380 mov ecx, dword ptr fs:[00000030h] | 2_2_0387D380 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03847794 mov eax, dword ptr fs:[00000030h] | 2_2_03847794 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03847794 mov eax, dword ptr fs:[00000030h] | 2_2_03847794 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03847794 mov eax, dword ptr fs:[00000030h] | 2_2_03847794 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CDB60 mov ecx, dword ptr fs:[00000030h] | 2_2_037CDB60 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DFF60 mov eax, dword ptr fs:[00000030h] | 2_2_037DFF60 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CF358 mov eax, dword ptr fs:[00000030h] | 2_2_037CF358 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03895BA5 mov eax, dword ptr fs:[00000030h] | 2_2_03895BA5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CDB40 mov eax, dword ptr fs:[00000030h] | 2_2_037CDB40 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DEF40 mov eax, dword ptr fs:[00000030h] | 2_2_037DEF40 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038453CA mov eax, dword ptr fs:[00000030h] | 2_2_038453CA |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038453CA mov eax, dword ptr fs:[00000030h] | 2_2_038453CA |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FE730 mov eax, dword ptr fs:[00000030h] | 2_2_037FE730 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C4F2E mov eax, dword ptr fs:[00000030h] | 2_2_037C4F2E |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C4F2E mov eax, dword ptr fs:[00000030h] | 2_2_037C4F2E |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EF716 mov eax, dword ptr fs:[00000030h] | 2_2_037EF716 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FA70E mov eax, dword ptr fs:[00000030h] | 2_2_037FA70E |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FA70E mov eax, dword ptr fs:[00000030h] | 2_2_037FA70E |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038037F5 mov eax, dword ptr fs:[00000030h] | 2_2_038037F5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0389070D mov eax, dword ptr fs:[00000030h] | 2_2_0389070D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0389070D mov eax, dword ptr fs:[00000030h] | 2_2_0389070D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388131B mov eax, dword ptr fs:[00000030h] | 2_2_0388131B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385FF10 mov eax, dword ptr fs:[00000030h] | 2_2_0385FF10 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385FF10 mov eax, dword ptr fs:[00000030h] | 2_2_0385FF10 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EDBE9 mov eax, dword ptr fs:[00000030h] | 2_2_037EDBE9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F03E2 mov eax, dword ptr fs:[00000030h] | 2_2_037F03E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F03E2 mov eax, dword ptr fs:[00000030h] | 2_2_037F03E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F03E2 mov eax, dword ptr fs:[00000030h] | 2_2_037F03E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F03E2 mov eax, dword ptr fs:[00000030h] | 2_2_037F03E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F03E2 mov eax, dword ptr fs:[00000030h] | 2_2_037F03E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F03E2 mov eax, dword ptr fs:[00000030h] | 2_2_037F03E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03898B58 mov eax, dword ptr fs:[00000030h] | 2_2_03898B58 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F4BAD mov eax, dword ptr fs:[00000030h] | 2_2_037F4BAD |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F4BAD mov eax, dword ptr fs:[00000030h] | 2_2_037F4BAD |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F4BAD mov eax, dword ptr fs:[00000030h] | 2_2_037F4BAD |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03898F6A mov eax, dword ptr fs:[00000030h] | 2_2_03898F6A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2397 mov eax, dword ptr fs:[00000030h] | 2_2_037F2397 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D8794 mov eax, dword ptr fs:[00000030h] | 2_2_037D8794 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FB390 mov eax, dword ptr fs:[00000030h] | 2_2_037FB390 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D1B8F mov eax, dword ptr fs:[00000030h] | 2_2_037D1B8F |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D1B8F mov eax, dword ptr fs:[00000030h] | 2_2_037D1B8F |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385FE87 mov eax, dword ptr fs:[00000030h] | 2_2_0385FE87 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EAE73 mov eax, dword ptr fs:[00000030h] | 2_2_037EAE73 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EAE73 mov eax, dword ptr fs:[00000030h] | 2_2_037EAE73 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EAE73 mov eax, dword ptr fs:[00000030h] | 2_2_037EAE73 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EAE73 mov eax, dword ptr fs:[00000030h] | 2_2_037EAE73 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EAE73 mov eax, dword ptr fs:[00000030h] | 2_2_037EAE73 