IOC Report
rHACNp6WFk.exe

loading gif

Files

File Path
Type
Category
Malicious
rHACNp6WFk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Programs\My Program\is-2T33C.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\is-FGFQ0.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\is-GUSOD.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\python-3.13.0-amd64.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\My Program\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-U0C1K.tmp\rHACNp6WFk.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ttgtggt.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Programs\My Program\unins000.dat
InnoSetup Log My Program {B61D3B6E-7045-4057-9E07-2D934A8C359C}, version 0x418, 2214 bytes, 965969\37\user\37, C:\Users\user\AppData\Local\Programs\My
dropped
C:\Users\user\AppData\Local\Temp\is-3O9NM.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\My Program.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Nov 12 12:56:46 2024, mtime=Tue Nov 12 12:56:46 2024, atime=Sun Nov 10 04:07:02 2024, length=346112, window=hide
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rHACNp6WFk.exe
"C:\Users\user\Desktop\rHACNp6WFk.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-U0C1K.tmp\rHACNp6WFk.tmp
"C:\Users\user\AppData\Local\Temp\is-U0C1K.tmp\rHACNp6WFk.tmp" /SL5="$10436,29074250,797184,C:\Users\user\Desktop\rHACNp6WFk.exe"
malicious
C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe
"C:\Users\user\AppData\Local\Programs\My Program\ttgtggt.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://appsyndication.org/2006/appsynapplicationc:
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://www.remobjects.com/ps
unknown
https://www.innosetup.com/
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/example/Field1Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.github.com/
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://www.w3.oh
unknown
https://www.github.com/.https://www.github.com/.https://www.github.com/
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://tempuri.org/example/Field1
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://tempuri.org/example/Field2
unknown
http://tempuri.org/example/Field3
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.github.com/a
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/example/Field3Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
4.251.123.83:6677
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
4.251.123.83
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\.exe\OpenWithProgids
File.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER_Classes\File.exe
NULL
HKEY_CURRENT_USER_Classes\File.exe\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\File.exe\shell\open\command
NULL
HKEY_CURRENT_USER_Classes\Applications\ttgtggt.exe\SupportedTypes
.myp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
URLInfoAbout
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
HelpLink
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
URLUpdateInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{B61D3B6E-7045-4057-9E07-2D934A8C359C}_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
102000
unkown
page readonly
malicious
2630000
trusted library allocation
page read and write
malicious
2CCB000
trusted library allocation
page read and write
2AF8000
trusted library allocation
page read and write
2BA6000
trusted library allocation
page read and write
F7D000
direct allocation
page read and write
2ABD000
trusted library allocation
page read and write
12713000
trusted library allocation
page read and write
7FFB4A100000
trusted library allocation
page read and write
1B9BF000
heap
page read and write
12DD5000
trusted library allocation
page read and write
128F1000
trusted library allocation
page read and write
B62000
unkown
page read and write
2A6A000
trusted library allocation
page read and write
12CD5000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
1BA9A000
heap
page read and write
7FFB4A1F0000
trusted library allocation
page read and write
7FFB49EFB000
trusted library allocation
page execute and read and write
C40000
heap
page read and write
7FFB4A300000
trusted library allocation
page read and write
1B9FD000
heap
page read and write
C0F000
heap
page read and write
1293C000
trusted library allocation
page read and write
C70000
heap
page read and write
1AE23000
heap
page read and write
CA2000
heap
page read and write
12CD0000
trusted library allocation
page read and write
CB4000
heap
page read and write
2BE0000
trusted library allocation
page read and write
1275D000
trusted library allocation
page read and write
1B5FA000
heap
page read and write
2A55000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
C2F000
heap
page read and write
FEC000
direct allocation
page read and write
2CEF000
trusted library allocation
page read and write
93E000
stack
page read and write
2A59000
trusted library allocation
page read and write
