IOC Report
RustStore_Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
RustStore_Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Recovery\cmd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7hM3IriNjv.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\hyperdriverIntoruntimeHost\BridgeSurrogatenet.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\hyperdriverIntoruntimeHost\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\hyperdriverIntoruntimeHost\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\hyperdriverIntoruntimeHost\RyNGDgfn2lqcEdmANFTv.vbe
data
dropped
malicious
C:\hyperdriverIntoruntimeHost\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\ebf1f9fa8afd6d
ASCII text, with very long lines (481), with no line terminators
dropped
C:\Users\Public\Desktop\c8b7bf62a6a3f6
ASCII text, with very long lines (938), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BridgeSurrogatenet.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cmd.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\MvCJNUdD46
ASCII text, with no line terminators
dropped
C:\hyperdriverIntoruntimeHost\5940a34987c991
ASCII text, with no line terminators
dropped
C:\hyperdriverIntoruntimeHost\9e8d7a4ca61bd9
ASCII text, with very long lines (310), with no line terminators
dropped
C:\hyperdriverIntoruntimeHost\IP7oFx0Ch.bat
ASCII text, with no line terminators
dropped
C:\hyperdriverIntoruntimeHost\c8b7bf62a6a3f6
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RustStore_Setup.exe
"C:\Users\user\Desktop\RustStore_Setup.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\hyperdriverIntoruntimeHost\RyNGDgfn2lqcEdmANFTv.vbe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\hyperdriverIntoruntimeHost\IP7oFx0Ch.bat" "
malicious
C:\hyperdriverIntoruntimeHost\BridgeSurrogatenet.exe
"C:\hyperdriverIntoruntimeHost\BridgeSurrogatenet.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "LFLHWlcKpdKxiJMBhoVPGEPQyHcZL" /sc MINUTE /mo 8 /tr "'C:\hyperdriverIntoruntimeHost\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "LFLHWlcKpdKxiJMBhoVPGEPQyHcZ" /sc ONLOGON /tr "'C:\hyperdriverIntoruntimeHost\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "LFLHWlcKpdKxiJMBhoVPGEPQyHcZL" /sc MINUTE /mo 13 /tr "'C:\hyperdriverIntoruntimeHost\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "LFLHWlcKpdKxiJMBhoVPGEPQyHcZL" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "LFLHWlcKpdKxiJMBhoVPGEPQyHcZ" /sc ONLOGON /tr "'C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "LFLHWlcKpdKxiJMBhoVPGEPQyHcZL" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\Recovery\cmd.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\cmd.exe'" /rl HIGHEST /f
malicious
C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Recovery\cmd.exe'" /rl HIGHEST /f
malicious
C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\hyperdriverIntoruntimeHost\dllhost.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\hyperdriverIntoruntimeHost\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\hyperdriverIntoruntimeHost\dllhost.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\hyperdriverIntoruntimeHost\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\hyperdriverIntoruntimeHost\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\hyperdriverIntoruntimeHost\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\7hM3IriNjv.bat"
malicious
C:\Recovery\cmd.exe
C:\Recovery\cmd.exe
malicious
C:\Recovery\cmd.exe
C:\Recovery\cmd.exe
malicious
C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe
"C:\Users\Public\Desktop\LFLHWlcKpdKxiJMBhoVPGEPQyHcZ.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\ec1d18bd90516c1626fad7c3e8f1c60adfff7271
8a6b9d6fdf5024aa0b50779414daf9b72b8d8086
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
2691000
trusted library allocation
page read and write
malicious
297D000
trusted library allocation
page read and write
malicious
30E1000
trusted library allocation
page read and write
malicious
2941000
trusted library allocation
page read and write
malicious
2C4D000
trusted library allocation
page read and write
malicious
130ED000
trusted library allocation
page read and write
malicious
33BC000
trusted library allocation
page read and write
malicious
2BF1000
trusted library allocation
page read and write
malicious
2AE1000
trusted library allocation
page read and write
malicious
2C11000
trusted library allocation
page read and write
malicious
26CC000
trusted library allocation
page read and write
malicious
7FF848F00000
trusted library allocation
page read and write
2DB0000
heap
page read and write
7FF8491E0000
trusted library allocation
page execute and read and write
13C7B000
trusted library allocation
page read and write
2F86000
heap
page read and write
12C18000
trusted library allocation
page read and write
72CF000
stack
page read and write
7FF848EF3000
trusted library allocation
page read and write
1614000
heap
page read and write
6858000
heap
page read and write
1095000
heap
page read and write
2BE6000
stack
page read and write
1C481000
heap
page read and write
7FF848D34000