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D766D mov eax, dword ptr fs:[00000030h] | 2_2_037D766D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038446A7 mov eax, dword ptr fs:[00000030h] | 2_2_038446A7 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03890EA5 mov eax, dword ptr fs:[00000030h] | 2_2_03890EA5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03890EA5 mov eax, dword ptr fs:[00000030h] | 2_2_03890EA5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03890EA5 mov eax, dword ptr fs:[00000030h] | 2_2_03890EA5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9240 mov eax, dword ptr fs:[00000030h] | 2_2_037C9240 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9240 mov eax, dword ptr fs:[00000030h] | 2_2_037C9240 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9240 mov eax, dword ptr fs:[00000030h] | 2_2_037C9240 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9240 mov eax, dword ptr fs:[00000030h] | 2_2_037C9240 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D7E41 mov eax, dword ptr fs:[00000030h] | 2_2_037D7E41 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D7E41 mov eax, dword ptr fs:[00000030h] | 2_2_037D7E41 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D7E41 mov eax, dword ptr fs:[00000030h] | 2_2_037D7E41 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D7E41 mov eax, dword ptr fs:[00000030h] | 2_2_037D7E41 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D7E41 mov eax, dword ptr fs:[00000030h] | 2_2_037D7E41 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D7E41 mov eax, dword ptr fs:[00000030h] | 2_2_037D7E41 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0387FEC0 mov eax, dword ptr fs:[00000030h] | 2_2_0387FEC0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03808EC7 mov eax, dword ptr fs:[00000030h] | 2_2_03808EC7 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CE620 mov eax, dword ptr fs:[00000030h] | 2_2_037CE620 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03898ED6 mov eax, dword ptr fs:[00000030h] | 2_2_03898ED6 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E3A1C mov eax, dword ptr fs:[00000030h] | 2_2_037E3A1C |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FA61C mov eax, dword ptr fs:[00000030h] | 2_2_037FA61C |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FA61C mov eax, dword ptr fs:[00000030h] | 2_2_037FA61C |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CAA16 mov eax, dword ptr fs:[00000030h] | 2_2_037CAA16 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CAA16 mov eax, dword ptr fs:[00000030h] | 2_2_037CAA16 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C5210 mov eax, dword ptr fs:[00000030h] | 2_2_037C5210 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C5210 mov ecx, dword ptr fs:[00000030h] | 2_2_037C5210 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C5210 mov eax, dword ptr fs:[00000030h] | 2_2_037C5210 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C5210 mov eax, dword ptr fs:[00000030h] | 2_2_037C5210 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D8A0A mov eax, dword ptr fs:[00000030h] | 2_2_037D8A0A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CC600 mov eax, dword ptr fs:[00000030h] | 2_2_037CC600 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CC600 mov eax, dword ptr fs:[00000030h] | 2_2_037CC600 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CC600 mov eax, dword ptr fs:[00000030h] | 2_2_037CC600 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F8E00 mov eax, dword ptr fs:[00000030h] | 2_2_037F8E00 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881608 mov eax, dword ptr fs:[00000030h] | 2_2_03881608 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2AE4 mov eax, dword ptr fs:[00000030h] | 2_2_037F2AE4 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F16E0 mov ecx, dword ptr fs:[00000030h] | 2_2_037F16E0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D76E2 mov eax, dword ptr fs:[00000030h] | 2_2_037D76E2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03804A2C mov eax, dword ptr fs:[00000030h] | 2_2_03804A2C |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03804A2C mov eax, dword ptr fs:[00000030h] | 2_2_03804A2C |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F36CC mov eax, dword ptr fs:[00000030h] | 2_2_037F36CC |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2ACB mov eax, dword ptr fs:[00000030h] | 2_2_037F2ACB |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0387FE3F mov eax, dword ptr fs:[00000030h] | 2_2_0387FE3F |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388AE44 mov eax, dword ptr fs:[00000030h] | 2_2_0388AE44 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388AE44 mov eax, dword ptr fs:[00000030h] | 2_2_0388AE44 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DAAB0 mov eax, dword ptr fs:[00000030h] | 2_2_037DAAB0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DAAB0 mov eax, dword ptr fs:[00000030h] | 2_2_037DAAB0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FFAB0 mov eax, dword ptr