IOC Report
LisectAVT_2403002A_473.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_473.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user~1\AppData\Local\Temp\is-5AHC5.tmp\ndp48-web.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user~1\AppData\Local\Temp\is-QU0ES.tmp\ndp48-web.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalM_d_cKXRrV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\LisectAVT_2403002A_473.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-5AHC5.tmp\is-L16CA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-8HC4K.tmp\CustomRP.1.17.26.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\is-GPIMV.tmp\LocalwCRkvqzBqW.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\is-QU0ES.tmp\is-PMCAU.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local_wGRdnhmmy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalwCRkvqzBqW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalylmNBbjoFA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\CommonMark.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\DiscordRPC.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\HtmlRenderer.WinForms.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\HtmlRenderer.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\Microsoft.AppCenter.Analytics.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\Microsoft.AppCenter.Crashes.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\Microsoft.AppCenter.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\Newtonsoft.Json.Bson.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\Newtonsoft.Json.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\Octokit.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\SQLitePCLRaw.batteries_v2.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\SQLitePCLRaw.core.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\SQLitePCLRaw.provider.dynamic_cdecl.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\System.Memory.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\System.Net.Http.Formatting.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\System.Threading.Tasks.Extensions.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ar\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ar\is-674TO.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ar\is-HRLC1.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\az\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\az\is-SPCCG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\be\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\be\is-CQSTG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\be\is-OUIRJ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bg\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bg\is-RDQFL.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bg\is-VHFMO.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bn\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bn\is-1BDJ5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bn\is-HPMA5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bs\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bs\is-6KALE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\bs\is-UTM10.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ca\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ca\is-G3P15.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ca\is-RKKJG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\cs\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\cs\is-D6RI7.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\cs\is-LVJRV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\cy\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\cy\is-39CN3.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\cy\is-QS138.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\da\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\da\is-L9EDS.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\da\is-MEI7K.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\de-CH\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\de-CH\is-3GQDR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\de-CH\is-PS652.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\de\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\de\is-ONH2C.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\de\is-Q34JK.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\el\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\el\is-2TH83.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\el\is-NEUVP.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\es\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\es\is-65RVL.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\es\is-JBG7J.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\et\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\et\is-1TNPU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\et\is-6NKQM.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fa\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fa\is-ATSDQ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fa\is-N68S6.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fi\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fi\is-3UC6U.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fi\is-JNLAH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fil\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fil\is-PN2OA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fil\is-UD0CQ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fr\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fr\is-CJ2KI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\fr\is-VSURF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\gl\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\gl\is-O7UR3.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\gl\is-ROPLV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\he\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\he\is-85D8B.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\he\is-BIB27.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hi\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hi\is-5G0PQ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hi\is-OG5MR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hr\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hr\is-EFPSN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hr\is-QSFJ0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hu\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hu\is-1UC18.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hu\is-T48C7.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hy\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hy\is-9K8L2.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\hy\is-OHUPK.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\id\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\id\is-JVR9Q.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\id\is-VO99H.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-1NIJ8.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-1OIC0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-2C28F.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-313PG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-40UMB.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-550CF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-60I9P.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-687SV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-7ECM7.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-840Q4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-8B8DA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-8ECJB.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-90JQC.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-9AGJI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-9VO3N.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-CMKDC.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-FETK3.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-FEUPA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-FK5SN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-FNJTI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-GVRFI.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-H1ITL.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-I462P.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-I8E2V.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-JAUIP.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-JHC4U.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-KQM6J.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-N75LE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-N7DCN.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-OARCU.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-OD2S7.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-PN1CV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-QH208.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-TI8RB.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-TJS3F.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is-VUD2Q.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is\is-9VBA1.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\is\is-G0GP4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\it\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\it\is-AVJLC.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\it\is-SMAND.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ja\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ja\is-HSSNF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ja\is-HUT9S.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ka\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ka\is-BTTKK.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ka\is-O57A3.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\kk\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\kk\is-BEN2D.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\kn\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\kn\is-PHNVH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\kn\is-Q0K47.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ko\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ko\is-3MKMH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ko\is-QDV0A.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ku\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ku\is-0AQNH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ku\is-54C0C.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\lt\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\lt\is-558BR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\lt\is-7TEOR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\lv\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\lv\is-943IK.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\lv\is-9GBNE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\mk\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\mk\is-4D6QO.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\mk\is-B6G5I.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ml\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ml\is-H8GME.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ml\is-NJ72O.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\mn\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\mn\is-GJ06U.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\mn\is-S5EU4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ms\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ms\is-KFO4O.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\my\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\my\is-2UT95.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\my\is-DB878.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\nl\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\nl\is-AGJMF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\nl\is-T6AQ0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\no\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\no\is-AJQMV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\no\is-M254A.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pa\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pa\is-DAB1M.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pa\is-QT140.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pl\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pl\is-05QDT.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pl\is-5BRIE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pt-BR\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pt-BR\is-0EQ8U.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pt-BR\is-2A1S4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pt\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pt\is-IFBSR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\pt\is-MD896.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ro\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ro\is-H3RRR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ro\is-SGDGS.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ru\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ru\is-GL4HQ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ru\is-SBHVJ.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-arm\native\e_sqlite3.dll (copy)
PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-arm\native\is-JNFCM.tmp
PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-arm\native\is-L6FKM.tmp
PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x64\native\e_sqlite3.dll (copy)
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x64\native\is-546QC.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x64\native\is-HGKHC.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x86\native\e_sqlite3.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x86\native\is-SDGP4.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x86\native\is-TR1B4.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sk\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sk\is-5KF44.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sk\is-NHIH0.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sl\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sl\is-C59RA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sl\is-G19UM.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sr\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sr\is-7NGID.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sr\is-UK4IF.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sv\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sv\is-0ERMH.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\sv\is-53H19.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ta\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ta\is-A4O8R.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ta\is-AVES5.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\th\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\th\is-B2KEE.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\th\is-K9T0V.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\tr\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\tr\is-51KP4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\tr\is-IOVKP.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\uk\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\uk\is-DVKQR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\uk\is-VIB03.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ur\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ur\is-COL0K.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\ur\is-G731T.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\vi\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\vi\is-I9TFR.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\vi\is-JDVP8.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\zh-Hans\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\zh-Hans\is-5VLN4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\zh-Hans\is-A2DL7.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\zh-Hant\CustomRP.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\zh-Hant\is-LHI5A.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\CustomRP\zh-Hant\is-TCS3P.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\AppCenter\fb523500-4273-456f-a2b6-bb86d47f097a\Logs.db