1B59C000
heap
page read and write
3920000
direct allocation
page read and write
2851000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
520000
heap
page read and write
1297D000
trusted library allocation
page read and write
67B000
stack
page read and write
1273A000
trusted library allocation
page read and write
7FFB4A367000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
1278A000
trusted library allocation
page read and write
BF3000
heap
page read and write
2AB9000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
7FFB4A31F000
trusted library allocation
page read and write
1BA55000
heap
page read and write
2D06000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
1290A000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
F6E000
direct allocation
page read and write
580000
trusted library allocation
page read and write
7FFB4A1A0000
trusted library allocation
page read and write
EE1000
direct allocation
page read and write
FF3000
direct allocation
page read and write
7FFB4A304000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
7FFB4A310000
trusted library allocation
page read and write
29BA000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
C1C000
heap
page read and write
12CBD000
trusted library allocation
page read and write
C31000
heap
page read and write
570000
unkown
page write copy
3B8E000
stack
page read and write
126D2000
trusted library allocation
page read and write
278A000
direct allocation
page read and write
2C13000
trusted library allocation
page read and write
1B9E8000
heap
page read and write
60B000
heap
page read and write
7FFB4A341000
trusted library allocation
page read and write
3C61000
heap
page read and write
1274A000
trusted library allocation
page read and write
C60000
heap
page read and write
1BA8A000
heap
page read and write
1B999000
heap
page read and write
C4F000
heap
page read and write
1B1EE000
stack
page read and write
7FFB4A0A0000
trusted library allocation
page read and write
8E0000
heap
page read and write
7FFB4A290000
trusted library allocation
page read and write
1BB28000
heap
page read and write
7FFB49FF0000
trusted library allocation
page execute and read and write
7FFB4A2B0000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
7FFB4A376000
trusted library allocation
page read and write
378D000
direct allocation
page read and write
C2B000
heap
page read and write
12CC2000
trusted library allocation
page read and write
7FFB4A3F0000
trusted library allocation
page read and write
2B2C000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
1C2A0000
heap
page read and write
2F60000
trusted library allocation
page read and write
27C5000
direct allocation
page read and write
BB0000
heap
page read and write
2B09000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
55E000
unkown
page write copy
1BA1F000
heap
page read and write
3A5F000
direct allocation
page read and write
12793000
trusted library allocation
page read and write
2799000
direct allocation
page read and write
12CAC000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
264D000
trusted library allocation
page read and write
7FFB4A351000
trusted library allocation
page read and write
2862000
trusted library allocation
page read and write
7FF4EC420000
trusted library allocation
page execute and read and write
1AFDE000
stack
page read and write
126C5000
trusted library allocation
page read and write
12940000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
12942000
trusted library allocation
page read and write
2590000
heap
page execute and read and write
125A1000
trusted library allocation
page read and write
7FFB4A200000
trusted library allocation
page read and write
905000
heap
page read and write
7FFB4A2D0000
trusted library allocation
page read and write
27B5000
direct allocation
page read and write
1B9C4000
heap
page read and write
125C1000
trusted library allocation
page read and write
29A7000
trusted library allocation
page read and write
1A5D0000
trusted library allocation
page read and write
7FFB4A1F5000
trusted library allocation
page read and write
2C15000
trusted library allocation
page read and write
128FA000
trusted library allocation
page read and write
283A000
direct allocation
page read and write
C75000
heap
page read and write
A97000
heap
page read and write
BEA000
heap
page read and write
2CE0000
trusted library allocation
page read and write
277C000
direct allocation
page read and write
2CB3000
heap
page read and write
12704000
trusted library allocation
page read and write
3A6D000
direct allocation
page read and write
3C5C000
heap
page read and write
3760000
direct allocation
page read and write
128FF000
trusted library allocation
page read and write
2738000
direct allocation
page read and write
2D57000
trusted library allocation
page read and write
128CA000
trusted library allocation
page read and write
BD8000
heap
page read and write
2BF7000
trusted library allocation
page read and write
7FFB49F8C000
trusted library allocation