fs:[00000030h] | 2_2_037FFAB0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03854257 mov eax, dword ptr fs:[00000030h] | 2_2_03854257 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C52A5 mov eax, dword ptr fs:[00000030h] | 2_2_037C52A5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C52A5 mov eax, dword ptr fs:[00000030h] | 2_2_037C52A5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C52A5 mov eax, dword ptr fs:[00000030h] | 2_2_037C52A5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C52A5 mov eax, dword ptr fs:[00000030h] | 2_2_037C52A5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C52A5 mov eax, dword ptr fs:[00000030h] | 2_2_037C52A5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388EA55 mov eax, dword ptr fs:[00000030h] | 2_2_0388EA55 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0387B260 mov eax, dword ptr fs:[00000030h] | 2_2_0387B260 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0387B260 mov eax, dword ptr fs:[00000030h] | 2_2_0387B260 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FD294 mov eax, dword ptr fs:[00000030h] | 2_2_037FD294 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FD294 mov eax, dword ptr fs:[00000030h] | 2_2_037FD294 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03898A62 mov eax, dword ptr fs:[00000030h] | 2_2_03898A62 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0380927A mov eax, dword ptr fs:[00000030h] | 2_2_0380927A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EC577 mov eax, dword ptr fs:[00000030h] | 2_2_037EC577 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EC577 mov eax, dword ptr fs:[00000030h] | 2_2_037EC577 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CB171 mov eax, dword ptr fs:[00000030h] | 2_2_037CB171 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CB171 mov eax, dword ptr fs:[00000030h] | 2_2_037CB171 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CC962 mov eax, dword ptr fs:[00000030h] | 2_2_037CC962 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038469A6 mov eax, dword ptr fs:[00000030h] | 2_2_038469A6 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038905AC mov eax, dword ptr fs:[00000030h] | 2_2_038905AC |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038905AC mov eax, dword ptr fs:[00000030h] | 2_2_038905AC |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E7D50 mov eax, dword ptr fs:[00000030h] | 2_2_037E7D50 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EB944 mov eax, dword ptr fs:[00000030h] | 2_2_037EB944 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EB944 mov eax, dword ptr fs:[00000030h] | 2_2_037EB944 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038451BE mov eax, dword ptr fs:[00000030h] | 2_2_038451BE |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038451BE mov eax, dword ptr fs:[00000030h] | 2_2_038451BE |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038451BE mov eax, dword ptr fs:[00000030h] | 2_2_038451BE |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038451BE mov eax, dword ptr fs:[00000030h] | 2_2_038451BE |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F4D3B mov eax, dword ptr fs:[00000030h] | 2_2_037F4D3B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F4D3B mov eax, dword ptr fs:[00000030h] | 2_2_037F4D3B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F4D3B mov eax, dword ptr fs:[00000030h] | 2_2_037F4D3B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F513A mov eax, dword ptr fs:[00000030h] | 2_2_037F513A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F513A mov eax, dword ptr fs:[00000030h] | 2_2_037F513A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D3D34 mov eax, dword ptr fs:[00000030h] | 2_2_037D3D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CAD30 mov eax, dword ptr fs:[00000030h] | 2_2_037CAD30 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846DC9 mov eax, dword ptr fs:[00000030h] | 2_2_03846DC9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846DC9 mov eax, dword ptr fs:[00000030h] | 2_2_03846DC9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846DC9 mov eax, dword ptr fs:[00000030h] | 2_2_03846DC9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846DC9 mov ecx, dword ptr fs:[00000030h] | 2_2_03846DC9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846DC9 mov eax, dword ptr fs:[00000030h] | 2_2_03846DC9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846DC9 mov eax, dword ptr fs:[00000030h] | 2_2_03846DC9 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E4120 mov eax, dword ptr fs:[00000030h] | 2_2_037E4120 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E4120 mov eax, dword ptr fs:[00000030h] | 2_2_037E4120 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E4120 mov eax, dword ptr fs:[00000030h] | 2_2_037E4120 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E4120 mov eax, dword ptr fs:[00000030h] | 2_2_037E4120 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E4120 mov ecx, dword ptr fs:[00000030h] | 2_2_037E4120 