trusted library allocation
page read and write
1CD384C7000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
39FFFDE000
stack
page read and write
DFB000
heap
page read and write
68D0000
trusted library allocation
page read and write
1BA6F000
stack
page read and write
2D00000
heap
page read and write
BD0000
heap
page execute and read and write
1B914000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
1BA90000
heap
page read and write
512E000
stack
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
7FF848D43000
trusted library allocation
page execute and read and write
7FF848D67000
trusted library allocation
page read and write
1C906000
heap
page read and write
12943000
trusted library allocation
page read and write
2CD1000
heap
page read and write
7FF848FA7000
trusted library allocation
page read and write
1C928000
heap
page read and write
D2E000
heap
page read and write
A31000
unkown
page execute read
9E0000
heap
page read and write
7FF848D47000
trusted library allocation
page read and write
1CD38490000
heap
page read and write
302D000
heap
page read and write
12D0000
heap
page read and write
1C90D000
heap
page read and write
860000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
1CD384B0000
heap
page read and write
3024000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
D14000
heap
page read and write
1CD38470000
heap
page read and write
4D31000
trusted library allocation
page read and write
67D0000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
7FF848E8F000
trusted library allocation
page execute and read and write
7FF848D77000
trusted library allocation
page read and write
C30000
heap
page read and write
4DA4000
heap
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
2CD9000
heap
page read and write
C70000
heap
page read and write
D7D000
heap
page read and write
274E000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1C83B000
heap
page read and write
D68000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
12AE8000
trusted library allocation
page read and write
274B000
trusted library allocation
page read and write
7FF848EEC000
trusted library allocation
page read and write
1B71E000
stack
page read and write
2CBA000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
A63000
unkown
page readonly
7FF848E6F000
trusted library allocation
page execute and read and write
685A000
heap
page read and write
12AF1000
trusted library allocation
page read and write
71D1000
heap
page read and write
7FF848EEE000
trusted library allocation
page read and write
12C1D000
trusted library allocation
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
30BF000
stack
page read and write
575C000
stack
page read and write
1BA1E000
stack
page read and write
1350000
heap
page execute and read and write
A6E000
unkown
page read and write
2FC9000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
1BB53000
stack
page read and write
7FF848D84000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
2FC9000
heap
page read and write
1C895000
heap
page read and write
1B465000
heap
page read and write
2B16000
stack
page read and write
B92000
unkown
page readonly
E40000
heap
page read and write
1CC5E000
stack
page read and write
B90000
unkown
page readonly
7FF848DE0000
trusted library allocation
page read and write
A30000
unkown
page readonly
2C19000
stack
page read and write
12B82000
trusted library allocation
page read and write
33E2000
trusted library allocation
page read and write
1C2AD000
stack
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
135E000
heap
page read and write
1CD386A0000
heap
page read and write
8A2000
heap
page read and write
88F000
heap
page read and write
336D000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
4E7E000
stack
page read and write
2CF8000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
2F6F000
stack
page read and write
1B9BB000
stack
page read and write
7FF848D77000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
1C75A000
stack
page read and write
2CB6000
heap
page read and write
2CCA000
heap
page read and write
534D000
stack
page read and write
2CBF000
heap
page read and write
2F8D000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
12BF8000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
30C0000
trusted library section
page read and write
29ED000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
4F70000
heap
page read and write
2FB4000
heap
page read and write
315E000
stack
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
FE0000
heap
page read and write
1C2D0000
trusted library section
page read and write
34C1000
trusted library allocation
page read and write
293E000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
2CCD000
heap
page read and write
1C850000
heap
page read and write
12BF1000
trusted library allocation
page read and write
EAD000
heap
page read and write
866000
heap
page read and write
2CB9000
heap
page read and write
2CBE000
heap
page read and write
E00000
heap
page read and write
1180000
trusted library allocation
page read and write
EC9000
heap
page read and write
1B370000