SQLite 3.x database, last written using SQLite version 3041002, file counter 9, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Local\Microsoft\AppCenter\fb523500-4273-456f-a2b6-bb86d47f097a\Logs.db-journal
SQLite Rollback Journal
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\LocalylmNBbjoFA.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\LocalM_d_cKXRrV.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Local_wGRdnhmmy.exe.log
Unknown
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CustomRP.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-5AHC5.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QU0ES.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\ei5ssafe.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\pbrobjpg.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\user.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\w0yrzvgf.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\22gmj3kj.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\AppCenter.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\CustomRP\License.txt (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\CustomRP\Privacy Policy.txt (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\CustomRP\System.Buffers.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\System.Numerics.Vectors.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\System.Runtime.CompilerServices.Unsafe.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-0375B.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-18R1F.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-2ATOI.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-2C6IM.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-BRDOG.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-CU43O.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-F4MFV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-IOV14.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-KT4F4.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-LTL2H.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-MQLS8.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\CustomRP\is-QQTGA.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CustomRP\unins000.dat
InnoSetup Log CustomRP {6B1949CF-3AC6-43B8-95BF-5517797E2CEA}, version 0x418, 47172 bytes, 745773\37\user, C:\Users\user\AppData\Roaming\CustomR
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CustomRP\CustomRP.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:44:06 2024, atime=Sun Jul 7 14:59:54 2024, length=1201152, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CustomRP\Uninstall CustomRP.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:44:06 2024, atime=Thu Jul 25 16:44:45 2024, length=3442237, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CustomRP.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:43:27 2024, atime=Sun Feb 25 17:57:50 2024, length=1197568, window=hide
dropped
C:\Users\user\Desktop\CustomRP.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:44:09 2024, atime=Sun Jul 7 14:59:54 2024, length=1201152, window=hide
dropped
Chrome Cache Entry: 302
HTML document, Unicode text, UTF-8 text, with very long lines (55638)
downloaded
Chrome Cache Entry: 303
HTML document, Unicode text, UTF-8 text, with very long lines (30466)
dropped
Chrome Cache Entry: 304
ASCII text, with very long lines (3600)
downloaded
Chrome Cache Entry: 305
ASCII text, with very long lines (7798)
dropped
Chrome Cache Entry: 306
ASCII text, with very long lines (11896)
downloaded
Chrome Cache Entry: 307
PNG image data, 1375 x 274, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 308
Unicode text, UTF-8 text, with very long lines (18265)
downloaded
Chrome Cache Entry: 309
ASCII text, with very long lines (11351)
dropped
Chrome Cache Entry: 310
ASCII text, with very long lines (3600)
dropped
Chrome Cache Entry: 311
ASCII text, with very long lines (10068)
dropped
Chrome Cache Entry: 312
ASCII text, with very long lines (63280)
dropped
Chrome Cache Entry: 313
ASCII text, with very long lines (3904)
downloaded
Chrome Cache Entry: 314
Web Open Font Format (Version 2), TrueType, length 1666688, version 1.0
downloaded
Chrome Cache Entry: 315
ASCII text, with very long lines (41198)
downloaded
Chrome Cache Entry: 316
ASCII text, with very long lines (4871)
downloaded
Chrome Cache Entry: 317
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 318
ASCII text, with very long lines (11076)
downloaded
Chrome Cache Entry: 319
ASCII text, with very long lines (3904)
dropped
Chrome Cache Entry: 320
JSON data
downloaded
Chrome Cache Entry: 321
ASCII text, with very long lines (13598)
downloaded
Chrome Cache Entry: 322
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 323
ASCII text, with very long lines (35872)
dropped
Chrome Cache Entry: 324
Web Open Font Format (Version 2), TrueType, length 46552, version 1.0
downloaded
Chrome Cache Entry: 325
Unicode text, UTF-8 text, with very long lines (25755)
dropped
Chrome Cache Entry: 326
Web Open Font Format (Version 2), TrueType, length 10088, version 1.0
downloaded
Chrome Cache Entry: 327
ASCII text, with very long lines (25679)
downloaded
Chrome Cache Entry: 328
Unicode text, UTF-8 text, with very long lines (58741)
downloaded
Chrome Cache Entry: 329
HTML document, Unicode text, UTF-8 text, with very long lines (53466)
dropped
Chrome Cache Entry: 330
ASCII text, with very long lines (65472)
downloaded
Chrome Cache Entry: 331
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 332
ASCII text, with very long lines (11351)
downloaded
Chrome Cache Entry: 333
ASCII text, with very long lines (925)
downloaded
Chrome Cache Entry: 334
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 335
ASCII text, with very long lines (6241)
dropped
Chrome Cache Entry: 336
ASCII text
downloaded
Chrome Cache Entry: 337
ASCII text, with very long lines (15524)
dropped
Chrome Cache Entry: 338
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 339
ASCII text, with very long lines (25679)
dropped
Chrome Cache Entry: 340
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 341
PNG image data, 932 x 551, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 342
ASCII text, with very long lines (10068)
downloaded
Chrome Cache Entry: 343
ASCII text, with very long lines (4871)
dropped
Chrome Cache Entry: 344
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 32x32, components 3
dropped
Chrome Cache Entry: 345
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 346
ASCII text, with very long lines (11076)
dropped
Chrome Cache Entry: 347
JSON data
dropped
Chrome Cache Entry: 348
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 349
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 32x32, components 3
downloaded
Chrome Cache Entry: 350
ASCII text, with very long lines (6241)
downloaded
Chrome Cache Entry: 351
ASCII text, with very long lines (15524)
downloaded
Chrome Cache Entry: 352
ASCII text, with very long lines (2716)
downloaded
Chrome Cache Entry: 353
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 354
PNG image data, 932 x 551, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 355
ASCII text, with very long lines (46795)
downloaded
Chrome Cache Entry: 356
ASCII text, with very long lines (925)
dropped
Chrome Cache Entry: 357
Unicode text, UTF-8 text, with very long lines (25755)
downloaded
Chrome Cache Entry: 358
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 359
Unicode text, UTF-8 text, with very long lines (18265)
dropped
Chrome Cache Entry: 360
ASCII text, with very long lines (41198)
dropped
Chrome Cache Entry: 361
ASCII text, with very long lines (7798)
downloaded
Chrome Cache Entry: 362
HTML document, Unicode text, UTF-8 text, with very long lines (53656)
dropped
Chrome Cache Entry: 363
ASCII text, with very long lines (11896)
dropped
Chrome Cache Entry: 364
Unicode text, UTF-8 text, with very long lines (58741)
dropped
Chrome Cache Entry: 365
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 366
ASCII text, with very long lines (2657)
downloaded
Chrome Cache Entry: 367
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 368
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 369
Unicode text, UTF-8 text, with very long lines (65531), with no line terminators
downloaded
Chrome Cache Entry: 370
ASCII text, with very long lines (13598)
dropped
Chrome Cache Entry: 371
PNG image data, 1375 x 274, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 372
ASCII text, with very long lines (2666)
downloaded
Chrome Cache Entry: 373
ISO Media, AVIF Image
dropped
Chrome Cache Entry: 374
ASCII text, with very long lines (46795)
dropped
Chrome Cache Entry: 375
ASCII text, with very long lines (35872)
downloaded
Chrome Cache Entry: 376
ASCII text, with very long lines (63280)
downloaded
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 361 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_473.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_473.exe"
malicious
C:\Users\user\AppData\LocalM_d_cKXRrV.exe
"C:\Users\user\AppData\LocalM_d_cKXRrV.exe"
malicious
C:\Users\user\AppData\LocalylmNBbjoFA.exe
"C:\Users\user\AppData\LocalylmNBbjoFA.exe"
malicious
C:\Users\user\AppData\Local_wGRdnhmmy.exe
"C:\Users\user\AppData\Local_wGRdnhmmy.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-GPIMV.tmp\LocalwCRkvqzBqW.tmp
"C:\Users\user~1\AppData\Local\Temp\is-GPIMV.tmp\LocalwCRkvqzBqW.tmp" /SL5="$20408,5483573,1081856,C:\Users\user\AppData\LocalwCRkvqzBqW.exe"
malicious
C:\Users\user\server.exe
"C:\Users\user\server.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Local_wGRdnhmmy" /tr "C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
malicious
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
"C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe"
malicious
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
malicious
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
"C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe"
malicious
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe
"C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://docs.customrp.xyz/setting-up
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1936,i,15522809999631733676,11133617490285214044,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe
"C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-8HC4K.tmp\CustomRP.1.17.26.tmp
"C:\Users\user~1\AppData\Local\Temp\is-8HC4K.tmp\CustomRP.1.17.26.tmp" /SL5="$404B2,5498303,1081856,C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe"
malicious
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
malicious
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe
"C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe"
malicious
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
malicious
C:\Users\user\AppData\LocalwCRkvqzBqW.exe
"C:\Users\user\AppData\LocalwCRkvqzBqW.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\explorer.exe
"C:\Windows\System32\explorer.exe" https://docs.customrp.xyz/setting-up
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe
"C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe"
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/153460616
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/153478024
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/153478023
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/125125712/assets
unknown
https://api.github.com/users/maximmax42
unknown
https://api.github.com/repositories/158286982/releases?page=2
140.82.121.5
https://api.github.com/repositories/158286982/releases?page=3
140.82.121.5
https://api.github.com/repositories/158286982/releases?page=1
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/110203536
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.19/CustomRP.1.17.19.zip
unknown
https://twitter.com/Illeg__al
unknown
https://api.github.com/repositories/158286982/releases?page=4
140.82.121.5
https://github.com/maximmax42/Discord-CustomRP/releases
unknown
https://docs.customrp.xyz/_next/static/chunks/9297-f3eccea4ea14abf3.js
172.64.147.209
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/117069059/assets
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.10/CustomRP.1.17.10.zip
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/166298664
unknown
https://github.com/dotnet/corefx/tree/7601f4f6225089ff
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/148080647/assets
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases
140.82.121.5
https://www.innosetup.com/
unknown
https://docs.customrp.xyz/_next/static/chunks/app/(space)/(content)/%5B%5B...pathname%5D%5D/page-ec571d2756d4b9b5.js
172.64.147.209
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.17/CustomRP.1.17.17.exe
unknown
https://www.youtube.com/channel/UCxGqMDnXnEyVt4yugLeBpgA
unknown
https://3448418481-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/collections%2Fb7ivX6BQQxRccY1orTyN%2Ficon%2FnkaA7BNDEwNuDrY1Bu5Z%2Flogo.png?alt=media&token=8a0a99e6-b7f7-4e7b-9a7d-ec4200fc5dbe
172.64.147.209
https://api.github.com/users/maximmax42/received_eventsLR
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/114405601/assets
unknown
https://in.appcenter.ms./logs?api-version=1.0.0
unknown
https://codiaz.com/
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/110203541
unknown
https://cdn.discordapp.com/embed/avatars/4.png
unknown
https://docs.customrp.xyz/_next/static/chunks/1dd3208c-be983e9332503385.js
172.64.147.209
https://docs.customrp.xyz/_next/static/chunks/app/global-error-fb32fca0ade143dc.js
172.64.147.209
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.20.1/CustomRP.1.17.20.1.exe
unknown
https://docs.customrp.xyz/_next/static/chunks/132-510ddc716fcc679e.js
172.64.147.209
https://linktr.ee/404femboy
unknown
https://github.com/EdiRo
unknown
https://ci.appveyor.com/project/maximmax42/customrp/builds/49898001)
unknown
https://docs.customrp.xyz/_next/static/css/9788c0e64943a60e.css
172.64.147.209
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.25/CustomRP.1.17.25.zip
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/143526226/assets
unknown
http://www.haysoft.org%1-k
unknown
https://jesperiz.carrd.co/
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.16/CustomRP.1.17.16.exe
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.23/CustomRP.Hashes.1.17.23.txt
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/143518737/assets
unknown
https://api.github.com/users/maximmax42/following
unknown
https://github.com/Knagis/CommonMark.NET
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.22/CustomRP.1.17.22.exe
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/9840178
unknown
https://api.github.com/repositories/158286982/releases?page=2lB
unknown
https://avatars.githubusercontent.com/u/2225711?v=4lB
unknown
https://github.com/octokit/octokit.net
unknown
https://docs.customrp.xyz/~gitbook/image?url=https%3A%2F%2Fuser-images.githubusercontent.com%2F2225711%2F161050202-c796103d-6712-401e-be96-3f3712512375.png&width=768&dpr=4&quality=100&sign=1d31e0c1&sv=1
172.64.147.209
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.26/CustomRP.Hashes.1.17.26.txt
