IOC Report
AutoHotkey_2.0.12_setup.exe

loading gif

Files

File Path
Type
Category
Malicious
AutoHotkey_2.0.12_setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\UX\Templates\Minimal for v2.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\WindowSpy.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\CommandLineToArgs.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\CreateAppShortcut.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\EnableUIAccess.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\GetGitHubReleaseAssetURL.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\HashFile.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\README.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\ShellRun.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\bounce-v1.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\common.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\config.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\identify.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\identify_regex.ahk
ASCII text, with very long lines (3982), with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\launcher-common.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\spy.ico
MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48 with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
malicious
C:\Program Files\AutoHotkey\UX\inc\ui-base.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\install-ahk2exe.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\install-version.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\install.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\launcher.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\reload-v1.ahk
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\reset-assoc.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-dash.ahk
C source, Unicode text, UTF-8 text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-editor.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-launcherconfig.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-newscript.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-setup.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\UX\ui-uninstall.ahk
C source, ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\license.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey.chm
MS Windows HtmlHelp Data
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\RCXC8B7.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\v2\RCXC9D2.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey.chm
MS Windows HtmlHelp Data
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\Install.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\Templates\Minimal for v2.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\WindowSpy.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CommandLineToArgs.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CreateAppShortcut.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\EnableUIAccess.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\GetGitHubReleaseAssetURL.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\HashFile.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ShellRun.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\bounce-v1.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\common.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\config.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify_regex.ahk
ASCII text, with very long lines (3982), with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\launcher-common.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\spy.ico
MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48 with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ui-base.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-ahk2exe.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-version.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\launcher.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reload-v1.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reset-assoc.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-dash.ahk
C source, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-editor.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-launcherconfig.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-newscript.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-setup.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-uninstall.ahk
C source, ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\WindowSpy.ahk
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files\AutoHotkey\UX\installed-files.csv
CSV text
dropped
C:\Program Files\AutoHotkey\WindowSpy.ahk
C source, ASCII text
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Dash.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Archive, ctime=Fri Mar 29 05:49:19 2024, mtime=Fri Mar 29 05:49:19 2024, atime=Fri Mar 29 05:49:19 2024, length=1256448, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Window Spy.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Fri Mar 29 05:49:19 2024, mtime=Fri Mar 29 05:49:20 2024, atime=Fri Mar 29 05:49:19 2024, length=1256448, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\f213bf5a8af890680781f9b7261613ea_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 69 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe"
malicious
C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey"
malicious
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /check
malicious
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" UX\ui-dash.ahk
malicious