page execute and read and write
FA4000
direct allocation
page read and write
2AE3000
trusted library allocation
page read and write
7FFB4A1B6000
trusted library allocation
page read and write
F9B000
direct allocation
page read and write
5E1000
heap
page read and write
27A7000
direct allocation
page read and write
A90000
heap
page read and write
2848000
direct allocation
page read and write
C18000
heap
page read and write
2B29000
trusted library allocation
page read and write
FCF000
direct allocation
page read and write
2DB2000
trusted library allocation
page read and write
C22000
heap
page read and write
2C6F000
trusted library allocation
page read and write
B3F000
stack
page read and write
EFA000
direct allocation
page read and write
128CF000
trusted library allocation
page read and write
2C06000
trusted library allocation
page read and write
2775000
trusted library allocation
page read and write
5DD000
heap
page read and write
2D1D000
trusted library allocation
page read and write
ED7000
direct allocation
page read and write
282D000
trusted library allocation
page read and write
1274D000
trusted library allocation
page read and write
2D6C000
trusted library allocation
page read and write
1294B000
trusted library allocation
page read and write
1B94B000
stack
page read and write
7FFB49ED3000
trusted library allocation
page execute and read and write
FC8000
direct allocation
page read and write
C15000
heap
page read and write
126FF000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
55E000
unkown
page read and write
C30000
heap
page read and write
7FFB4A1E0000
trusted library allocation
page read and write
29CB000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
1BA78000
heap
page read and write
8C0000
heap
page read and write
2D5D000
trusted library allocation
page read and write
126C2000
trusted library allocation
page read and write
2822000
trusted library allocation
page read and write
F59000
direct allocation
page read and write
7FFB4A323000
trusted library allocation
page read and write
C3F000
heap
page read and write
1BA64000
heap
page read and write
128F7000
trusted library allocation
page read and write
1AFE0000
heap
page read and write
2CB0000
heap
page read and write
2CF2000
trusted library allocation
page read and write
3AA7000
direct allocation
page read and write
7FFB4A3C0000
trusted library allocation
page read and write
2808000
direct allocation
page read and write
1BA3C000
heap
page read and write
F94000
direct allocation
page read and write
125CD000
trusted library allocation
page read and write
3D20000
heap
page read and write
1BABE000
heap
page read and write
BD0000
heap
page read and write
2C78000
trusted library allocation
page read and write
3D21000
heap
page read and write
2B38000
trusted library allocation
page read and write
128C1000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
128C7000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
1BA30000
heap
page read and write
7FFB4A1D0000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page read and write
C8F000
stack
page read and write
2DC9000
trusted library allocation
page read and write
C93000
heap
page read and write
7FFB49EF4000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
C36000
heap
page read and write
4F4000
stack
page read and write
2C0F000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
1BA67000
heap
page read and write
2BAF000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
12937000
trusted library allocation
page read and write
8E0000
heap
page read and write
2BA2000
trusted library allocation
page read and write
935000
heap
page read and write
2700000
heap
page read and write
2C7E000
trusted library allocation
page read and write
D78000
heap
page read and write
1B536000
heap
page read and write
128DA000
trusted library allocation
page read and write
7FFB4A0D2000
trusted library allocation
page read and write
2835000
trusted library allocation
page read and write
1BA34000
heap
page read and write
2D59000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
401F000
stack
page read and write
12798000
trusted library allocation
page read and write
1C7DB000
heap
page read and write
1B967000
heap
page read and write
126B9000
trusted library allocation
page read and write
1B597000
heap
page read and write
7FFB4A120000
trusted library allocation
page read and write
12787000
trusted library allocation
page read and write
C31000
heap
page read and write
27A0000
direct allocation
page read and write
C13000
heap
page read and write
BF1000
heap
page read and write
D70000
heap
page read and write
F2C000
direct allocation
page read and write
2D6A000
trusted library allocation
page read and write
1B561000
heap
page read and write
1BA5F000
heap
page read and write
1CC60000
heap
page read and write
5C9000
heap
page read and write
1CCA2000
heap
page read and write
930000
heap
page read and write
27D4000
direct allocation
page read and write
2C02000