heap
page execute and read and write
1BB13000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
F35000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
1B110000
heap
page read and write
1BBC0000
heap
page read and write
C10000
heap
page read and write
12AE3000
trusted library allocation
page read and write
89F000
heap
page read and write
1090000
heap
page read and write
133E000
heap
page read and write
1210000
heap
page read and write
2CC7000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF848D57000
trusted library allocation
page read and write
A63000
unkown
page readonly
4F50000
heap
page read and write
101E000
stack
page read and write
3024000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
12B4000
heap
page read and write
302D000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
12F5000
heap
page read and write
A92000
unkown
page write copy
13CE000
heap
page read and write
7250000
heap
page read and write
12951000
trusted library allocation
page read and write
1140000
heap
page read and write
12C0000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
7FF848D9C000
trusted library allocation
page execute and read and write
2CD4000
heap
page read and write
12FD000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
1D31E000
stack
page read and write
8EF000
heap
page read and write
1B51E000
stack
page read and write
12BFD000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848D6C000
trusted library allocation
page read and write
736000
stack
page read and write
2C0E000
stack
page read and write
1C8DB000
heap
page read and write
12E32000
trusted library allocation
page read and write
2CB5000
heap
page read and write
3388000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
273B000
stack
page read and write
1A970000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
2D15000
heap
page read and write
2D22000
heap
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
1C360000
trusted library section
page read and write
1B61E000
stack
page read and write
1B570000
heap
page read and write
3042000
heap
page read and write
12691000
trusted library allocation
page read and write
E2F000
heap
page read and write
565B000
stack
page read and write
2F60000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1BDAF000
stack
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
D8C000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848F23000
trusted library allocation
page read and write
27A0000
heap
page read and write
2F9F000
heap
page read and write
29F6000
trusted library allocation
page read and write
7FF848DE6000
trusted library allocation
page read and write
1C7C0000
trusted library section
page read and write
9C6000
stack
page read and write
1250000
heap
page read and write
1342000
heap
page read and write
2CD6000
heap
page read and write
2748000
trusted library allocation
page read and write
2CBC000
heap
page read and write
7FF848F16000
trusted library allocation
page read and write
2ADE000
stack
page read and write
BE5000
heap
page read and write
1C91D000
heap
page read and write
1C8C8000
heap
page read and write
2BDC000
stack
page read and write
1C2B0000
trusted library section
page read and write
1200000
heap
page read and write
1C840000
heap
page read and write
1BA70000
trusted library section
page read and write
7FF848EFB000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
12AE1000
trusted library allocation
page read and write
7FF8490D2000
trusted library allocation
page read and write
7FF848F21000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
126A1000
trusted library allocation
page read and write
1B5EE000
stack
page read and write
7FF848E06000
trusted library allocation
page read and write
3042000
heap
page read and write
2986000
trusted library allocation
page read and write
12F1000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
7FF848E16000
trusted library allocation
page read and write
2F91000
heap
page read and write
128D2000
trusted library allocation
page read and write
2F9E000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
2CF8000
heap
page read and write
551E000
stack
page read and write
B80000
heap
page execute and read and write
2FC9000
heap
page read and write
2740000
trusted library allocation
page read and write
2CC2000
heap
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
2D15000
heap
page read and write
29F0000
trusted library allocation
page read and write
AD7000
unkown
page readonly
1C2E0000
trusted library section
page read and write
7FF848FC0000
trusted library allocation
page read and write
E71000
heap
page read and write
D10000
heap
page read and write
4DA0000
heap
page read and write
2D60000
heap
page readonly
2FF0000
heap
page read and write
1C979000
heap
page read and write
5076000
heap
page read and write
2D15000
heap
page read and write
E6C000
heap
page read and write
7FF848F27000
trusted library allocation
page read and write
302D000
heap
page read and write
12D22000
trusted library allocation
page read and write
A91000
unkown
page read and write
2CA1000
heap
page read and write
12A0000