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/120548332/assets
unknown
https://api.github.com/
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/120549358/assets
unknown
https://raw.githubusercontent.com/dcurtis/markdown-mark/m
unknown
https://boefjim.com/
unknown
https://api.github.com/users/maximmax42/repos
unknown
https://japanesegirl99.muzes.xyz/))
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/152239004/assets
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/105004829/assets
unknown
https://api.github.com/users/maximmax42LR
unknown
https://4ng3l.com/
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/28138380
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/9847888lB
unknown
https://sys-256.me/
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.18/CustomRP.1.17.18.exe
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/139951833
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/tag/1.14.2
unknown
https://zag.rip
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/142494604/assets
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/125125712
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/105004829
unknown
https://julian-idl.codes/
unknown
https://docs.customrp.xyz/setting-up
https://api.github.com/repos/maximmax42/Discord-CustomRP/zipball/1.17.13.1
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/139951848
unknown
https://opensea.io/collection/worldtowers
unknown
https://www.youtube.com/channel/UCxNVq2Esevsdp2v1jGQNu5A
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/tarball/1.14.2
unknown
https://app.gitbook.com/__session?proposed=c7fb3030-4991-43e6-a825-1b67f742be0cR
172.64.146.167
https://github.com/ericsink/SQLitePCL.rawX
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/110103989/assets
unknown
https://meap.gg/
unknown
https://docs.customrp.xyz/_next/static/media/c9a5bc6a7c948fb0-s.woff2
172.64.147.209
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.14.5/CustomRP.1.14.5.zip
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.23/CustomRP.1.17.23.exe
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.24/CustomRP.1.17.24.zip
unknown
https://isaidpower.dev/
unknown
https://github.com/maximmax42/Discord-CustomRP/releases/download/v1.0/CustomRP.1.0.zip
unknown
https://www.customrp.xyz/donations/NearbyFish.png
unknown
https://avatars.githubusercontent.com/u/2225711?v=4
unknown
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/130222051/assets
unknown
https://docs.customrp.xyz/_next/static/chunks/5810-30abd17002efe9e2.js
172.64.147.209
https://github.com/ericsink/SQLitePCL.rawH
unknown
http://www.dk-soft.org/
unknown
https://api.github.com/repos/maximmax42/Discord-CustomRP/tarball/1.17.20.1
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
in.appcenter.ms
unknown
malicious
docs.customrp.xyz
unknown
malicious
h2cker.ddns.net
unknown
malicious
3448418481-files.gitbook.io
172.64.147.209
github.com
140.82.121.4
api.github.com
140.82.121.5
d2bc804067-hosting.gitbook.io
172.64.147.209
www.google.com
142.250.181.228
app.gitbook.com
172.64.146.167
objects.githubusercontent.com
185.199.111.133
api.gitbook.com
104.18.41.89
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
104.18.41.89
api.gitbook.com
United States
192.168.2.7
unknown
unknown
140.82.121.4
github.com
United States
140.82.121.5
api.github.com
United States
185.199.111.133
objects.githubusercontent.com
Netherlands
172.64.146.167
app.gitbook.com
United States
239.255.255.250
unknown
Reserved
142.250.181.228
www.google.com
United States
172.64.147.209
3448418481-files.gitbook.io
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Local_wGRdnhmmy
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER_Classes\.crp\OpenWithProgids
CustomRP.crp
HKEY_CURRENT_USER_Classes\CustomRP.crp
NULL
HKEY_CURRENT_USER_Classes\CustomRP.crp\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\CustomRP.crp\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\Applications\CustomRP.exe\SupportedTypes
.crp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 88 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E01000
trusted library allocation
page read and write
malicious
215000
unkown
page readonly
malicious
3C2000
unkown
page readonly
malicious
2EE1000
trusted library allocation
page read and write
malicious
25E1000
trusted library allocation
page read and write
malicious
2EA1000
trusted library allocation
page read and write
malicious
12E1D000
trusted library allocation
page read and write
malicious
206000
unkown
page readonly
malicious
84B000
unkown
page readonly
malicious
5C2000
unkown
page readonly
malicious
27F0000
direct allocation
page read and write
1140000
heap
page read and write
2513000
direct allocation
page read and write
BD30000
trusted library allocation
page read and write
781D000
heap
page read and write
31B6000
trusted library allocation
page read and write
3C20000
heap
page read and write
9CE000
heap
page read and write
3AD4000
trusted library allocation
page read and write
ACF000
heap
page read and write
A80000
unkown
page readonly
9E5000
heap
page read and write
3786000
trusted library allocation
page read and write
38FC000
trusted library allocation
page read and write
379E000
direct allocation
page read and write
A0A0000
heap
page read and write
BCB0000
trusted library allocation
page read and write
7FFAA9D5D000
trusted library allocation
page execute and read and write
3848000
direct allocation
page read and write
779C000
heap
page read and write
1386000
heap
page read and write
24D1000
direct allocation
page read and write
1B6EA000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
247A000
direct allocation
page read and write
5C54000
heap
page execute and read and write
4DC0000
heap
page read and write
D2E000
heap
page read and write
C3D0000
trusted library allocation
page execute and read and write
2826000
direct allocation
page read and write
5590000
trusted library allocation
page read and write
BF9000
heap
page read and write
1B29D000
stack
page read and write
B59D000
heap
page read and write
3407000
trusted library allocation
page read and write
9F80000
trusted library section
page readonly
7FFAACBC2000
trusted library allocation
page execute and read and write
A47000
heap
page read and write
1410000
heap
page read and write
990000
heap
page read and write
3896000
trusted library allocation
page read and write
2AE0000
heap
page read and write
22DA000
direct allocation
page read and write
A20000
heap
page read and write
894000
heap
page read and write
21EC000
trusted library allocation
page read and write
BF5D000
stack
page read and write
6CA000
unkown
page read and write
8E00000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
9D82000
heap
page read and write
243C000
direct allocation
page read and write
3727000
trusted library allocation
page read and write
F731F2F000
unkown
page read and write
4DEA000
heap
page read and write
BA2000
trusted library allocation
page execute and read and write
4DE0000
heap
page read and write
7BF000
heap
page read and write
6C7000
unkown
page read and write
3427000
trusted library allocation
page read and write
9D6000
heap
page read and write
5A6E000
stack
page read and write
7FFAA9D8C000
trusted library allocation
page execute and read and write
3770000
direct allocation
page read and write
C200000
trusted library allocation
page execute and read and write
5785000
direct allocation
page read and write
7FFAA9D44000
trusted library allocation
page read and write
BC0000
heap
page read and write
607E000
stack
page read and write
B07000
heap
page read and write
894000
heap
page read and write
12EB000
trusted library allocation
page execute and read and write
488F000
stack
page read and write
16F0000
heap
page read and write
194000
stack
page read and write
7FFAA9D7D000
trusted library allocation
page execute and read and write
770000
heap
page read and write
6342000
unkown
page readonly
1947000
heap
page read and write
5C0000
unkown
page readonly
87E000
stack
page read and write
400000
unkown
page readonly
5A40000
unkown
page readonly
3A37000
direct allocation
page read and write
5879000
direct allocation
page read and write
E5B000
heap
page read and write
37FE000
stack
page read and write
AAC000
heap
page read and write
12D08000
trusted library allocation
page read and write
5660000
unkown
page readonly
1000000
trusted library allocation
page read and write
894000
heap
page read and write
F17000
heap
page read and write
8A0000
heap
page read and write
F20000
heap
page read and write
CDEE000
stack
page read and write
CE40000
trusted library allocation
page execute and read and write
11F3000
heap
page read and write
3721000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
2B5E000
stack
page read and write
895000
heap
page read and write
AEB000
heap
page read and write
121E3000
trusted library allocation
page read and write
1B6CE000
stack
page read and write
2C11000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
880000
heap
page read and write
7A6000
heap
page read and write
FDF000
heap
page read and write
8C70000
trusted library allocation
page execute and read and write
1167000
heap
page read and write
38B3000
trusted library allocation
page read and write
C24E000
stack
page read and write
32F0000
heap
page execute and read and write
F68000
stack
page read and write
4DE0000
heap
page read and write
AEB000
heap
page read and write
AD8000
heap
page read and write
3B36000
trusted library allocation
page read and write
894000
heap
page read and write
5472000
heap
page read and write
3719000
trusted library allocation
page read and write
CB8E000
stack
page read and write
5572000
heap
page read and write
2D1C000
trusted library allocation
page read and write
E63000
heap
page read and write
7FFAA9D60000
trusted library allocation
page read and write
894000
heap
page read and write
A1ED000
heap
page read and write
27B0000
direct allocation
page read and write
1B517000
heap
page read and write
372B000
trusted library allocation
page read and write
710000
heap
page read and write
4DA1000
heap
page read and write
7FE4E000
direct allocation
page read and write
116E000
stack
page read and write
6D0000
heap
page read and write
266A000
direct allocation
page read and write
E53000
trusted library allocation
page read and write
2878000
direct allocation
page read and write
B1E000
stack
page read and write
2A4E000
stack
page read and write
B36000
stack
page read and write
4301000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
75C000
heap
page read and write
894000
heap
page read and write
70446000
unkown
page readonly
27EC000
direct allocation
page read and write
9C25000
heap
page read and write
C260000
trusted library allocation
page read and write
7FFB0CCA5000
unkown
page readonly
3A0A000
trusted library allocation
page read and write
C90000
heap
page read and write
F731FAE000
stack
page read and write
894000
heap
page read and write
449000
heap
page read and write
2480000
direct allocation
page read and write
AE9000
heap
page read and write
5734000
direct allocation
page read and write
3729000
trusted library allocation
page read and write
3AD0000
trusted library allocation
page read and write
8D00000
trusted library allocation
page read and write
616E000
unkown
page readonly
7FFAA9D4D000
trusted library allocation
page execute and read and write
7EC000
heap
page read and write
6E40000
trusted library allocation
page execute and read and write
89A0000
heap
page read and write
3A00000
trusted library allocation
page read and write
2308000
direct allocation
page read and write
E10000
trusted library allocation
page read and write
97D000
heap
page read and write
3195000
trusted library allocation
page read and write
3100000
heap
page execute and read and write
8B10000
trusted library allocation
page read and write
C65000
heap
page read and write
27C0000
direct allocation
page read and write
8A7000
heap
page read and write
CBE000
stack
page read and write
9B10000
trusted library allocation
page read and write
2AB0000
heap
page execute and read and write
B2A000
heap
page read and write
4DF1000
heap
page read and write
6A7E000
stack
page read and write
588E000
direct allocation
page read and write
98D000
heap
page read and write
58B0000
direct allocation
page read and write
8E60000
trusted library allocation
page read and write
B5F3000
heap
page read and write
3214000
trusted library allocation
page read and write
E4F000
heap
page read and write
E7A000
trusted library allocation
page execute and read and write
7100000
trusted library allocation
page execute and read and write
E62000
trusted library allocation
page execute and read and write
77E000
heap
page read and write
14B4000
trusted library allocation
page read and write
AF0000
heap
page read and write
3923000
trusted library allocation
page read and write
E67000
stack
page read and write
894000
heap
page read and write
286B000
direct allocation
page read and write
BB60000
trusted library allocation
page execute and read and write
A3A000
stack
page read and write
AFA000
heap
page read and write
10B0000
heap
page read and write
11F0000
heap
page read and write
9A0000
heap
page read and write
E01E000
stack
page read and write
E57000
heap
page read and write
7C5000
heap
page read and write
3A5E000
direct allocation
page read and write
1BC7E000
stack
page read and write
382A000
direct allocation
page read and write
CF00000
trusted library allocation
page execute and read and write
11E0000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
7FFAA9D4D000
trusted library allocation
page execute and read and write
2334000
direct allocation
page read and write
268A000
direct allocation
page read and write
83D000
heap
page read and write
7FFAA9D43000
trusted library allocation
page execute and read and write
ACF000
heap
page read and write
6A0000
heap
page read and write
7FFAA9D44000
trusted library allocation
page read and write
1000000
heap
page read and write
24B4000
direct allocation
page read and write
89A5000
heap
page read and write
60C0000
unkown
page readonly
1760000
heap
page read and write
9E5000
heap
page read and write
3A79000
direct allocation
page read and write
6CE000
unkown
page read and write
AF0000
heap
page read and write
1040000
heap
page read and write
7FFAACC9D000
trusted library allocation
page execute and read and write
894000
heap
page read and write
AED000
heap
page read and write
BEC0000
trusted library allocation
page read and write
EA0000
heap
page read and write
115B000
heap
page read and write
37E6000
trusted library allocation
page read and write
A310000
trusted library allocation
page execute and read and write
2A20000
trusted library allocation
page read and write
1682000
trusted library allocation
page read and write
2856000
direct allocation
page read and write
1030000
trusted library allocation
page read and write
5570000
heap
page read and write
7FFAA9E20000
trusted library allocation
page execute and read and write
1B7EF000
stack
page read and write
2326000
direct allocation
page read and write
98D000
heap
page read and write
BCAF000
stack
page read and write
A2D0000
heap
page read and write
894000
heap
page read and write
7FFAA9E50000
trusted library allocation
page execute and read and write
5640000
trusted library allocation
page read and write
750000
unkown
page readonly
5586000
trusted library allocation
page read and write
23AA000
direct allocation
page read and write
7150000
heap
page read and write
3713000
trusted library allocation
page read and write
C68C000
stack
page read and write
7FFAACC8A000
trusted library allocation
page execute and read and write
3B13000
trusted library allocation
page read and write
EFA000
heap
page read and write
888000
heap