trusted library allocation
page read and write
12734000
trusted library allocation
page read and write
7FFB4A3E0000
trusted library allocation
page read and write
FDD000
direct allocation
page read and write
3C8C000
heap
page read and write
2CBE000
trusted library allocation
page read and write
3760000
direct allocation
page read and write
1C7D1000
heap
page read and write
2AC2000
trusted library allocation
page read and write
3AB7000
direct allocation
page read and write
C2A000
heap
page read and write
C21000
heap
page read and write
1C2AC000
heap
page read and write
BF3000
heap
page read and write
12986000
trusted library allocation
page read and write
1279E000
trusted library allocation
page read and write
3C6C000
heap
page read and write
1B950000
heap
page read and write
12CB3000
trusted library allocation
page read and write
C34000
heap
page read and write
C36000
heap
page read and write
2A9F000
trusted library allocation
page read and write
1B61C000
heap
page read and write
7FFB4A3B0000
trusted library allocation
page read and write
3C6C000
heap
page read and write
560000
unkown
page read and write
BF6000
heap
page read and write
12CC8000
trusted library allocation
page read and write
FE4000
direct allocation
page read and write
2AAA000
trusted library allocation
page read and write
1BA41000
heap
page read and write
2841000
direct allocation
page read and write
2B6D000
trusted library allocation
page read and write
2833000
direct allocation
page read and write
2844000
trusted library allocation
page read and write
7FFB4A2E0000
trusted library allocation
page read and write
125DA000
trusted library allocation
page read and write
12790000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
C51000
heap
page read and write
2A8C000
trusted library allocation
page read and write
F4D000
direct allocation
page read and write
1B9BB000
heap
page read and write
2840000
trusted library allocation
page read and write
7FFB4A080000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
7FFB4A3D0000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
126FB000
trusted library allocation
page read and write
1BAC9000
heap
page read and write
2BB3000
heap
page read and write
7FFB4A2C0000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page read and write
900000
heap
page read and write
BED000
heap
page read and write
2A39000
trusted library allocation
page read and write
C19000
heap
page read and write
100000
unkown
page readonly
126A9000
trusted library allocation
page read and write
100000
unkown
page readonly
2DC7000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
5A0000
heap
page read and write
12CB9000
trusted library allocation
page read and write
7F870000
direct allocation
page read and write
280F000
direct allocation
page read and write
3C61000
heap
page read and write
1E0000
heap
page read and write
2AE7000
trusted library allocation
page read and write
7FFB4A0E5000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
12905000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
C46000
heap
page read and write
F6B000
direct allocation
page read and write
3C79000
heap
page read and write
2A48000
trusted library allocation
page read and write
126EE000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
1B500000
heap
page execute and read and write
1C1CD000
stack
page read and write
C2E000
heap
page read and write
2D08000
trusted library allocation
page read and write
7FFB4A170000
trusted library allocation
page read and write
7FFB4A130000
trusted library allocation
page read and write
1B53A000
heap
page read and write
D8C000
heap
page read and write
BC0000
direct allocation
page execute and read and write
540000
heap
page read and write
1B3EB000
stack
page read and write
2D39000
trusted library allocation
page read and write
12995000
trusted library allocation
page read and write
7FFB4A180000
trusted library allocation
page read and write
BF5000
heap
page read and write
12796000
trusted library allocation
page read and write
B5B000
unkown
page read and write
2D30000
trusted library allocation
page read and write
C37000
heap
page read and write
2CA9000
trusted library allocation
page read and write
3770000
direct allocation
page read and write
C5B000
heap
page read and write
2C9C000
trusted library allocation
page read and write
7FFB4A150000
trusted library allocation
page read and write
2C7A000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
B65000
unkown
page write copy
2BB0000
heap
page read and write
2CCD000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
3C80000
heap
page read and write
7FFB49F80000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
1B99B000
heap
page read and write
F76000
direct allocation
page read and write
128EE000
trusted library allocation
page read and write
A95000
heap
page read and write
7FFB4A370000
trusted library allocation
page read and write
128B1000
trusted library allocation
page read and write
7FFB4A390000
trusted library allocation