trusted library allocation
page read and write
D48000
heap
page read and write
3009000
heap
page read and write
4F90000
heap
page read and write
1AC1D000
stack
page read and write
F40000
heap
page read and write
E06000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF848E71000
trusted library allocation
page execute and read and write
7FF848F47000
trusted library allocation
page read and write
EA1000
heap
page read and write
E84000
unkown
page readonly
1B4AE000
stack
page read and write
111F000
stack
page read and write
DBA000
heap
page read and write
1B05E000
stack
page read and write
1BA5E000
stack
page read and write
1BAA0000
heap
page read and write
1060000
heap
page read and write
3022000
heap
page read and write
1C8E8000
heap
page read and write
12B0000
heap
page read and write
7FF848F0C000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page read and write
1B1AC000
stack
page read and write
7FF848F2B000
trusted library allocation
page read and write
11F0000
heap
page read and write
1BBAE000
stack
page read and write
2FB4000
heap
page read and write
7FF848E68000
trusted library allocation
page execute and read and write
7FF848E16000
trusted library allocation
page execute and read and write
FC6000
stack
page read and write
2C99000
heap
page read and write
D59000
heap
page read and write
1AECC000
stack
page read and write
258E000
stack
page read and write
1C451000
heap
page read and write
7FF848D84000
trusted library allocation
page read and write
9A0000
heap
page read and write
CF6000
stack
page read and write
1C350000
trusted library section
page read and write
12693000
trusted library allocation
page read and write
D65000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
12E52000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
4F4E000
stack
page read and write
7FF849150000
trusted library allocation
page execute and read and write
3024000
heap
page read and write
526E000
stack
page read and write
7FF848F13000
trusted library allocation
page read and write
27A6000
heap
page read and write
3243000
trusted library allocation
page read and write
130E8000
trusted library allocation
page read and write
1B883000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF8490D5000
trusted library allocation
page read and write
1B85E000
stack
page read and write
2A10000
heap
page execute and read and write
2D00000
heap
page read and write
1B4E0000
heap
page execute and read and write
CF6000
stack
page read and write
7FF848D53000
trusted library allocation
page read and write
7FF848EE3000
trusted library allocation
page read and write
1C8C2000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page read and write
E2A000
heap
page read and write
7FF848D4C000
trusted library allocation
page read and write
882000
heap
page read and write
FA0000
trusted library allocation
page read and write
2C07000
stack
page read and write
12C11000
trusted library allocation
page read and write
1C494000
heap
page read and write
2FEE000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
7FF848D8D000
trusted library allocation
page execute and read and write
4D2E000
stack
page read and write
2CCB000
heap
page read and write
33F7000
trusted library allocation
page read and write
331B000
heap
page read and write
5079000
heap
page read and write
1BEA2000
stack
page read and write
1C447000
heap
page read and write
273D000
trusted library allocation
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
1C0A7000
stack
page read and write
1312000
heap
page read and write
29EA000
trusted library allocation
page read and write
1C8B0000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
74CC000
stack
page read and write
3000000
heap
page read and write
1C92B000
heap
page read and write
1B98E000
stack
page read and write
1B110000
trusted library allocation
page read and write
3024000
heap
page read and write
1BA20000
heap
page execute and read and write
159E000
stack
page read and write
15E0000
trusted library allocation
page read and write
1294D000
trusted library allocation
page read and write
3A0027F000
stack
page read and write
7FF848F23000
trusted library allocation
page read and write
4D4A000
trusted library allocation
page read and write
2BEF000
stack
page read and write
CD6000
heap
page read and write
1C770000
trusted library section
page read and write
AFF000
stack
page read and write
FD0000
trusted library allocation
page read and write
8CC000
heap
page read and write
D56000
heap
page read and write
2CC6000
heap
page read and write
1030000
heap
page execute and read and write
CDA000
heap
page read and write
7FF8490C8000
trusted library allocation
page read and write
EEF000
stack
page read and write
29F3000
trusted library allocation
page read and write
12AED000
trusted library allocation
page read and write
1BABE000
stack
page read and write
7FF848F90000
trusted library allocation
page read and write
D6D000
heap
page read and write
2F00000
heap
page read and write
1000000
heap
page read and write
1065000
heap
page read and write
D7B000
heap
page read and write
2CAF000
heap
page read and write
D14000