page read and write
2D0C000
trusted library allocation
page read and write
4DF4000
heap
page read and write
6340000
unkown
page readonly
7D5000
heap
page read and write
367E000
trusted library allocation
page read and write
981000
heap
page read and write
DD0000
heap
page read and write
1300000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
563E000
stack
page read and write
38FF000
trusted library allocation
page read and write
7FFAA9D40000
trusted library allocation
page read and write
B31000
heap
page read and write
E49000
heap
page read and write
9140000
trusted library allocation
page execute and read and write
B3B000
heap
page read and write
16C000
stack
page read and write
9C9000
heap
page read and write
BEB0000
trusted library allocation
page execute and read and write
C3E000
stack
page read and write
9DA0000
heap
page read and write
6A57A000
unkown
page readonly
7FFAA9E50000
trusted library allocation
page execute and read and write
CD0000
heap
page read and write
2B21000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
BD3000
heap
page read and write
96A000
heap
page read and write
3839000
trusted library allocation
page read and write
3788000
trusted library allocation
page read and write
55F2000
unkown
page readonly
3A83000
direct allocation
page read and write
7FFAA9E16000
trusted library allocation
page execute and read and write
3312000
trusted library allocation
page read and write
F70000
heap
page read and write
1210000
heap
page execute and read and write
31AE000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
7FDBE000
direct allocation
page read and write
214A1240000
heap
page read and write
942000
heap
page read and write
B08000
heap
page read and write
A9A000
heap
page read and write
F5E000
heap
page read and write
2A8E000
stack
page read and write
5472000
heap
page read and write
151E000
stack
page read and write
BEF0000
unkown
page readonly
7FFAA9DBC000
trusted library allocation
page execute and read and write
3890000
direct allocation
page read and write
68D0000
heap
page read and write
53FD000
trusted library allocation
page read and write
903D000
stack
page read and write
7FFAA9D70000
trusted library allocation
page read and write
894000
heap
page read and write
6352000
unkown
page readonly
57A7000
direct allocation
page read and write
1B8CE000
stack
page read and write
12BD000
trusted library allocation
page execute and read and write
2474000
direct allocation
page read and write
3819000
trusted library allocation
page read and write
3914000
trusted library allocation
page read and write
4DE3000
heap
page read and write
30EE000
stack
page read and write
B630000
trusted library allocation
page read and write
22CA000
direct allocation
page read and write
1010000
heap
page read and write
AE0000
heap
page read and write
A03000
trusted library allocation
page read and write
2446000
direct allocation
page read and write
C4E000
heap
page read and write
CE10000
trusted library allocation
page read and write
3B7A000
trusted library allocation
page read and write
50F9000
stack
page read and write
3700000
trusted library allocation
page read and write
977000
heap
page read and write
1B1AE000
stack
page read and write
A40000
heap
page read and write
9E0000
heap
page read and write
35CD000
trusted library allocation
page read and write
AFA000
heap
page read and write
52BE000
stack
page read and write
1563000
heap
page read and write
64F0000
trusted library allocation
page read and write
7B0000
heap
page execute and read and write
5740000
direct allocation
page read and write
6DE000
unkown
page readonly
1BB4D000
stack
page read and write
600000
heap
page read and write
9D0000
heap
page read and write
CDF0000
trusted library allocation
page read and write
E67000
heap
page read and write
5780000
trusted library allocation
page read and write
7805000
heap
page read and write
84B000
heap
page read and write
1700000
trusted library allocation
page read and write
6880000
trusted library allocation
page execute and read and write
E6A000
trusted library allocation
page execute and read and write
9C32000
unkown
page readonly
9D4000
heap
page read and write
750000
heap
page read and write
6860000
trusted library allocation
page execute and read and write
1B4B0000
heap
page read and write
5572000
heap
page read and write
BB90000
trusted library allocation
page read and write
C2E000
stack
page read and write
4BA000
unkown
page read and write
B08000
heap
page read and write
10AB000
trusted library allocation
page execute and read and write
AD9000
heap
page read and write
12E0000
trusted library allocation
page read and write
A300000
trusted library allocation
page read and write
4DF4000
heap
page read and write
39E8000
trusted library allocation
page read and write
CE90000
unkown
page readonly
2BF0000
heap
page read and write
77BB000
heap
page read and write
7260000
trusted library section
page readonly
894000
heap
page read and write
AFA000
heap
page read and write
3140000
heap
page read and write
A9A000
heap
page read and write
45B000
heap
page read and write
12AD000
stack
page read and write
FA0000
heap
page read and write
1BE3A000
stack
page read and write
894000
heap
page read and write
953000
heap
page read and write
9BB0000
trusted library allocation
page read and write
38AE000
trusted library allocation
page read and write
74E0000
heap
page read and write
109E000
stack
page read and write
2A40000
trusted library allocation
page read and write
157E000
heap
page read and write
3100000
heap
page read and write
3817000
direct allocation
page read and write
894000
heap
page read and write
1B7BE000
stack
page read and write
5570000
heap
page read and write
9F90000
heap
page read and write
3690000
unkown
page read and write
B39000
heap
page read and write
22EE000
stack
page read and write
9F0000
trusted library allocation
page read and write
6A58B000
unkown
page readonly
2C14000
trusted library allocation
page read and write
3F9F000
stack
page read and write
39C5000
trusted library allocation
page read and write
5769000
direct allocation
page read and write
12E5000
trusted library allocation
page execute and read and write
8F90000
trusted library allocation
page execute and read and write
16EB000
trusted library allocation
page execute and read and write
986000
heap
page read and write
B02000
heap
page read and write
720000
heap
page read and write
36FE000
stack
page read and write
2425000
direct allocation
page read and write
BCE0000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
EDF000
stack
page read and write
9DD000
heap
page read and write
691C000
stack
page read and write
53DB000
trusted library allocation
page read and write
3957000
direct allocation
page read and write
38EE000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
3C0000
heap
page read and write
A1D0000
heap
page read and write
6080000
trusted library allocation
page read and write
9AA0000
unkown
page readonly
C70000
heap
page read and write
1BF4E000
stack
page read and write
BD40000
trusted library allocation
page read and write
7FFAA9D47000
trusted library allocation
page read and write
7044D000
unkown
page read and write
2D6E000
stack
page read and write
EAE000
heap
page read and write
B92000
trusted library allocation
page execute and read and write
894000
heap
page read and write
282F000
direct allocation
page read and write
3C23000
heap
page read and write
D63000
heap
page read and write
A1BA000
heap
page read and write
31DC000
trusted library allocation
page read and write
8D50000
trusted library allocation
page execute and read and write
F27000
heap
page read and write
8666000
heap
page read and write
10BA000
trusted library allocation
page read and write
AD9000
heap
page read and write
3134000
trusted library allocation
page read and write
894000
heap
page read and write
A85000
heap
page read and write
894000
heap
page read and write
EDF000
heap
page read and write
A50000
heap
page read and write
2454000
direct allocation
page read and write
141E000
stack
page read and write
7FFAA9DE0000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
980000
heap
page read and write
9D7000
heap
page read and write
7FFAA9E16000
trusted library allocation
page execute and read and write
A8C000
heap
page read and write
5893000
direct allocation
page read and write
57EE000
stack
page read and write
261B000
stack
page read and write
33E0000
trusted library allocation
page read and write
232D000
direct allocation
page read and write
C60000
heap
page read and write
1E0000
heap
page read and write
B02000
heap
page read and write
FF7C0000
trusted library allocation
page execute and read and write
792000
heap
page read and write
F3F000
heap
page read and write
1687000
trusted library allocation
page execute and read and write
6B7E000
stack
page read and write
E72000
unkown
page readonly
CE00000
trusted library allocation
page read and write
894000
heap
page read and write
592D000
stack
page read and write
7FFAA9D40000
trusted library allocation
page read and write
A7B000
heap
page read and write
342E000
trusted library allocation
page read and write
F4A000
heap
page read and write
2AF0000
heap
page execute and read and write
D0F000
heap
page read and write
43AA000
trusted library allocation
page read and write
A86000
heap
page read and write
6D9000
unkown
page write copy
6858000
stack
page read and write
89D8000
heap
page read and write
AE3000
heap
page read and write
894000
heap
page read and write
7FFAACBD2000
trusted library allocation
page execute and read and write
CCEE000
stack
page read and write
234A000
direct allocation
page read and write
A01E000
heap
page read and write
7FF4ECB80000
trusted library allocation
page execute and read and write
12B0000
heap
page read and write
5794000
direct allocation
page read and write
2B2C000
trusted library allocation
page read and write
22FA000
direct allocation
page read and write
BDBE000
stack
page read and write
A89000
heap
page read and write
9CF000
stack
page read and write
3841000
direct allocation
page read and write
5D9F000
stack
page read and write
474E000
stack
page read and write
A97000
heap
page read and write
E3E000
stack
page read and write
428000
heap
page read and write
1157000
heap
page read and write
398A000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
5A00000
unkown
page readonly
B09000
heap
page read and write
B90000
heap
page read and write
3ABC000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
BDB000
trusted library allocation
page execute and read and write
E29000
heap
page read and write
58A0000
heap
page execute and read and write
280C000
direct allocation
page read and write
1145000
heap
page read and write
231F000
direct allocation
page read and write
B5EF000
heap
page read and write
CE32000
unkown
page readonly
57BE000
stack
page read and write
714000
stack
page read and write
2ABE000
stack
page read and write
38D7000
trusted library allocation
page read and write
E2C000
heap
page read and write
25A0000
direct allocation
page read and write
8BA0000
trusted library section
page read and write
1370000
heap
page read and write
9CF000
heap
page read and write
420000
heap
page read and write
5570000
heap
page read and write
B55F000
heap
page read and write
1410000
heap
page read and write
A080000
heap
page read and write
ACB000
heap
page read and write
105E000
stack
page read and write
246B000
direct allocation
page read and write
3A7B000
trusted library allocation
page read and write
70E0000
heap
page read and write
AE9000
heap
page read and write
894000
heap
page read and write
BD7000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
23B1000
direct allocation
page read and write
2361000
direct allocation
page read and write
8C4F000
stack
page read and write
2D11000
trusted library allocation
page read and write
B02000
heap
page read and write
9B20000
trusted library allocation
page execute and read and write
2682000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
3B83000
trusted library allocation
page read and write
1BD2E000
stack
page read and write
AAC000
heap
page read and write
1BA7D000
stack
page read and write
96C000
heap
page read and write
1680000
trusted library allocation
page read and write
981000
heap
page read and write
3A8D000
trusted library allocation
page read and write
7FDE0000
direct allocation
page read and write
913E000
stack
page read and write
446000
heap
page read and write
2ED7000
trusted library allocation
page read and write
995000
stack
page read and write
7D0000
heap
page read and write
B3C000
heap
page read and write
3B0F000
trusted library allocation
page read and write
6FE8000
heap
page read and write
58A8000
direct allocation
page read and write
AF5000
heap
page read and write
2386000
direct allocation
page read and write
14A8000
heap
page read and write
5C30000
trusted library allocation
page read and write
880000
heap
page read and write
24C2000
direct allocation
page read and write
249F000
direct allocation
page read and write
4DF4000
heap
page read and write
3CA1000
heap
page read and write
CECA000
unkown
page readonly
7DE000
heap
page read and write
7D0000
heap
page read and write
283D000
direct allocation
page read and write
377E000
direct allocation
page read and write
7FF41C620000
trusted library allocation
page execute and read and write
EF5000
heap
page read and write
831000
heap
page read and write
53FD000
stack
page read and write
281F000
direct allocation
page read and write
8B60000
trusted library allocation
page read and write
9680000
trusted library allocation
page execute and read and write
1373000
heap
page read and write
3A91000
trusted library allocation
page read and write
4C6000
unkown
page readonly
12A0000
trusted library allocation
page read and write
2430000
heap
page read and write
894000
heap
page read and write
843000
heap
page read and write
9BD5000
trusted library allocation
page read and write
C61E000
stack
page read and write
2B10000
heap
page read and write
BF0000
heap
page read and write
6D61000
heap
page read and write
7FFAA9D53000
trusted library allocation
page read and write
25E0000
heap
page read and write
132E000
stack
page read and write
93B000
heap
page read and write
B29000
heap
page read and write
2B9E000
stack
page read and write
B14000
heap
page read and write
5594000
trusted library allocation
page read and write
3AB6000
trusted library allocation
page read and write
510D000
stack
page read and write
7FFAACC9A000
trusted library allocation
page execute and read and write
C70000
heap
page read and write
2F17000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
13C0000
heap
page read and write
2EB1000
trusted library allocation
page read and write
4B7000
unkown
page read and write
CDB000
heap
page read and write
27B0000
direct allocation
page read and write
A12B000
heap
page read and write
7FFAACD02000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
7FFAA9D50000
trusted library allocation
page read and write
8681000
heap
page read and write
9FD8000
heap
page read and write
5895000
direct allocation
page read and write
3C34000
heap
page read and write
96A000
heap
page read and write
85B000
stack
page read and write
CA0B000
stack
page read and write
585E000
direct allocation
page read and write
AF1000
heap
page read and write
2341000
direct allocation
page read and write
59FE000
stack
page read and write
10EB000
heap
page read and write
D35000
heap
page read and write
5C10000
trusted library allocation
page read and write
B559000
heap
page read and write
2634000
trusted library allocation
page read and write
B2B000
heap
page read and write
B39000
heap
page read and write
A62000
heap
page read and write
64D0000
trusted library allocation
page read and write
1F0000
heap
page read and write