page read and write
276D000
direct allocation
page read and write
27DB000
direct allocation
page read and write
12982000
trusted library allocation
page read and write
F84000
direct allocation
page read and write
2CB0000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
DCE000
stack
page read and write
129B2000
trusted library allocation
page read and write
1008000
direct allocation
page read and write
F17000
direct allocation
page read and write
7FFB4A388000
trusted library allocation
page read and write
B59000
unkown
page read and write
7FFB4A3A0000
trusted library allocation
page read and write
2B8B000
trusted library allocation
page read and write
7FFB49EE3000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
7FFB4A378000
trusted library allocation
page read and write
126BF000
trusted library allocation
page read and write
126F5000
trusted library allocation
page read and write
FC0000
direct allocation
page read and write
284D000
trusted library allocation
page read and write
77C000
stack
page read and write
C2B000
heap
page read and write
127A3000
trusted library allocation
page read and write
7FFB4A344000
trusted library allocation
page read and write
7FFB49EED000
trusted library allocation
page execute and read and write
A3E000
stack
page read and write
C34000
heap
page read and write
C55000
heap
page read and write
5C8000
unkown
page readonly
C29000
heap
page read and write
2A4C000
trusted library allocation
page read and write
7FFB49EDD000
trusted library allocation
page execute and read and write
2783000
direct allocation
page read and write
2BB5000
trusted library allocation
page read and write
7FFB4A16F000
trusted library allocation
page read and write
23DF000
stack
page read and write
1B55A000
heap
page read and write
2423000
heap
page read and write
7FFB4A110000
trusted library allocation
page read and write
12620000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
C3B000
heap
page read and write
B67000
unkown
page readonly
2CD2000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
7F88B000
direct allocation
page read and write
27E2000
direct allocation
page read and write
2842000
trusted library allocation
page read and write
2DD2000
trusted library allocation
page read and write
1AA1C000
stack
page read and write
12758000
trusted library allocation
page read and write
A5E000
stack
page read and write
7FFB4A380000
trusted library allocation
page read and write
2B1000
unkown
page execute read
2824000
direct allocation
page read and write
BFF000
heap
page read and write
1296C000
trusted library allocation
page read and write
12744000
trusted library allocation
page read and write
BF9000
heap
page read and write
C81000
heap
page read and write
BA0000
heap
page read and write
FB9000
direct allocation
page read and write
C0B000
heap
page read and write
2BB7000
trusted library allocation
page read and write
12780000
trusted library allocation
page read and write
2410000
heap
page read and write
F3B000
direct allocation
page read and write
8F0000
heap
page read and write
7FFB4A140000
trusted library allocation
page execute and read and write
1B530000
heap
page read and write
7FFB4A346000
trusted library allocation
page read and write
56D000
unkown
page read and write
2D3B000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
37A0000
heap
page read and write
2758000
direct allocation
page read and write
7FFB4A2FD000
trusted library allocation
page read and write
1B58B000
heap
page read and write
3C21000
heap
page read and write
2AA8000
trusted library allocation
page read and write
1294F000
trusted library allocation
page read and write
EDB000
direct allocation
page read and write
3C61000
heap
page read and write
1BCCC000
stack
page read and write
29A9000
trusted library allocation
page read and write
F60000
direct allocation
page read and write
126AF000
trusted library allocation
page read and write
1277A000
trusted library allocation
page read and write
12990000
trusted library allocation
page read and write
2A44000
trusted library allocation
page read and write
12933000
trusted library allocation
page read and write
C5E000
heap
page read and write
128E1000
trusted library allocation
page read and write
C28000
heap
page read and write
2D2A000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
125C8000
trusted library allocation
page read and write
1BA39000
heap
page read and write
2D81000
trusted library allocation
page read and write
C11000
heap
page read and write
2791000
direct allocation
page read and write
128B7000
trusted library allocation
page read and write
A7E000
stack
page read and write
7FFB4A1C0000
trusted library allocation
page execute and read and write
27AE000
direct allocation
page read and write
C63000
heap
page read and write
AB1000
unkown
page execute read
1B548000
heap
page read and write
3C61000
heap
page read and write
C45000
heap
page read and write
2A97000
trusted library allocation
page read and write
1C7C0000