heap
page read and write
770000
heap
page read and write
2AC0000
heap
page execute and read and write
2CC0000
heap
page read and write
4D80000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849102000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
2D00000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
E88000
unkown
page readonly
7FF848D54000
trusted library allocation
page read and write
2C12000
stack
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
2F9A000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
107E000
stack
page read and write
A74000
unkown
page read and write
D5B000
heap
page read and write
E43000
heap
page read and write
2CC5000
trusted library allocation
page read and write
1B413000
stack
page read and write
7FF84906D000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page read and write
7FF848D7C000
trusted library allocation
page read and write
1BC5E000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
B90000
unkown
page readonly
26DB000
trusted library allocation
page read and write
2CB5000
heap
page read and write
349D000
trusted library allocation
page read and write
2CD1000
heap
page read and write
7FF848E10000
trusted library allocation
page execute and read and write
913000
heap
page read and write
1120000
heap
page read and write
F75000
heap
page read and write
2CD0000
heap
page read and write
D10000
heap
page read and write
1BC1E000
stack
page read and write
12F52000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
11B5000
heap
page read and write
4E2F000
stack
page read and write
2EBF000
stack
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
8D1000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1AC40000
trusted library allocation
page read and write
12698000
trusted library allocation
page read and write
2FA9000
heap
page read and write
2CBD000
heap
page read and write
7FF848D63000
trusted library allocation
page read and write
2CB7000
heap
page read and write
7FF848EFC000
trusted library allocation
page read and write
12948000
trusted library allocation
page read and write
1B58E000
stack
page read and write
2CBF000
heap
page read and write
1B68E000
stack
page read and write
2AFB000
stack
page read and write
7FF848D73000
trusted library allocation
page read and write
C50000
heap
page read and write
7FF848D52000
trusted library allocation
page read and write
3042000
heap
page read and write
536E000
stack
page read and write
2960000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
2F90000
heap
page read and write
2F97000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
4F7F000
stack
page read and write
3042000
heap
page read and write
5076000
heap
page read and write
7FF848DEC000
trusted library allocation
page execute and read and write
7FF848DAC000
trusted library allocation
page execute and read and write
B10000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
1B954000
stack
page read and write
3448000
trusted library allocation
page read and write
1C890000
heap
page read and write
1BA00000
trusted library section
page read and write
7FF848F10000
trusted library allocation
page read and write
1230000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848F5F000
trusted library allocation
page read and write
67D9000
heap
page read and write
1C820000
heap
page read and write
1C918000
heap
page read and write
7FF848D5B000
trusted library allocation
page execute and read and write
7FF848D5D000
trusted library allocation
page execute and read and write
2CC3000
heap
page read and write
2E6E000
stack
page read and write
302D000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
D20000
heap
page read and write
3022000
heap
page read and write
2CD0000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
F30000
heap
page read and write
1610000
heap
page read and write
548E000
stack
page read and write
3024000
heap
page read and write
7FF848DF6000
trusted library allocation
page read and write
7252000
heap
page read and write
12C21000
trusted library allocation
page read and write
7FF848D73000
trusted library allocation
page read and write
F10000
heap
page read and write
1CD384C8000
heap
page read and write
33DF000
trusted library allocation
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
7FF848E16000
trusted library allocation
page read and write
29D0000
heap
page read and write
73CF000
stack
page read and write
1C868000
heap
page read and write
1BA10000
trusted library section
page read and write
1D4DB000
stack
page read and write
CB0000
heap
page read and write
116E000
stack
page read and write
1C8AB000
heap
page read and write
2CB4000
heap
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
1C800000
trusted library section
page read and write
2FB4000
heap
page read and write
12C01000
trusted library allocation
page read and write
2D15000
heap
page read and write
561F000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
CAD000
heap
page read and write
7FF848F0E000
trusted library allocation
page read and write
1B650000
heap
page read and write
550B000
stack
page read and write
1C810000