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_0388FDE2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_0388FDE2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_0388FDE2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388FDE2 mov eax, dword ptr fs:[00000030h] | 2_2_0388FDE2 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038541E8 mov eax, dword ptr fs:[00000030h] | 2_2_038541E8 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03878DF1 mov eax, dword ptr fs:[00000030h] | 2_2_03878DF1 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9100 mov eax, dword ptr fs:[00000030h] | 2_2_037C9100 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9100 mov eax, dword ptr fs:[00000030h] | 2_2_037C9100 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9100 mov eax, dword ptr fs:[00000030h] | 2_2_037C9100 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CB1E1 mov eax, dword ptr fs:[00000030h] | 2_2_037CB1E1 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CB1E1 mov eax, dword ptr fs:[00000030h] | 2_2_037CB1E1 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037CB1E1 mov eax, dword ptr fs:[00000030h] | 2_2_037CB1E1 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DD5E0 mov eax, dword ptr fs:[00000030h] | 2_2_037DD5E0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DD5E0 mov eax, dword ptr fs:[00000030h] | 2_2_037DD5E0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0388E539 mov eax, dword ptr fs:[00000030h] | 2_2_0388E539 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0384A537 mov eax, dword ptr fs:[00000030h] | 2_2_0384A537 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03898D34 mov eax, dword ptr fs:[00000030h] | 2_2_03898D34 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03803D43 mov eax, dword ptr fs:[00000030h] | 2_2_03803D43 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03843540 mov eax, dword ptr fs:[00000030h] | 2_2_03843540 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F1DB5 mov eax, dword ptr fs:[00000030h] | 2_2_037F1DB5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F1DB5 mov eax, dword ptr fs:[00000030h] | 2_2_037F1DB5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F1DB5 mov eax, dword ptr fs:[00000030h] | 2_2_037F1DB5 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F35A1 mov eax, dword ptr fs:[00000030h] | 2_2_037F35A1 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F61A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F61A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F61A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F61A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FFD9B mov eax, dword ptr fs:[00000030h] | 2_2_037FFD9B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FFD9B mov eax, dword ptr fs:[00000030h] | 2_2_037FFD9B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2990 mov eax, dword ptr fs:[00000030h] | 2_2_037F2990 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C2D8A mov eax, dword ptr fs:[00000030h] | 2_2_037C2D8A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C2D8A mov eax, dword ptr fs:[00000030h] | 2_2_037C2D8A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C2D8A mov eax, dword ptr fs:[00000030h] | 2_2_037C2D8A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C2D8A mov eax, dword ptr fs:[00000030h] | 2_2_037C2D8A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C2D8A mov eax, dword ptr fs:[00000030h] | 2_2_037C2D8A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FA185 mov eax, dword ptr fs:[00000030h] | 2_2_037FA185 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037EC182 mov eax, dword ptr fs:[00000030h] | 2_2_037EC182 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2581 mov eax, dword ptr fs:[00000030h] | 2_2_037F2581 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2581 mov eax, dword ptr fs:[00000030h] | 2_2_037F2581 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2581 mov eax, dword ptr fs:[00000030h] | 2_2_037F2581 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F2581 mov eax, dword ptr fs:[00000030h] | 2_2_037F2581 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03843884 mov eax, dword ptr fs:[00000030h] | 2_2_03843884 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03843884 mov eax, dword ptr fs:[00000030h] | 2_2_03843884 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E746D mov eax, dword ptr fs:[00000030h] | 2_2_037E746D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E0050 mov eax, dword ptr fs:[00000030h] | 2_2_037E0050 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037E0050 mov eax, dword ptr fs:[00000030h] | 2_2_037E0050 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038090AF mov eax, dword ptr fs:[00000030h] | 2_2_038090AF |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FA44B mov eax, dword ptr fs:[00000030h] | 2_2_037FA44B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F002D mov eax, dword ptr fs:[00000030h] | 2_2_037F002D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F002D mov eax, dword ptr fs:[00000030h] | 2_2_037F002D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F002D