heap
page read and write
2D2C000
trusted library allocation
page read and write
12753000
trusted library allocation
page read and write
C5E000
heap
page read and write
1BAB2000
heap
page read and write
C1C000
heap
page read and write
57B0000
direct allocation
page read and write
95C000
stack
page read and write
7FFB49F86000
trusted library allocation
page read and write
27EB000
direct allocation
page read and write
8A0000
heap
page execute and read and write
2CE2000
trusted library allocation
page read and write
3770000
direct allocation
page read and write
2B4B000
trusted library allocation
page read and write
27BE000
direct allocation
page read and write
2D41000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
B59000
unkown
page write copy
1B9D6000
heap
page read and write
2B91000
trusted library allocation
page read and write
377B000
direct allocation
page read and write
7FB7B000
direct allocation
page read and write
396E000
stack
page read and write
1B2EE000
stack
page read and write
1B9ED000
heap
page read and write
126C7000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
575000
unkown
page readonly
128D5000
trusted library allocation
page read and write
500000
heap
page read and write
C26000
heap
page read and write
2E00000
heap
page read and write
2DE5000
trusted library allocation
page read and write
7FFB4A090000
trusted library allocation
page read and write
C40000
heap
page read and write
69E000
heap
page read and write
BFA000
heap
page read and write
12708000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
A3E000
stack
page read and write
12926000
trusted library allocation
page read and write
7FFB4A36F000
trusted library allocation
page read and write
27F9000
direct allocation
page read and write
C03000
heap
page read and write
2864000
trusted library allocation
page read and write
F01000
direct allocation
page read and write
8A4000
heap
page execute and read and write
FD6000
direct allocation
page read and write
1BAE2000
heap
page read and write
27CC000
direct allocation
page read and write
1B4FE000
stack
page read and write
C65000
heap
page read and write
12972000
trusted library allocation
page read and write
1AE20000
heap
page read and write
12741000
trusted library allocation
page read and write
FB2000
direct allocation
page read and write
2AFA000
trusted library allocation
page read and write
EF3000
direct allocation
page read and write
2816000
direct allocation
page read and write
286D000
trusted library allocation
page read and write
275F000
direct allocation
page read and write
1AF9E000
stack
page read and write
C0F000
heap
page read and write
C22000
heap
page read and write
12945000
trusted library allocation
page read and write
126B6000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
7FFB4A190000
trusted library allocation
page read and write
2B69000
trusted library allocation
page read and write
3A8D000
direct allocation
page read and write
12CCB000
trusted library allocation
page read and write
282C000
direct allocation
page read and write
281D000
direct allocation
page read and write
1BA19000
heap
page read and write
C15000
heap
page read and write
128BE000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
2B05000
trusted library allocation
page read and write
129C7000
trusted library allocation
page read and write
565000
unkown
page read and write
2D8C000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
C6C000
heap
page read and write
7FFB4A2F0000
trusted library allocation
page read and write
1BA7C000
heap
page read and write
ECE000
stack
page read and write
1292D000
trusted library allocation
page read and write
7E0000
heap
page read and write
F08000
direct allocation
page read and write
2A5B000
trusted library allocation
page read and write
1040000
heap
page read and write
C2C000
heap
page read and write
C63000
heap
page read and write
7FFB4A35A000
trusted library allocation
page read and write
F25000
direct allocation
page read and write
127F6000
trusted library allocation
page read and write
2BD3000
trusted library allocation
page read and write
2CDE000
trusted library allocation
page read and write
BFE000
heap
page read and write
2B3A000
trusted library allocation
page read and write
C22000
heap
page read and write
1270D000
trusted library allocation
page read and write
7FFB49EF0000
trusted library allocation
page read and write
1BAA8000
heap
page read and write
284F000
trusted library allocation
page read and write
7FFB4A2F7000
trusted library allocation
page read and write
C34000
heap
page read and write
2CA4000
trusted library allocation
page read and write
7FFB49ED0000
trusted library allocation
page read and write
577000
unkown
page readonly
7FFB4A160000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
1047000
heap
page read and write
C33000
heap
page read and write
C3C000
heap
page read and write
2800000
direct allocation
page read and write
1B9A4000
heap
page read and write
C32000
heap
page read and write