12B28000
trusted library allocation
page read and write
6A8D7000
unkown
page write copy
CED0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
B14000
heap
page read and write
6A582000
unkown
page readonly
586A000
direct allocation
page read and write
12B4000
trusted library allocation
page read and write
39EB000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
8621000
heap
page read and write
FD0000
heap
page read and write
CD2000
heap
page read and write
3B52000
trusted library allocation
page read and write
3B31000
trusted library allocation
page read and write
2823000
heap
page read and write
33E8000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
79B000
heap
page read and write
12B21000
trusted library allocation
page read and write
EF0000
heap
page read and write
894000
heap
page read and write
115F000
heap
page read and write
957000
heap
page read and write
8695000
heap
page read and write
43BF000
trusted library allocation
page read and write
860000
heap
page read and write
1ACDE000
stack
page read and write
3A24000
trusted library allocation
page read and write
CB1F000
stack
page read and write
894000
heap
page read and write
F54000
heap
page read and write
89BF000
heap
page read and write
38B2000
trusted library allocation
page read and write
2829000
direct allocation
page read and write
1390000
heap
page execute and read and write
790000
heap
page read and write
24CA000
direct allocation
page read and write
77D2000
heap
page read and write
39D5000
trusted library allocation
page read and write
CE22000
unkown
page readonly
3A45000
direct allocation
page read and write
2853000
direct allocation
page read and write
5200000
heap
page read and write
920000
heap
page read and write
A55000
heap
page read and write
894000
heap
page read and write
AF4000
heap
page read and write
A1B5000
heap
page read and write
B742000
trusted library allocation
page read and write
1163000
heap
page read and write
4E2000
heap
page read and write
4DF5000
heap
page read and write
BBB0000
trusted library allocation
page execute and read and write
58A6000
direct allocation
page read and write
370D000
trusted library allocation
page read and write
12F0000
heap
page execute and read and write
3C37000
heap
page read and write
B30000
heap
page read and write
AFA000
heap
page read and write
7760000
heap
page read and write
3857000
trusted library allocation
page read and write
AB2000
unkown
page readonly
558B000
trusted library allocation
page read and write
1BF48000
stack
page read and write
37F3000
trusted library allocation
page read and write
894000
heap
page read and write
8675000
heap
page read and write
3785000
direct allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
C80E000
stack
page read and write
E72000
trusted library allocation
page execute and read and write
3530000
direct allocation
page read and write
DAF000
heap
page read and write
3959000
trusted library allocation
page read and write
BE0000
heap
page execute and read and write
783C000
heap
page read and write
386C000
direct allocation
page read and write
6EF000
stack
page read and write
E61000
heap
page read and write
11CA000
trusted library allocation
page read and write
72C0000
heap
page execute and read and write
D73000
heap
page read and write
37BE000
stack
page read and write
3404000
trusted library allocation
page read and write
B2C000
heap
page read and write
7FFAA9D3D000
trusted library allocation
page execute and read and write
5CC000
unkown
page readonly
894000
heap
page read and write
392E000
trusted library allocation
page read and write
3A9C000
trusted library allocation
page read and write
AD0000
heap
page read and write
7250000
heap
page read and write
AF2000
heap
page read and write
7FFAA9D4D000
trusted library allocation
page execute and read and write
3BA0000
heap
page read and write
85E0000
heap
page read and write
7FFAA9E50000
trusted library allocation
page execute and read and write
11C0000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
387A000
trusted library allocation
page read and write
780000
heap
page read and write
2368000
direct allocation
page read and write
CE20000
unkown
page readonly
7FFAACBC2000
trusted library allocation
page execute and read and write
60A2000
unkown
page readonly
894000
heap
page read and write
1220000
heap
page read and write
2720000
direct allocation
page execute and read and write
1F2000
unkown
page readonly
38E3000
trusted library allocation
page read and write
F5E000
stack
page read and write
A045000
heap
page read and write
9D0000
heap
page read and write
9B000
stack
page read and write
214A0FC0000
heap
page read and write
3918000
trusted library allocation
page read and write
B2D000
heap
page read and write
AFB000
heap
page read and write
AA0000
heap
page read and write
166D000
trusted library allocation
page execute and read and write
3210000
trusted library allocation
page read and write
AED000
heap
page read and write
121E000
stack
page read and write
2CF0000
trusted library allocation
page read and write
1B84E000
stack
page read and write
202000
unkown
page readonly
10B4000
trusted library allocation
page read and write
4DF1000
heap
page read and write
36E4000
trusted library allocation
page read and write
2770000
heap
page read and write
3AB1000
trusted library allocation
page read and write
38F6000
trusted library allocation
page read and write
ABF000
stack
page read and write
A2E0000
trusted library allocation
page execute and read and write
7C8000
heap
page read and write
7FFAA9E10000
trusted library allocation
page read and write
E8A000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
12EE5000
trusted library allocation
page read and write
12D13000
trusted library allocation
page read and write
3A99000
trusted library allocation
page read and write
E4C000
heap
page read and write
1BF7B000
stack
page read and write
2EE6000
trusted library allocation
page read and write
AD0000
heap
page read and write
120E000
trusted library allocation
page read and write
389F000
trusted library allocation
page read and write
F80000
heap
page read and write
EC5000
heap
page read and write
A116000
heap
page read and write
3A19000
direct allocation
page read and write
AE8000
heap
page read and write
20000
trusted library allocation
page read and write
AF1000
heap
page read and write
6D30000
heap
page read and write
12D18000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
7FFAA9DF6000
trusted library allocation
page read and write
6A471000
unkown
page execute read
520E000
stack
page read and write
965000
heap
page read and write
4DE0000
heap
page read and write
2865000
direct allocation
page read and write
39E0000
trusted library allocation
page read and write
AE4000
heap
page read and write
7FFAA9D64000
trusted library allocation
page read and write
6E80000
unkown
page readonly
4DE0000
heap
page read and write
98B000
heap
page read and write
885000
heap
page read and write
24D8000
direct allocation
page read and write
23A0000
direct allocation
page read and write
9D0000
heap
page read and write
7FFAA9D44000
trusted library allocation
page read and write
30F0000
trusted library allocation
page execute and read and write
E87000
trusted library allocation
page execute and read and write
E26000
heap
page read and write
5A02000
unkown
page readonly
2351000
direct allocation
page read and write
7D2000
heap
page read and write
33E4000
trusted library allocation
page read and write
6F4000
unkown
page readonly
214A10E0000
heap
page read and write
233C000
direct allocation
page read and write
6DA8000
heap
page read and write
4DE4000
heap
page read and write
2430000
direct allocation
page read and write
DE6000
heap
page read and write
10B0000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
27F7000
direct allocation
page read and write
7BC000
heap
page read and write
9A89000
trusted library allocation
page read and write
2323000
direct allocation
page read and write
95B000
heap
page read and write
AF5000
heap
page read and write
AAF000
heap
page read and write
1750000
heap
page read and write
12E01000
trusted library allocation
page read and write
3B2F000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
6DB4000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
2E80000
trusted library allocation
page read and write
C1F0000
trusted library allocation
page read and write
33ED000
trusted library allocation
page read and write
50CE000
stack
page read and write
6A8DB000
unkown
page readonly
3E0000
heap
page read and write
4DE6000
heap
page read and write
200000
unkown
page readonly
3A17000
trusted library allocation
page read and write
2E49000
trusted library allocation
page read and write
ACB000
heap
page read and write
1237000
stack
page read and write
321C000
trusted library allocation
page read and write
12D11000
trusted library allocation
page read and write
96FC000
stack
page read and write
1280000
heap
page read and write
1110000
heap
page read and write
2817000
direct allocation
page read and write
C99000
heap
page read and write
6C9000
unkown
page read and write
57ED000
stack
page read and write
3850000
direct allocation
page read and write
7788000
heap
page read and write
27C8000
direct allocation
page read and write
899B000
heap
page read and write
1654000
trusted library allocation
page read and write
5670000
heap
page read and write
7FFAA9DF0000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
7FFAACD02000
trusted library allocation
page read and write
1B4C0000
heap
page execute and read and write
6F4000
stack
page read and write
7FF4DE4F0000
trusted library allocation
page execute and read and write
559F000
stack
page read and write
125E8000
trusted library allocation
page read and write
7EE000
heap
page read and write
CEC000
heap
page read and write
4DF6000
heap
page read and write
6410000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
16F7000
heap
page read and write
385E000
direct allocation
page read and write
A20C000
heap
page read and write
EE3000
heap
page read and write
1415000
heap
page read and write
A55000
heap
page read and write
CC8F000
stack
page read and write
12E05000
trusted library allocation
page read and write
31DF000
trusted library allocation
page read and write
53F0000
heap
page read and write
894000
heap
page read and write
A1E2000
heap
page read and write
36F2000
trusted library allocation
page read and write
36B3000
trusted library allocation
page read and write
894000
heap
page read and write
43F000
heap
page read and write
38C6000
trusted library allocation
page read and write
3EA1000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
121E8000
trusted library allocation
page read and write
AD8000
heap
page read and write
F44000
heap
page read and write
36A0000
trusted library allocation
page read and write
6C7000
unkown
page write copy
894000
heap
page read and write
11BE000
stack
page read and write
894000
heap
page read and write
95B000
heap
page read and write
3C20000
heap
page read and write
1653000
trusted library allocation
page execute and read and write
5777000
direct allocation
page read and write
57AA000
direct allocation
page read and write
1350000
heap
page read and write
C48000
heap
page read and write
5798000
direct allocation
page read and write
559E000
trusted library allocation
page read and write
A89000
heap
page read and write
BD70000
trusted library allocation
page execute and read and write
7CA000
heap
page read and write
35FC000
trusted library allocation
page read and write
ADA000
heap
page read and write
64B0000
trusted library allocation
page read and write
9B0000
heap
page read and write
C00000
heap
page read and write
784000
heap
page read and write
5C60000
trusted library allocation
page read and write
10B5000
heap
page read and write
894000
heap
page read and write
1B970000
heap
page read and write
232A000
direct allocation
page read and write
7D3000
heap
page read and write
4EB8000
trusted library allocation
page read and write
7FFAACD10000
trusted library allocation
page execute and read and write
10D0000
trusted library allocation
page read and write
26C0000
heap
page read and write
760000
trusted library allocation
page read and write
2580000
direct allocation
page read and write
A00000
trusted library allocation
page read and write
8B30000
trusted library allocation
page execute and read and write
890000
heap
page read and write
3BA0000
heap
page read and write
3810000
direct allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
248C000
direct allocation
page read and write
894000
heap
page read and write
B610000
heap
page read and write
C67E000
stack
page read and write
7521000
heap
page read and write
3B09000
trusted library allocation
page read and write
BBA0000
trusted library allocation
page read and write
24A4000
direct allocation
page read and write
11E0000
heap
page read and write
5899000
direct allocation
page read and write
F00000
heap
page read and write
3408000
trusted library allocation
page read and write
72E0000
heap
page read and write
C8C9000
stack
page read and write
480F000
stack
page read and write
894000
heap
page read and write
894000
heap
page read and write
3B85000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
9BC0000
trusted library allocation
page execute and read and write
16A0000
trusted library allocation
page read and write
A8E000
heap
page read and write
9CB000
heap
page read and write
1020000
heap
page execute and read and write
AAC000
heap
page read and write
F4F000
heap
page read and write
200000
unkown
page readonly
C90C000
stack
page read and write
3EDE000
stack
page read and write
73C0000
trusted library allocation
page execute and read and write
1190000
trusted library allocation
page read and write
3610000
direct allocation
page read and write
C80000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
3A38000
trusted library allocation
page read and write
C34E000
stack
page read and write
6CE000
unkown
page read and write
DBE000
stack
page read and write
7C7000
heap
page read and write
5300000
heap
page read and write
77D7000
heap
page read and write
39E4000
trusted library allocation
page read and write
6A595000
unkown
page read and write
93E000
heap
page read and write
9E7000
heap
page read and write
B39000
heap
page read and write
7F2000
heap
page read and write
1210000
heap
page read and write
7FFAA9D44000
trusted library allocation
page read and write
3CA0000
heap
page read and write
3770000
direct allocation
page read and write
A98000
heap
page read and write
93000
stack
page read and write
A88000
heap
page read and write
894000
heap
page read and write
8D68000
trusted library allocation
page read and write
C63C000
stack
page read and write
58EE000
stack
page read and write
B8F0000
trusted library allocation
page read and write
965000
heap
page read and write
5BE000
stack
page read and write
3CA1000
heap
page read and write
233A000
direct allocation
page read and write
13F0000
heap
page read and write
894000
heap
page read and write
7FFAACC90000
trusted library allocation
page read and write
7FFAACC82000
trusted library allocation
page execute and read and write
81A000
heap
page read and write
55F0000
unkown
page readonly
31BB000
trusted library allocation
page read and write
24E8000
direct allocation
page read and write
3A5F000
trusted library allocation
page read and write
7FFAACBDA000
trusted library allocation
page execute and read and write
53BE000
stack
page read and write
7CD000
heap
page read and write
4111000
trusted library allocation
page read and write
A1B3000
heap
page read and write
F20000
heap
page read and write
95F000
heap
page read and write
9678000
stack
page read and write
3813000
trusted library allocation
page read and write
640000
heap