trusted library section
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
3306000
trusted library allocation
page read and write
1BA8E000
stack
page read and write
1C94D000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
2FC9000
heap
page read and write
1C3D8000
heap
page read and write
960000
heap
page read and write
7FF498940000
trusted library allocation
page execute and read and write
7FF848E91000
trusted library allocation
page execute and read and write
1B873000
stack
page read and write
39FFF5B000
stack
page read and write
13C70000
trusted library allocation
page read and write
1A6C0000
trusted library allocation
page read and write
2BF0000
stack
page read and write
1C760000
trusted library section
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
2680000
heap
page read and write
7FF848F0C000
trusted library allocation
page read and write
2D15000
heap
page read and write
346F000
trusted library allocation
page read and write
1C8D1000
heap
page read and write
13AED000
trusted library allocation
page read and write
522E000
stack
page read and write
2CD2000
heap
page read and write
1BA90000
trusted library section
page read and write
12C13000
trusted library allocation
page read and write
1B380000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848D32000
trusted library allocation
page read and write
7FF848E8A000
trusted library allocation
page execute and read and write
7FF848F00000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
1269D000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
1C8A6000
heap
page read and write
D6B000
heap
page read and write
1B77F000
stack
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
1C3FC000
heap
page read and write
1C3F1000
heap
page read and write
9F5000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
181E000
stack
page read and write
1C900000
heap
page read and write
9F0000
heap
page read and write
2D00000
heap
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
7FF849029000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
29FC000
trusted library allocation
page read and write
1C780000
trusted library section
page read and write
9E0000
trusted library allocation
page read and write
A30000
unkown
page readonly
980000
heap
page read and write
7FF848D42000
trusted library allocation
page read and write
2CE3000
heap
page read and write
2B00000
heap
page read and write
7FF848EF6000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
A93000
unkown
page readonly
7FF848D60000
trusted library allocation
page read and write
1B67E000
stack
page read and write
D70000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
1C7D0000
trusted library section
page read and write
7FF848EF0000
trusted library allocation
page read and write
2CF8000
heap
page read and write
29F9000
trusted library allocation
page read and write
2FC7000
heap
page read and write
1C87D000
heap
page read and write
2DB5000
heap
page read and write
1C925000
heap
page read and write
1B81E000
stack
page read and write
7FF848D57000
trusted library allocation
page read and write
1365000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
DD0000
heap
page read and write
7FF848DF6000
trusted library allocation
page read and write
2CB4000
heap
page read and write
12941000
trusted library allocation
page read and write
7FF848D5C000
trusted library allocation
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
2CDB000
heap
page read and write
3042000
heap
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
D7E000
heap
page read and write
2743000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
1B30F000
stack
page read and write
7FF848EEA000
trusted library allocation
page read and write
2C09000
stack
page read and write
7FF848D7B000
trusted library allocation
page execute and read and write
2FC6000
heap
page read and write
2F9A000
heap
page read and write
2CDD000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
7FF848EEB000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
7FF848D6B000
trusted library allocation
page execute and read and write
3454000
trusted library allocation
page read and write
1C8F4000
heap
page read and write
1C1AE000
stack
page read and write
1C7E0000
trusted library section
page read and write
7FF848F0B000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
2CBD000
heap
page read and write
1B75F000
stack
page read and write
3022000
heap
page read and write
CAB000
heap
page read and write
7FF848F44000
trusted library allocation
page read and write
2BF6000
stack
page read and write
2CDF000
heap
page read and write
1C876000
heap
page read and write
2C70000
heap
page read and write
27FE000
stack
page read and write
70D0000
heap
page read and write
2EFE000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
C78000
heap
page read and write
C9C000
heap
page read and write
1C3B0000
heap
page read and write
2D00000
heap
page read and write
DA7000
heap
page read and write
2CCB000
trusted library allocation
page read and write
1B21E000
stack
page read and write
2F9A000
heap
page read and write