86F000
stack
page read and write
BF1000
heap
page read and write
60D000
heap
page read and write
2D61000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
1B9DC000
heap
page read and write
AB0000
unkown
page readonly
125D4000
trusted library allocation
page read and write
2CD0000
direct allocation
page read and write
F33000
direct allocation
page read and write
12750000
trusted library allocation
page read and write
7FFB4A400000
trusted library allocation
page read and write
C78000
heap
page read and write
3C5C000
heap
page read and write
7FFB4A31D000
trusted library allocation
page read and write
3F1F000
stack
page read and write
863000
stack
page read and write
2D79000
trusted library allocation
page read and write
7FFB4A11C000
trusted library allocation
page read and write
1B62D000
heap
page read and write
BEF000
heap
page read and write
128CD000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
7FFB4A0F0000
trusted library allocation
page read and write
C07000
heap
page read and write
C51000
heap
page read and write
2B80000
trusted library allocation
page read and write
2766000
direct allocation
page read and write
2DDA000
trusted library allocation
page read and write
1001000
direct allocation
page read and write
12717000
trusted library allocation
page read and write
3C87000
heap
page read and write
2CE4000
trusted library allocation
page read and write
7FFB4A0D9000
trusted library allocation
page read and write
FAB000
direct allocation
page read and write
3C20000
heap
page read and write
2A8E000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
286F000
trusted library allocation
page read and write
3783000
direct allocation
page read and write
2D90000
trusted library allocation
page read and write
2751000
direct allocation
page read and write
127DE000
trusted library allocation
page read and write
90C000
heap
page read and write
12979000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
1298B000
trusted library allocation
page read and write
1B544000
heap
page read and write
2A46000
trusted library allocation
page read and write
A1E000
stack
page read and write
2B5E000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
5DF000
heap
page read and write
FFA000
direct allocation
page read and write
7FFB4A1B0000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
A60000
heap
page read and write
2B0000
unkown
page readonly
7FFB4A31A000
trusted library allocation
page read and write
B69000
unkown
page readonly
128FD000
trusted library allocation
page read and write
614000
heap
page read and write
2CDC000
trusted library allocation
page read and write
1B56E000
heap
page read and write
2D7F000
trusted library allocation
page read and write
1B72A000
stack
page read and write
2D28000
trusted library allocation
page read and write
126CD000
trusted library allocation
page read and write
7FFB49F2C000
trusted library allocation
page execute and read and write
2775000
direct allocation
page read and write
7FFB49FB6000
trusted library allocation
page execute and read and write
7FFB4A315000
trusted library allocation
page read and write
1B0EF000
stack
page read and write
C5A000
heap
page read and write
9D0000
heap
page read and write
1BB1E000
heap
page read and write
2B65000
trusted library allocation
page read and write
7FFB4A0EB000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
C0B000
heap
page read and write
3C75000
heap
page read and write
7FFB4A0C0000
trusted library allocation
page execute and read and write
1270A000
trusted library allocation
page read and write
7FFB4A070000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
7FFB49ED4000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
C21000
heap
page read and write
12988000
trusted library allocation
page read and write
2853000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
7FFB4A2A0000
trusted library allocation
page read and write
29C3000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
2C67000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
379F000
direct allocation
page read and write
2DEB000
trusted library allocation
page read and write
C11000
heap
page read and write
128E7000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
2833000
trusted library allocation
page read and write
F1E000
direct allocation
page read and write
12CC6000
trusted library allocation
page read and write
F10000
direct allocation
page read and write
1BDCE000
stack
page read and write
282B000
trusted library allocation
page read and write
F52000
direct allocation
page read and write
2D7B000
trusted library allocation
page read and write
1BA0D000
heap
page read and write
7FFB49F90000
trusted library allocation
page execute and read and write
2DDF000
direct allocation
page read and write
BFE000
heap
page read and write
7FFB4A210000
trusted library allocation
page execute and read and write
2BC0000
trusted library allocation
page read and write
There are 744 hidden memdumps, click here to show them.