page read and write
2394000
direct allocation
page read and write
3410000
trusted library allocation
page read and write
1B4AB000
stack
page read and write
5494000
heap
page read and write
7FFAA9ED2000
trusted library allocation
page read and write
5D5D000
stack
page read and write
3130000
trusted library allocation
page read and write
4114000
trusted library allocation
page read and write
C3A0000
trusted library allocation
page read and write
E20000
heap
page read and write
977000
heap
page read and write
3B8D000
trusted library allocation
page read and write
8950000
heap
page read and write
4DE4000
heap
page read and write
AF4000
heap
page read and write
6FE000
stack
page read and write
894000
heap
page read and write
7FD50000
direct allocation
page read and write
108E000
stack
page read and write
2429000
direct allocation
page read and write
97FF000
stack
page read and write
5877000
direct allocation
page read and write
B02000
heap
page read and write
B2E000
heap
page read and write
107B000
stack
page read and write
7FB00000
direct allocation
page read and write
8D6E000
trusted library allocation
page read and write
1488000
heap
page read and write
4DE3000
heap
page read and write
AE0000
heap
page read and write
2D10000
trusted library allocation
page read and write
392C000
trusted library allocation
page read and write
371D000
trusted library allocation
page read and write
6C7000
unkown
page read and write
63A0000
trusted library allocation
page execute and read and write
8D70000
trusted library allocation
page read and write
AF6000
heap
page read and write
BEE0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
2301000
direct allocation
page read and write
11A0000
trusted library allocation
page execute and read and write
989000
heap
page read and write
A1F1000
heap
page read and write
CE92000
unkown
page readonly
A80000
heap
page read and write
21EF000
trusted library allocation
page read and write
5C50000
heap
page execute and read and write
64C0000
trusted library allocation
page read and write
3C22000
heap
page read and write
BB70000
trusted library allocation
page execute and read and write
9FAA000
heap
page read and write
1AB6C000
stack
page read and write
3A22000
trusted library allocation
page read and write
F15000
heap
page read and write
894000
heap
page read and write
101E000
stack
page read and write
E3F000
stack
page read and write
5A10000
trusted library allocation
page execute and read and write
BAC000
trusted library allocation
page execute and read and write
38AD000
trusted library allocation
page read and write
507A000
stack
page read and write
24BB000
direct allocation
page read and write
378C000
direct allocation
page read and write
343B000
trusted library allocation
page read and write
9D0000
heap
page read and write
867B000
heap
page read and write
788000
stack
page read and write
7FFAA9D4D000
trusted library allocation
page execute and read and write
4B7000
unkown
page read and write
21E1000
trusted library allocation
page read and write
1AFA0000
heap
page read and write
563E000
stack
page read and write
5886000
direct allocation
page read and write
928000
heap
page read and write
1317000
heap
page read and write
1178000
stack
page read and write
7FDF0000
direct allocation
page read and write
B00000
heap
page read and write
4CA0000
heap
page read and write
DF0000
heap
page read and write
1670000
trusted library allocation
page read and write
715000
heap
page read and write
B29000
heap
page read and write
27FB000
direct allocation
page read and write
894000
heap
page read and write
AF0000
heap
page read and write
5C70000
trusted library allocation
page execute and read and write
2CFE000
stack
page read and write
2318000
direct allocation
page read and write
3962000
trusted library allocation
page read and write
AD0000
heap
page read and write
3730000
direct allocation
page read and write
10F1000
trusted library allocation
page read and write
6CF9000
trusted library allocation
page read and write
1AD20000
heap
page execute and read and write
894000
heap
page read and write
503F000
stack
page read and write
BB30000
trusted library allocation
page read and write
3EC3000
trusted library allocation
page read and write
237F000
direct allocation
page read and write
199000
stack
page read and write
576D000
trusted library allocation
page read and write
1BD4E000
stack
page read and write
E7C000
trusted library allocation
page execute and read and write
8D10000
trusted library allocation
page read and write
DD0000
heap
page read and write
97A000
heap
page read and write
9BE000
stack
page read and write
9C1C000
stack
page read and write
A62000
heap
page read and write
58D0000
heap
page read and write
B5E000
stack
page read and write
894000
heap
page read and write
D1C000
heap
page read and write
2638000
trusted library allocation
page read and write
8683000
heap
page read and write
AF7000
heap
page read and write
894000
heap
page read and write
2464000
direct allocation
page read and write
12E2000
trusted library allocation
page read and write
CEE0000
trusted library allocation
page execute and read and write
3B81000
trusted library allocation
page read and write
7FFAACC82000
trusted library allocation
page execute and read and write
894000
heap
page read and write
A86000
heap
page read and write
3A04000
trusted library allocation
page read and write
7FFAA9D6D000
trusted library allocation
page execute and read and write
A1C7000
heap
page read and write
7FFAACCC2000
trusted library allocation
page execute and read and write
2805000
direct allocation
page read and write
B3E000
heap
page read and write
BCD0000
trusted library allocation
page execute and read and write
8D30000
trusted library allocation
page execute and read and write
3B4E000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
27F0000
heap
page read and write
3B2B000
trusted library allocation
page read and write
8DB0000
trusted library allocation
page execute and read and write
16D0000
trusted library allocation
page read and write
3815000
trusted library allocation
page read and write
9C9000
heap
page read and write
CA0000
heap
page read and write
2E10000
trusted library allocation
page read and write
3B00000
trusted library allocation
page read and write
B0B000
heap
page read and write
ACC000
heap
page read and write
E70000
unkown
page readonly
82D000
heap
page read and write
894000
heap
page read and write
7FFAACC8A000
trusted library allocation
page execute and read and write
7FFB0CCA0000
unkown
page read and write
C14B000
stack
page read and write
263C000
trusted library allocation
page read and write
548E000
stack
page read and write
11C4000
trusted library allocation
page read and write
7CD000
heap
page read and write
E50000
trusted library allocation
page read and write
9B000
stack
page read and write
3C35000
heap
page read and write
AF1000
heap
page read and write
3966000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
12B000
stack
page read and write
FF540000
trusted library allocation
page execute and read and write
2CF4000
trusted library allocation
page read and write
27BD000
direct allocation
page read and write
993B000
stack
page read and write
847000
heap
page read and write
6BE000
stack
page read and write
3C20000
heap
page read and write
4DA0000
heap
page read and write
55E7000
trusted library allocation
page read and write
16EE000
stack
page read and write
168B000
trusted library allocation
page execute and read and write
7FFAA9D34000
trusted library allocation
page read and write
970000
heap
page read and write
2814000
direct allocation
page read and write
5B80000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
A1E7000
heap
page read and write
3853000
trusted library allocation
page read and write
5100000
unclassified section
page read and write
894000
heap
page read and write
60C2000
unkown
page readonly
575E000
trusted library allocation
page read and write
7FFAA9D9C000
trusted library allocation
page execute and read and write
8955000
heap
page read and write
23B8000
direct allocation
page read and write
894000
heap
page read and write
5747000
direct allocation
page read and write
3986000
trusted library allocation
page read and write
FDE000
stack
page read and write
DF0C000
stack
page read and write
2830000
direct allocation
page read and write
BEF2000
unkown
page readonly
B2B000
heap
page read and write
7CA000
heap
page read and write
894000
heap
page read and write
F8C000
heap
page read and write
9B30000
heap
page execute and read and write
214A0EE0000
heap
page read and write
5550000
heap
page read and write
A9A000
heap
page read and write
B3E000
unkown
page readonly
11AF000
stack
page read and write
39CA000
trusted library allocation
page read and write
812000
heap
page read and write
A7E000
stack
page read and write
BD4000
stack
page read and write
6FCA000
unkown
page readonly
9C30000
unkown
page readonly
283F000
direct allocation
page read and write
5470000
heap
page read and write
1243000
heap
page read and write
3A86000
trusted library allocation
page read and write
3E9F000
stack
page read and write
221F000
stack
page read and write
58BE000
stack
page read and write
C90E000
stack
page read and write
AF0000
heap
page read and write
3F5A000
trusted library allocation
page read and write
7FE10000
direct allocation
page read and write
567B000
stack
page read and write
3874000
direct allocation
page read and write
ACF000
heap
page read and write
168E000
stack
page read and write
251A000
direct allocation
page read and write
4EA8000
trusted library allocation
page read and write
5933000
heap
page read and write
281B000
direct allocation
page read and write
320C000
trusted library allocation
page read and write
760000
heap
page read and write
14A4000
trusted library allocation
page read and write
1BB7E000
stack
page read and write
C390000
trusted library allocation
page execute and read and write
1185000
heap
page read and write
1200000
trusted library allocation
page read and write
4B9000
unkown
page read and write
386F000
trusted library allocation
page read and write
1480000
heap
page read and write
9E9000
heap
page read and write
7044F000
unkown
page readonly
4F8C000
stack
page read and write
3111000
trusted library allocation
page read and write
508D000
stack
page read and write
AF4000
heap
page read and write
2871000
direct allocation
page read and write
894000
heap
page read and write
1246000
heap
page read and write
835000
heap
page read and write
B2A000
heap
page read and write
894000
heap
page read and write
E92000
trusted library allocation
page execute and read and write
997C000
stack
page read and write
D69000
heap
page read and write
6F0000
heap
page read and write
10AE000
stack
page read and write
26C5000
direct allocation
page read and write
1337000
stack
page read and write
AE6000
heap
page read and write
AD0000
heap
page read and write
6A7B0000
unkown
page readonly
5570000
heap
page read and write
B5F9000
heap
page read and write
1A76D000
stack
page read and write
2498000
direct allocation
page read and write
968000
heap
page read and write
B30000
heap
page read and write
894000
heap
page read and write
1BE4E000
stack
page read and write
894000
heap
page read and write
10A0000
trusted library allocation
page read and write
15CF000
stack
page read and write
520F000
stack
page read and write
3120000
trusted library allocation
page read and write
788000
heap
page read and write
1940000
heap
page read and write
16D6000
heap
page read and write
894000
heap
page read and write
7270000
trusted library allocation
page read and write
A9A000
heap
page read and write
553E000
stack
page read and write
3608000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
BFE0000
heap
page read and write
1390000
heap
page read and write
2521000
direct allocation
page read and write
7FFAA9D3D000
trusted library allocation
page execute and read and write
7FDE6000
direct allocation
page read and write
7305000
heap
page read and write
5470000
heap
page read and write
B04000
heap
page read and write
13F5000
heap
page read and write
6DE2000
heap
page read and write
16D7000
trusted library allocation
page execute and read and write
3B6A000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
544E000
stack
page read and write
FE0000
heap
page read and write
7FFAA9DF0000
trusted library allocation
page read and write
D6C000
heap
page read and write
9D7A000
unkown
page readonly
9B40000
trusted library allocation
page read and write
217E000
stack
page read and write
2504000
direct allocation
page read and write
A190000
heap
page read and write
7FFAA9ED2000
trusted library allocation
page read and write
957000
heap
page read and write
6D1000
unkown
page read and write
55E1000
trusted library allocation
page read and write
8C0E000
stack
page read and write
A07B000
heap
page read and write
324E000
stack
page read and write
DF5000
heap
page read and write
388F000
trusted library allocation
page read and write
2A50000
heap
page read and write
5732000
direct allocation
page read and write
5930000
heap
page read and write
57DE000
stack
page read and write
1650000
trusted library allocation
page read and write
894000
heap
page read and write
400000
unkown
page readonly
10B0000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
894000
heap
page read and write
10FA000
trusted library allocation
page read and write
193C000
stack
page read and write
1B64F000
stack
page read and write
2418000
direct allocation
page read and write
894000
heap
page read and write
BC6D000
stack
page read and write
4DA1000
heap
page read and write
BD0000
heap
page read and write
74DE000
stack
page read and write
14C0000
heap
page read and write
514000
unkown
page readonly
B2B000
heap
page read and write
BB20000
trusted library allocation
page execute and read and write
7FFAA9E60000
trusted library allocation
page execute and read and write
27D7000
direct allocation
page read and write
894000
heap
page read and write
5470000
heap
page read and write
894000
heap
page read and write
AD2000
heap
page read and write
250C000
direct allocation
page read and write
3A12000
direct allocation
page read and write
27D0000
direct allocation
page read and write
959000
stack
page read and write
3964000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
69E000
stack
page read and write
575D000
direct allocation
page read and write
283F000
direct allocation
page read and write
E8E000
heap
page read and write
F20000
heap
page read and write
2358000
direct allocation
page read and write
1660000
trusted library allocation
page read and write
24BC000
direct allocation
page read and write
575000
heap
page read and write
58A4000
heap
page execute and read and write
12B23000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
BFDF000
stack
page read and write
F80000
heap
page read and write
F731EA9000
stack
page read and write
4DF4000
heap
page read and write
C640000
trusted library allocation
page execute and read and write
7FDC7000
direct allocation
page read and write
2C8E000
stack
page read and write
8A6000
heap
page read and write
38F8000
trusted library allocation
page read and write
46D0000
heap
page read and write
833000
heap
page read and write
AE2000
heap
page read and write
3A39000
direct allocation
page read and write
1210000
heap
page read and write
AD1000
heap
page read and write
AFC000
heap
page read and write
AD7000
heap
page read and write
4B7000
unkown
page write copy
16DA000
trusted library allocation
page execute and read and write
8D75000
trusted library allocation
page read and write
3A57000
trusted library allocation
page read and write
4C0000
unkown
page read and write
3C20000
heap
page read and write
8B40000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