mov eax, dword ptr fs:[00000030h] | 2_2_037F002D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F002D mov eax, dword ptr fs:[00000030h] | 2_2_037F002D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F002D mov eax, dword ptr fs:[00000030h] | 2_2_037F002D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FBC2C mov eax, dword ptr fs:[00000030h] | 2_2_037FBC2C |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_0385B8D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385B8D0 mov ecx, dword ptr fs:[00000030h] | 2_2_0385B8D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_0385B8D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_0385B8D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_0385B8D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385B8D0 mov eax, dword ptr fs:[00000030h] | 2_2_0385B8D0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DB02A mov eax, dword ptr fs:[00000030h] | 2_2_037DB02A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DB02A mov eax, dword ptr fs:[00000030h] | 2_2_037DB02A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DB02A mov eax, dword ptr fs:[00000030h] | 2_2_037DB02A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037DB02A mov eax, dword ptr fs:[00000030h] | 2_2_037DB02A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03898CD6 mov eax, dword ptr fs:[00000030h] | 2_2_03898CD6 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_038814FB mov eax, dword ptr fs:[00000030h] | 2_2_038814FB |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846CF0 mov eax, dword ptr fs:[00000030h] | 2_2_03846CF0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846CF0 mov eax, dword ptr fs:[00000030h] | 2_2_03846CF0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846CF0 mov eax, dword ptr fs:[00000030h] | 2_2_03846CF0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0389740D mov eax, dword ptr fs:[00000030h] | 2_2_0389740D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0389740D mov eax, dword ptr fs:[00000030h] | 2_2_0389740D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0389740D mov eax, dword ptr fs:[00000030h] | 2_2_0389740D |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03881C06 mov eax, dword ptr fs:[00000030h] | 2_2_03881C06 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846C0A mov eax, dword ptr fs:[00000030h] | 2_2_03846C0A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846C0A mov eax, dword ptr fs:[00000030h] | 2_2_03846C0A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846C0A mov eax, dword ptr fs:[00000030h] | 2_2_03846C0A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03846C0A mov eax, dword ptr fs:[00000030h] | 2_2_03846C0A |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C58EC mov eax, dword ptr fs:[00000030h] | 2_2_037C58EC |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03847016 mov eax, dword ptr fs:[00000030h] | 2_2_03847016 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03847016 mov eax, dword ptr fs:[00000030h] | 2_2_03847016 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03847016 mov eax, dword ptr fs:[00000030h] | 2_2_03847016 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03894015 mov eax, dword ptr fs:[00000030h] | 2_2_03894015 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03894015 mov eax, dword ptr fs:[00000030h] | 2_2_03894015 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FF0BF mov ecx, dword ptr fs:[00000030h] | 2_2_037FF0BF |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FF0BF mov eax, dword ptr fs:[00000030h] | 2_2_037FF0BF |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037FF0BF mov eax, dword ptr fs:[00000030h] | 2_2_037FF0BF |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385C450 mov eax, dword ptr fs:[00000030h] | 2_2_0385C450 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_0385C450 mov eax, dword ptr fs:[00000030h] | 2_2_0385C450 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F20A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F20A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F20A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F20A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F20A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F20A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F20A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F20A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F20A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F20A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037F20A0 mov eax, dword ptr fs:[00000030h] | 2_2_037F20A0 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037D849B mov eax, dword ptr fs:[00000030h] | 2_2_037D849B |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03882073 mov eax, dword ptr fs:[00000030h] | 2_2_03882073 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_037C9080 mov eax, dword ptr fs:[00000030h] | 2_2_037C9080 |
Source: C:\Windows\SysWOW64\help.exe | Code function: 2_2_03891074 mov eax, dword ptr fs:[00000030h] | 2_2_03891074 |