7FF848F0A000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
2BD0000
heap
page read and write
2CF8000
heap
page read and write
2FD0000
heap
page read and write
130E1000
trusted library allocation
page read and write
2CE4000
heap
page read and write
5070000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
D8E000
heap
page read and write
1316000
heap
page read and write
86C000
heap
page read and write
11F4000
heap
page read and write
1B48E000
stack
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
27B0000
heap
page read and write
11B0000
heap
page read and write
338A000
trusted library allocation
page read and write
2F68000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
F65000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
11B0000
trusted library allocation
page read and write
FFE000
stack
page read and write
3331000
trusted library allocation
page read and write
3317000
heap
page read and write
4EF0000
heap
page read and write
7FF848F03000
trusted library allocation
page read and write
1C790000
trusted library section
page read and write
1160000
trusted library allocation
page read and write
AD7000
unkown
page readonly
147F000
stack
page read and write
F60000
heap
page read and write
54CE000
stack
page read and write
7FF848F03000
trusted library allocation
page read and write
C00000
heap
page read and write
26D4000
trusted library allocation
page read and write
1B06E000
stack
page read and write
3310000
heap
page read and write
1C93E000
heap
page read and write
1C2F0000
trusted library section
page read and write
1B31F000
stack
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
2CB4000
heap
page read and write
2CA2000
heap
page read and write
7FF848E97000
trusted library allocation
page execute and read and write
2CE3000
heap
page read and write
1CD384B9000
heap
page read and write
3022000
heap
page read and write
3022000
heap
page read and write
1C932000
heap
page read and write
3426000
trusted library allocation
page read and write
7FF848E77000
trusted library allocation
page execute and read and write
7FF848E88000
trusted library allocation
page execute and read and write
2CBA000
heap
page read and write
2CBA000
heap
page read and write
A6E000
unkown
page write copy
7FF848D63000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
1B17D000
stack
page read and write
8CE000
heap
page read and write
26D6000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
DA9000
heap
page read and write
7FF8491D0000
trusted library allocation
page read and write
D8A000
heap
page read and write
CA9000
heap
page read and write
A31000
unkown
page execute read
1BBBE000
stack
page read and write
302D000
heap
page read and write
1B784000
stack
page read and write
1467B000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
2A30000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848D66000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
1CD386A4000
heap
page read and write
1AB10000
trusted library allocation
page read and write
1BFA4000
stack
page read and write
12BF3000
trusted library allocation
page read and write
1C85A000
heap
page read and write
1020000
heap
page read and write
7FF848F03000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1BC20000
heap
page read and write
F80000
trusted library allocation
page read and write
7FF848D7C000
trusted library allocation
page read and write
9E0000
heap
page read and write
2F9A000
heap
page read and write
CF6000
stack
page read and write
7FF848D5C000
trusted library allocation
page read and write
D50000
heap
page read and write
F3F000
stack
page read and write
1C7F0000
trusted library section
page read and write
A92000
unkown
page readonly
1CD38460000
heap
page read and write
2AE0000
heap
page execute and read and write
1B71E000
stack
page read and write
324E000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page read and write
2C1D000
stack
page read and write
1AC20000
trusted library allocation
page read and write
2C03000
stack
page read and write
68CE000
stack
page read and write
2CB0000
heap
page read and write
2CF8000
heap
page read and write
1BCAE000
stack
page read and write
7FF848F24000
trusted library allocation
page read and write
2DAD000
stack
page read and write
88A000
heap
page read and write
DE8000
heap
page read and write
30D0000
heap
page read and write
1C938000
heap
page read and write
7FF848EF1000
trusted library allocation
page read and write
1B66C000
stack
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
2C78000
heap
page read and write
2CC9000
heap
page read and write
171F000
stack
page read and write
7FF848EEC000
trusted library allocation
page read and write
E0C000
heap
page read and write
1B610000
heap
page read and write
1B5BE000
stack
page read and write
2CD9000
heap
page read and write
544E000
stack
page read and write
15C0000
heap
page execute and read and write
7FF848E6A000
trusted library allocation
page execute and read and write
2F8A000
heap
page read and write
2746000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page execute and read and write
There are 819 hidden memdumps, click here to show them.