837000
heap
page read and write
B9A000
trusted library allocation
page execute and read and write
894000
heap
page read and write
90E000
stack
page read and write
1310000
heap
page read and write
3953000
trusted library allocation
page read and write
569E000
stack
page read and write
4DA1000
heap
page read and write
894000
heap
page read and write
AAC000
heap
page read and write
880000
heap
page read and write
6A8D8000
unkown
page read and write
B02000
heap
page read and write
DC0E000
stack
page read and write
C7F000
heap
page read and write
9AE0000
trusted library allocation
page read and write
484E000
stack
page read and write
AE8000
heap
page read and write
894000
heap
page read and write
D20000
heap
page read and write
ACF000
heap
page read and write
A9A000
heap
page read and write
9CB000
heap
page read and write
3844000
trusted library allocation
page read and write
269E000
stack
page read and write
942000
heap
page read and write
CAC000
heap
page read and write
82C000
heap
page read and write
894000
heap
page read and write
6D75000
heap
page read and write
394E000
trusted library allocation
page read and write
894000
heap
page read and write
77AE000
heap
page read and write
12D01000
trusted library allocation
page read and write
B2C000
heap
page read and write
DE0E000
stack
page read and write
7FFAACCC2000
trusted library allocation
page execute and read and write
3B6F000
trusted library allocation
page read and write
977000
heap
page read and write
7FFAA9D8C000
trusted library allocation
page execute and read and write
451000
heap
page read and write
829000
heap
page read and write
5470000
heap
page read and write
BEA0000
trusted library allocation
page execute and read and write
396A000
trusted library allocation
page read and write
3833000
direct allocation
page read and write
263A000
trusted library allocation
page read and write
4E50000
heap
page read and write
5850000
trusted library allocation
page read and write
1B930000
heap
page read and write
24C3000
direct allocation
page read and write
A86000
heap
page read and write
7FFAACD10000
trusted library allocation
page execute and read and write
7FFAA9EF0000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
C7CC000
stack
page read and write
24EF000
direct allocation
page read and write
894000
heap
page read and write
36B0000
direct allocation
page read and write
12E7000
trusted library allocation
page execute and read and write
2820000
heap
page read and write
381D000
trusted library allocation
page read and write
27B7000
direct allocation
page read and write
1BC4E000
stack
page read and write
16C0000
trusted library allocation
page read and write
5762000
direct allocation
page read and write
3A1B000
trusted library allocation
page read and write
9B70000
heap
page read and write
72D0000
trusted library allocation
page read and write
57AF000
direct allocation
page read and write
B03000
heap
page read and write
2D00000
heap
page execute and read and write
3740000
trusted library allocation
page read and write
894000
heap
page read and write
7FFB0CCA2000
unkown
page readonly
62DE000
stack
page read and write
F8A000
heap
page read and write
AE7000
heap
page read and write
214A0FE9000
heap
page read and write
1D0000
heap
page read and write
7B3000
heap
page read and write
2AD0000
heap
page execute and read and write
971000
heap
page read and write
2822000
direct allocation
page read and write
5490000
heap
page read and write
B39000
heap
page read and write
34DF000
trusted library allocation
page read and write
27B0000
direct allocation
page read and write
1100000
heap
page read and write
675C000
stack
page read and write
3939000
direct allocation
page read and write
894000
heap
page read and write
AE7000
heap
page read and write
AC4000
heap
page read and write
A80000
heap
page read and write
5863000
direct allocation
page read and write
8900000
trusted library allocation
page execute and read and write
B14000
heap
page read and write
3B9F000
stack
page read and write
7FFAA9D64000
trusted library allocation
page read and write
1C04B000
stack
page read and write
7FFAA9DFC000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
396E000
trusted library allocation
page read and write
6D57000
heap
page read and write
388E000
trusted library allocation
page read and write
23F0000
direct allocation
page read and write
2AF8000
heap
page read and write
894000
heap
page read and write
1BD7E000
stack
page read and write
7FFAA9D6B000
trusted library allocation
page execute and read and write
13C5000
heap
page read and write
7C3000
heap
page read and write
4C2000
unkown
page write copy
8D78000
trusted library allocation
page read and write
349E000
trusted library allocation
page read and write
1B94E000
stack
page read and write
36EB000
trusted library allocation
page read and write
574B000
trusted library allocation
page read and write
1B54F000
heap
page read and write
10A2000
trusted library allocation
page read and write
894000
heap
page read and write
39DC000
trusted library allocation
page read and write
894000
heap
page read and write
3C20000
heap
page read and write
A2F0000
trusted library allocation
page read and write
1BA3E000
stack
page read and write
894000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
9B60000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
6DA4000
heap
page read and write
7390000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
2809000
direct allocation
page read and write
6E0000
unkown
page readonly
9B80000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
12EE1000
trusted library allocation
page read and write
9AC0000
unkown
page readonly
374C000
trusted library allocation
page read and write
AF1000
heap
page read and write
23EF000
stack
page read and write
38B5000
direct allocation
page read and write
9CD000
heap
page read and write
AD3000
heap
page read and write
894000
heap
page read and write
B2D000
heap
page read and write
214A1245000
heap
page read and write
3C37000
heap
page read and write
1358000
heap
page read and write
1215000
heap
page read and write
BCC0000
trusted library allocation
page execute and read and write
12CD000
trusted library allocation
page execute and read and write
4DDD000
heap
page read and write
3A77000
trusted library allocation
page read and write
DE0000
heap
page read and write
1676000
trusted library allocation
page execute and read and write
C66000
heap
page read and write
7E2000
heap
page read and write
24CA000
direct allocation
page read and write
A62000
heap
page read and write
47CE000
stack
page read and write
894000
heap
page read and write
111E000
stack
page read and write
64E0000
trusted library allocation
page execute and read and write
894000
heap
page read and write
11F0000
heap
page read and write
77D9000
heap
page read and write
27E5000
direct allocation
page read and write
BE0000
direct allocation
page read and write
35B000
stack
page read and write
5700000
direct allocation
page read and write
2632000
trusted library allocation
page read and write
9F7D000
stack
page read and write
3A6E000
direct allocation
page read and write
5C6C000
trusted library allocation
page read and write
5841000
direct allocation
page read and write
B5CD000
heap
page read and write
165D000
trusted library allocation
page execute and read and write
B0F000
heap
page read and write
2D01000
trusted library allocation
page read and write
27DE000
direct allocation
page read and write
5792000
direct allocation
page read and write
16E7000
trusted library allocation
page execute and read and write
2411000
direct allocation
page read and write
BB50000
trusted library allocation
page execute and read and write
996000
stack
page read and write
35F5000
trusted library allocation
page read and write
1548000
heap
page read and write
8D40000
trusted library allocation
page read and write
3A55000
direct allocation
page read and write
3D4000
unkown
page readonly
9D7000
heap
page read and write
12E09000
trusted library allocation
page read and write
11EF000
stack
page read and write
9C20000
heap
page read and write
3530000
direct allocation
page read and write
38EC000
trusted library allocation
page read and write
54E000
stack
page read and write
3AF5000
trusted library allocation
page read and write
9E3000
heap
page read and write
2D20000
heap
page read and write
AE5000
heap
page read and write
BE0000
direct allocation
page read and write
284D000
direct allocation
page read and write
384F000
trusted library allocation
page read and write
36AF000
trusted library allocation
page read and write
2280000
direct allocation
page read and write
7FFAA9F02000
trusted library allocation
page read and write
18C000
stack
page read and write
7FFAA9E80000
trusted library allocation
page execute and read and write
78E000
heap
page read and write
ACF000
heap
page read and write
2468000
direct allocation
page read and write
2A8E000
stack
page read and write
AC7000
heap
page read and write
AEB000
heap
page read and write
55D0000
trusted library allocation
page read and write
630000
heap
page read and write
B5C8000
heap
page read and write
2E6E000
stack
page read and write
2401000
direct allocation
page read and write
C38E000
stack
page read and write
AEA000
heap
page read and write
3936000
trusted library allocation
page read and write
894000
heap
page read and write
9CF000
heap
page read and write
6400000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
A9A000
heap
page read and write
50BC000
stack
page read and write
18C000
stack
page read and write
214A0FE0000
heap
page read and write
7FFAA9D3D000
trusted library allocation
page execute and read and write
58AB000
direct allocation
page read and write
1ABAD000
stack
page read and write
894000
heap
page read and write
894000
heap
page read and write
894000
heap
page read and write
7BB000
heap
page read and write
A15C000
heap
page read and write
9A7C000
stack
page read and write
7FFAA9E26000
trusted library allocation
page execute and read and write
A1AD000
heap
page read and write
37F3000
trusted library allocation
page read and write
BED0000
trusted library allocation
page read and write
A86000
heap
page read and write
7E4000
heap
page read and write
AB0000
unkown
page readonly
6A1B000
stack
page read and write
97A000
heap
page read and write
EA8000
heap
page read and write
392A000
trusted library allocation
page read and write
82E000
heap
page read and write
53FE000
stack
page read and write
1B0AD000
stack
page read and write
520000
heap
page read and write
1BE7E000
stack
page read and write
1B730000
heap
page read and write
11F6000
heap
page read and write
5890000
heap
page read and write
BAA000
trusted library allocation
page execute and read and write
7AC000
heap
page read and write
ADC000
heap
page read and write
1E0000
heap
page read and write
520000
heap
page read and write
60A0000
unkown
page readonly
21F1000
trusted library allocation
page read and write
A1A0000
heap
page read and write
2451000
direct allocation
page read and write
244D000
direct allocation
page read and write
54F0000
heap
page read and write
894D000
heap
page read and write
856000
unkown
page readonly
5787000
direct allocation
page read and write
ED0000
heap
page read and write
9FB9000
heap
page read and write
2648000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
9B82000
trusted library allocation
page read and write
DDCE000
stack
page read and write
8DD0000
trusted library allocation
page read and write
23FA000
direct allocation
page read and write
95D000
heap
page read and write
3777000
direct allocation
page read and write
EE0000
heap
page read and write
3971000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
300F000
stack
page read and write
3A30000
direct allocation
page read and write
B09000
heap
page read and write
73A0000
trusted library allocation
page execute and read and write
14B0000
trusted library allocation
page read and write
10E5000
heap
page read and write
12EE9000
trusted library allocation
page read and write
148E000
stack
page read and write
8FA0000
trusted library allocation
page read and write
5873000
direct allocation
page read and write
27E8000
direct allocation
page read and write
1020000
heap
page read and write
16CF000
stack
page read and write
C35000
heap
page read and write
3A42000
trusted library allocation
page read and write
12D6000
trusted library allocation
page execute and read and write
9FFB000
heap
page read and write
12B3000
trusted library allocation
page execute and read and write
AE1000
heap
page read and write
5740000
trusted library allocation
page read and write
B40000
direct allocation
page execute and read and write
478F000
stack
page read and write
1B500000
heap
page read and write
3A13000
trusted library allocation
page read and write
2378000
direct allocation
page read and write
BF5000
heap
page read and write
27F4000
direct allocation
page read and write
A78000
heap
page read and write
114B000
heap
page read and write
5580000
trusted library allocation
page read and write
384D000
trusted library allocation
page read and write
7DB000
heap
page read and write
39A9000
trusted library allocation
page read and write
2B2F000
trusted library allocation
page read and write
C51D000
stack
page read and write
3B4A000
trusted library allocation
page read and write
3C11000
trusted library allocation
page read and write
50E000
stack
page read and write
1AE2F000
stack
page read and write
4C0000
unkown
page read and write
263E000
trusted library allocation
page read and write
23B4000
direct allocation
page read and write
363C000
trusted library allocation
page read and write
9AC2000
unkown
page readonly
8D80000
trusted library allocation
page execute and read and write
A1D4000
heap
page read and write
B724000
trusted library allocation
page read and write
25A0000
direct allocation
page read and write
AC7000
heap
page read and write
10EE000
trusted library allocation
page read and write
E87000
heap
page read and write
971000
heap
page read and write
3C21000
heap
page read and write
84E000
stack
page read and write
5800000
trusted library allocation
page read and write
125E1000
trusted library allocation
page read and write
DCCD000
stack
page read and write
238D000
direct allocation
page read and write
5BF0000
trusted library allocation
page read and write
3C32000
heap
page read and write
C77F000
stack
page read and write
8910000
heap
page read and write
AF4000
heap
page read and write
63B0000
unkown
page readonly
B5DF000
heap
page read and write
894000
heap
page read and write
8D80000
trusted library allocation
page read and write
BE0000
heap
page read and write
9E0000
heap
page read and write
3C20000
heap
page read and write
FF0000
trusted library allocation
page execute and read and write
5570000
heap
page read and write
6DB0000
heap
page read and write
AE8000
heap
page read and write
9B50000
trusted library allocation
page execute and read and write
58FE000
stack
page read and write
AAE000
heap
page read and write
968000
heap
page read and write
21D0000
heap
page read and write
27A0000
heap
page read and write
860000
heap
page read and write
3892000
trusted library allocation
page read and write
16D9000
heap
page read and write
98E000
unkown
page read and write
9A80000
trusted library allocation
page read and write
7FFAA9D8C000
trusted library allocation
page execute and read and write
6EE000
stack
page read and write
174E000
stack
page read and write
AD2000
heap
page read and write
1F0000
unkown
page readonly
12B0000
trusted library allocation
page read and write
F96000
unkown
page readonly
5150000
heap
page read and write
3A8F000
trusted library allocation
page read and write
8B20000
trusted library allocation
page execute and read and write
3C20000
heap
page read and write
3794000
direct allocation
page read and write
1415000
heap
page read and write
6A7B1000
unkown
page execute read
7FFAA9F00000
trusted library allocation
page execute and read and write
1B0AB000
stack
page read and write
121E1000
trusted library allocation
page read and write
C53C000
stack
page read and write
7FFAA9ED2000
trusted library allocation
page read and write
10B0000
heap
page read and write
28CE000
stack
page read and write
84E000
heap
page read and write
3C34000
heap
page read and write
10B8000
heap
page read and write
3604000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
98C000
heap
page read and write
896D000
heap
page read and write
940000
heap
page read and write
5A42000
unkown
page readonly
10EE000
stack
page read and write
1F0000
unkown
page readonly
7E0000
heap
page read and write
8D60000
trusted library allocation
page read and write
3857000
direct allocation
page read and write
2D8E000
stack
page read and write
B29000
heap
page read and write
A1AB000
heap
page read and write
B53E000
heap
page read and write
B0F000
heap
page read and write
1B74F000
stack
page read and write
3882000
trusted library allocation
page read and write
5A3E000
stack
page read and write
7300000
heap
page read and write
2B1C000
heap
page read and write
3990000
trusted library allocation
page read and write
894000
heap
page read and write
9DD000
heap
page read and write
C3B0000
trusted library allocation
page read and write
16B0000
trusted library allocation
page execute and read and write
AE8000
heap
page read and write
487000
heap
page read and write
36B1000
trusted library allocation
page read and write
7FFB0CC81000
unkown
page execute read
3610000
direct allocation
page read and write
894000
heap
page read and write
A95000
heap
page read and write
3891000
trusted library allocation
page read and write
400000
heap
page read and write
F6F000
stack
page read and write
30F0000
trusted library allocation
page execute and read and write
7FF4DE500000
trusted library allocation
page execute and read and write
7FFAA9D50000
trusted library allocation
page read and write
38F3000
trusted library allocation
page read and write
570000
heap
page read and write
7FFB0CC96000
unkown
page readonly
19D000
stack
page read and write
BC2000
trusted library allocation
page execute and read and write
7D9000
heap
page read and write
F10000
heap
page read and write
B2F000
heap
page read and write
58EE000
stack
page read and write
F24000
heap
page read and write
89D000
heap
page read and write
9AB0000
trusted library allocation
page execute and read and write
CA6000
heap
page read and write
89BC000
heap
page read and write
1375000
heap
page read and write
577C000
stack
page read and write
9D0000
heap
page read and write
F85000
heap
page read and write
54FE000
stack
page read and write
114F000
heap
page read and write
B530000
heap
page read and write
2859000
direct allocation
page read and write
4DF4000
heap
page read and write
838000
heap
page read and write
2810000
direct allocation
page read and write
27FE000
direct allocation
page read and write
287E000
direct allocation
page read and write
BB80000
trusted library allocation
page read and write
2343000
direct allocation
page read and write
3432000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
E20000
heap
page read and write
8B50000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
239C000
direct allocation
page read and write
F4C000
heap
page read and write
838000
heap
page read and write
6D1000
unkown
page read and write
64AE000
stack
page read and write
1B6DE000
stack
page read and write
2ACE000
stack
page read and write
894000
heap
page read and write
2C2E000
stack
page read and write
38BE000
trusted library allocation
page read and write
6DC0000
heap
page read and write
235A000
direct allocation
page read and write
7B7000
heap
page read and write
4DF1000
heap
page read and write
55C6000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
A2B0000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
AFE000
heap
page read and write
1B6DE000
stack
page read and write
894000
heap
page read and write
4FCD000
stack
page read and write
3A1F000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page execute and read and write
C7CE000
stack
page read and write
3C20000
heap
page read and write
6E50000
trusted library allocation
page read and write
BF18000
unkown
page readonly
B2A000
heap
page read and write
45D000
heap
page read and write
4C4000
unkown
page readonly
6CC0000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
4C9F000
stack
page read and write
33EF000
trusted library allocation
page read and write
5824000
direct allocation
page read and write
11B0000
heap
page execute and read and write
10F0000
heap
page read and write
BF9E000
stack
page read and write
C78B000
stack
page read and write
3B07000
trusted library allocation
page read and write
CAB000
heap
page read and write
12EF000
stack
page read and write
3E9F000
stack
page read and write
9BD9000
trusted library allocation
page read and write
E94000
heap
page read and write
8669000
heap
page read and write
8DC0000
trusted library allocation
page read and write
AD6000
heap
page read and write
9C0000
heap
page read and write
284F000
direct allocation
page read and write
12D03000
trusted library allocation
page read and write
FA5000
heap
page read and write
5A30000
trusted library allocation
page read and write
8E50000
trusted library allocation
page read and write
4DDD000
heap
page read and write
8976000
heap
page read and write
8870000
trusted library allocation
page execute and read and write
AD9000
heap
page read and write
E89000
heap
page read and write
9D90000
heap
page read and write
285D000
direct allocation
page read and write
C30000
heap
page read and write
AFC000
heap
page read and write
5A20000
trusted library allocation
page read and write
7044D000
unkown
page read and write
7E2000
heap
page read and write
E51000
heap
page read and write
39AD000
trusted library allocation
page read and write
79F000
heap
page read and write
A86000
heap
page read and write
56DE000
stack
page read and write
3C0000
unkown
page readonly
956000
stack
page read and write
849000
heap
page read and write
5470000
heap
page read and write
2B31000
trusted library allocation
page read and write
F60000
heap
page read and write
577E000
stack
page read and write
894000
heap
page read and write
13E0000
heap
page read and write
894000
heap
page read and write
3A54000
trusted library allocation
page read and write
E5D000
heap
page read and write
2B1F000
heap
page read and write
97FA000
stack
page read and write
A9A000
heap
page read and write
3683000
trusted library allocation
page read and write
B00000
heap
page read and write
C95000
heap
page read and write
38B7000
trusted library allocation
page read and write
B39000
heap
page read and write
11F0000
trusted library allocation
page execute and read and write
14B6000
heap
page read and write
AE5000
heap
page read and write
3CA0000
heap
page read and write
84D000
heap
page read and write
55C0000
trusted library allocation
page read and write
ACB000
heap
page read and write
B3B000
heap
page read and write
D19000
heap
page read and write
3865000
direct allocation
page read and write
5766000
trusted library allocation
page read and write
2EA0000
heap
page execute and read and write
1B540000
heap
page read and write
6E82000
unkown
page readonly
9FA0000
heap
page read and write
AF0000
heap
page read and write
2472000
direct allocation
page read and write
B29000
heap
page read and write
9CC000
heap
page read and write
3A3C000
trusted library allocation
page read and write
2496000
direct allocation
page read and write
894000
heap
page read and write
4DAE000
stack
page read and write
B5CB000
heap
page read and write
3B89000
trusted library allocation
page read and write
1685000
trusted library allocation
page execute and read and write
AEA000
heap
page read and write
E50000
heap
page read and write
C250000
trusted library allocation
page execute and read and write
8C50000
trusted library allocation
page execute and read and write
5888000
direct allocation
page read and write
E5F000
heap
page read and write
6FD0000
heap
page read and write
489000
heap
page read and write
ACF000
heap
page read and write
5584000
trusted library allocation
page read and write
ADF000
stack
page read and write
2AF0000
heap
page read and write
5773000
direct allocation
page read and write
1B93E000
stack
page read and write
2802000
direct allocation
page read and write
A1CB000
heap
page read and write
AE0000
heap
page read and write
578E000
direct allocation
page read and write
3B0B000
trusted library allocation
page read and write
B39000
heap
page read and write
3C20000
heap
page read and write
7FFAA9D6D000
trusted library allocation
page execute and read and write
4312000
trusted library allocation
page read and write
70430000
unkown
page readonly
5848000
direct allocation
page read and write
6D6000
unkown
page read and write
19D000
stack
page read and write
D30000
heap
page read and write
1B6E1000
trusted library allocation
page read and write
8FB0000
trusted library allocation
page read and write
7FFAA9EE2000
trusted library allocation
page read and write
C40000
heap
page read and write
14A3000
trusted library allocation
page execute and read and write
AF5000
heap
page read and write
5A46000
unkown
page readonly
3932000
trusted library allocation
page read and write
B00000
heap
page read and write
AD8000
heap
page read and write
9B86000
trusted library allocation
page read and write
2847000
direct allocation
page read and write
372F000
trusted library allocation
page read and write
2580000
direct allocation
page read and write
3835000
trusted library allocation
page read and write
3C3A000
heap
page read and write
778C000
heap
page read and write
6A8D5000
unkown
page read and write
7FFB0CC80000
unkown
page readonly
1B50E000
heap
page read and write
2479000
direct allocation
page read and write
372D000
trusted library allocation
page read and write
7FFAA9E16000
trusted library allocation
page execute and read and write
2836000
direct allocation
page read and write
3746000
trusted library allocation
page read and write
72BC000
stack
page read and write
1ABD0000
heap
page read and write
10E0000
heap
page read and write
2626000
direct allocation
page read and write
74F0000
heap
page read and write
7FFAA9E00000
trusted library allocation
page execute and read and write
7FDE0000
direct allocation
page read and write
1240000
heap
page read and write
7E6000
heap
page read and write
AB0000
heap
page read and write
894000
heap
page read and write
AEA000
heap
page read and write
2461000
direct allocation
page read and write
11C0000
trusted library allocation
page read and write
968000
heap
page read and write
AC7000
heap
page read and write
6A470000
unkown
page readonly
1A5E0000
trusted library allocation
page read and write
3768000
direct allocation
page read and write
70431000
unkown
page execute read
84D000
heap
page read and write
C24C000
stack
page read and write
3218000
trusted library allocation
page read and write
AAE000
heap
page read and write
A0CF000
heap
page read and write
AFC000
heap
page read and write
57A5000
direct allocation
page read and write
13D8000
heap
page read and write
EF2000
heap
page read and write
24B4000
direct allocation
page read and write
BC0000
heap
page execute and read and write
26DF000
stack
page read and write
7B7000
heap
page read and write
16D0000
heap
page read and write
3876000
direct allocation
page read and write
8A1000
heap
page read and write
4DC1000
heap
page read and write
983E000
stack
page read and write
3C22000
heap
page read and write
6A8BA000
unkown
page readonly
10A7000
trusted library allocation
page execute and read and write
3761000
direct allocation
page read and write
7D9000
heap
page read and write
25DE000
stack
page read and write
2CBE000
stack
page read and write
AC7000
heap
page read and write
1B28C000
stack
page read and write
63B2000
unkown
page readonly
894000
heap
page read and write
23A3000
direct allocation
page read and write
4DEE000
heap
page read and write
27D0000
direct allocation
page read and write
9BD0000
trusted library allocation
page read and write
AD5000
heap
page read and write
2220000
direct allocation
page read and write
CE6000
heap
page read and write
1B83E000
stack
page read and write
C3B0000
trusted library allocation
page execute and read and write
7135000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
93000
stack
page read and write
53F6000
trusted library allocation
page read and write
9D2000
heap
page read and write
2528000
direct allocation
page read and write
C4DC000
stack
page read and write
80E000
unkown
page read and write
2F06000
trusted library allocation
page read and write
984000
heap
page read and write
22E1000
direct allocation
page read and write
A52000
heap
page read and write
8880000
trusted library allocation
page read and write
1015000
heap
page read and write
82C000
heap
page read and write
3220000
trusted library allocation
page read and write
B32000
heap
page read and write
CF4000
stack
page read and write
5662000
unkown
page readonly
AD0000
heap
page read and write
9ED000
heap
page read and write
E9A000
trusted library allocation
page execute and read and write
CCA0000
trusted library allocation
page execute and read and write
894000
heap
page read and write
7FFAA9D74000
trusted library allocation
page read and write
6A598000
unkown
page read and write
7FFAACBDA000
trusted library allocation
page execute and read and write
39B0000
trusted library allocation
page read and write
384B000
trusted library allocation
page read and write
39A5000
trusted library allocation
page read and write
4DEA000
heap
page read and write
BA4000
stack
page read and write
6F0000
heap
page read and write
3D0000
heap
page read and write
603D000
stack
page read and write
B00000
heap
page read and write
AD6000
heap
page read and write
3C20000
heap
page read and write
10E0000
trusted library allocation
page read and write
7FFAA9D47000
trusted library allocation
page read and write
6D6000
unkown
page read and write
16E0000
trusted library allocation
page read and write
7FFAACBD2000
trusted library allocation
page execute and read and write
A1E000
stack
page read and write
6D8000
heap
page read and write
960000
heap
page read and write
7FFAA9D80000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
760000
heap
page read and write
2847000
direct allocation
page read and write
894000
heap
page read and write
39DE000
trusted library allocation
page read and write
8918000
heap
page read and write
371B000
trusted library allocation
page read and write
9AA2000
unkown
page readonly
2EF7000
trusted library allocation
page read and write
8D20000
trusted library allocation
page execute and read and write
2630000
trusted library allocation
page read and write
2837000
direct allocation
page read and write
A9A000
heap
page read and write
894000
heap
page read and write
CE0000
heap
page read and write
AD4000
heap
page read and write
5831000
direct allocation
page read and write
7FFAA9E46000
trusted library allocation
page execute and read and write
3874000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
9B90000
trusted library allocation
page read and write
AD8000
heap
page read and write
3A5B000
trusted library allocation
page read and write
A40000
heap
page read and write
9D0000
trusted library allocation
page read and write
F38000
heap
page read and write
249D000
direct allocation
page read and write
367E000
stack
page read and write
There are 2219 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://docs.customrp.xyz/setting-up
https://docs.customrp.xyz/setting-up