URLs

Name
IP
Malicious
https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/
unknown
https://autohotkey.comx
unknown
https://www.autohotkey.com/download/
unknown
https://www.autohotkey.com/docs/v2/
unknown
https://www.autohotkey.com/docs/v1/
unknown
http://msdn.com/library/bb756929
unknown
https://autohotkey.com
unknown
https://api.github.com/repos/
unknown
https://autohotkey.com6122658-3693405117-2476756634-1002
unknown
https://autohotkey.comCould
unknown
https://www.autohotkey.com/docs/v2/misc/Editors.htm
unknown
There are 1 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\D978374624D0A031EB7358966F389DB6A253AFD7
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
InstallDir
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
InstallCommand
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\ShellNew
Command
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\PersistentHandler
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript
AppUserModelID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
FriendlyAppName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
AppUserModelID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\RunAs\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\RunAs
HasLUAShield
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess
AppUserModelID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch
ProgrammaticAccessOnly
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Edit\Command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Edit
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4C78000
heap
page read and write
E37000
heap
page read and write
1400FB000
unkown
page readonly
EE8000
heap
page read and write
4C67000
heap
page read and write
CF9000
heap
page read and write
4D01000
heap
page read and write
32FE000
heap
page read and write
4F4000
unkown
page execute and read and write
4CCF000
heap
page read and write
F00000
unkown
page read and write
32F6000
heap
page read and write
7DC000
stack
page read and write
140000000
unkown
page readonly
4C76000
heap
page read and write
FF2000
heap
page read and write
FE8000
heap
page read and write
48C0000
trusted library allocation
page read and write
7D4000
stack
page read and write
4C94000
heap
page read and write
177000
heap
page read and write
4C60000
heap
page read and write
D29000
stack
page read and write
D8E000
stack
page read and write
4C80000
heap
page read and write
D26000
stack
page read and write
62D3000
heap
page read and write
D35000
stack
page read and write
4CE0000
heap
page read and write
32FB000
heap
page read and write
4C71000
heap
page read and write
4D27000
heap
page read and write
4CB4000
heap
page read and write
EC4000
heap
page read and write
4CA7000
heap
page read and write
14012A000
unkown
page readonly
8C6000
unkown
page execute and read and write
5BD8000
heap
page read and write
4D24000
heap
page read and write
4C80000
heap
page read and write
5ADE000
heap
page read and write
4CEF000
heap
page read and write
140000000
unkown
page readonly
4CE9000
heap
page read and write
4C80000
heap
page read and write
F30000
heap
page read and write
FF3000
heap
page read and write
4CE0000
heap
page read and write
EBE000
heap
page read and write
EE8000
heap
page read and write
33F5000
heap
page read and write
4C94000
heap
page read and write
4D19000
heap
page read and write
32F1000
heap
page read and write
EE8000
heap
page read and write
4F4000
unkown
page execute and read and write
14011D000
unkown
page write copy
666000
unkown
page execute and write copy
32F9000
heap
page read and write
A2D000
heap
page read and write
4C78000
heap
page read and write
133E000
stack
page read and write
4CCF000
heap
page read and write
9A8000
heap
page read and write
DE0000
trusted library section
page read and write
4C40000
heap
page read and write
4C78000
heap
page read and write
400000
unkown
page readonly
1FE000
heap
page read and write
D26000
stack
page read and write
DCE000
stack
page read and write
FEC000
heap
page read and write
E32000
heap
page read and write
14011C000
unkown
page read and write
4CCF000
heap
page read and write
7E5000
stack
page read and write
170000
heap
page read and write
4CA7000
heap
page read and write
4C83000
heap
page read and write
140122000
unkown
page write copy
140121000
unkown
page read and write
4CA7000
heap
page read and write
4C80000
heap
page read and write
4C83000
heap
page read and write
EBC000
heap
page read and write
35A0000
heap
page read and write
EC2000
heap
page read and write
33C0000
trusted library allocation
page read and write
880000
heap
page read and write
32F7000
heap
page read and write
5ECC000
stack
page read and write
4C94000
heap
page read and write
32F2000
heap
page read and write
345E000
stack
page read and write
140000000
unkown
page readonly
32F0000
heap
page read and write
F42000
heap
page read and write
F20000
heap
page read and write
93A000
unkown
page write copy
4C71000
heap
page read and write
17C8000
heap
page read and write
32F8000
heap
page read and write
4D37000
heap
page read and write
4CA5000
heap
page read and write
4C50000
heap
page read and write
14011C000
unkown
page write copy
4C94000
heap
page read and write
62D3000
heap
page read and write
140127000
unkown
page read and write
4CEF000
heap
page read and write
3500000
heap
page read and write
93A000
unkown
page read and write
850000
heap
page read and write
140001000
unkown
page execute read
F64000
heap
page read and write
4C6A000
heap
page read and write
FF0000
heap
page read and write
9F7000
heap
page read and write
9A0000
heap
page read and write
140001000
unkown
page execute read
66CF000
stack
page read and write
4D01000
heap
page read and write
4CA5000
heap
page read and write
4C78000
heap
page read and write
14012A000
unkown
page readonly
EBF000
heap
page read and write
D3C000
stack
page read and write
1400DF000
unkown
page readonly
52C0000
heap
page read and write
32F8000
heap
page read and write
349C000
stack
page read and write
14012A000
unkown
page readonly
EB3000
heap
page read and write
EE8000
heap
page read and write
90000
heap
page read and write
4C71000
heap
page read and write
16F000
heap
page read and write
140121000
unkown
page read and write
4C80000
heap
page read and write
D23000
stack
page read and write
A0C000
heap
page read and write
FF7000
heap
page read and write
1400FB000
unkown
page readonly
3465000
heap
page read and write
9D1000
heap
page read and write
4CA5000
heap
page read and write
7CE000
stack
page read and write
F10000
heap
page read and write
F3F000
heap
page read and write
32FE000
heap
page read and write
FE3000
heap
page read and write
4CA5000
heap
page read and write
EE0000
heap
page read and write
32FE000
heap
page read and write
7CE000
stack
page read and write
3410000
heap
page read and write
F64000
heap
page read and write
4CE9000
heap
page read and write
32F5000
heap
page read and write
171000
heap
page read and write
7D7000
stack
page read and write
190000
heap
page read and write
7AA000
unkown
page execute and read and write
4CE3000
heap
page read and write
EE8000
heap
page read and write
4C60000
heap
page read and write
8C6000
unkown
page execute and read and write
E00000
trusted library section
page read and write
4C9C000
heap
page read and write
173E000
stack
page read and write
4C94000
heap
page read and write
D2C000
stack
page read and write
D4A000
stack
page read and write
188000
heap
page read and write
7B6000
stack
page read and write
4CE000
unkown
page execute and read and write
14011D000
unkown
page write copy
A07000
heap
page read and write
32FB000
heap
page read and write
4C78000
heap
page read and write
4C80000
heap
page read and write
7F9000
stack
page read and write
4CA5000
heap
page read and write
4C94000
heap
page read and write
4C80000
heap
page read and write
1400DF000
unkown
page readonly
E25000
heap
page read and write
1002000
heap
page read and write
14011C000
unkown
page read and write
1007000
heap
page read and write
DF0000
heap
page read and write
1E0000
heap
page read and write
CFC000
heap
page read and write
26E0000
heap
page read and write
4C80000
heap
page read and write
F04000
heap
page read and write
100F000
heap
page read and write
3390000
heap
page read and write
4C78000
heap
page read and write
4C78000
heap
page read and write
4C78000
heap
page read and write
4CEF000
heap
page read and write
ED9000
heap
page read and write
885000
heap
page read and write
4C60000
heap
page read and write
4CB4000
heap
page read and write
4CA5000
heap
page read and write
2763000
heap
page read and write
4CA7000
heap
page read and write
4CE5000
heap
page read and write
4C80000
heap
page read and write
853000
heap
page read and write
ED9000
heap
page read and write
830000
heap
page read and write
401000
unkown
page execute and read and write
D3E000
stack
page read and write
D1E000
stack
page read and write
315F000
stack
page read and write
1400DF000
unkown
page readonly
4C50000
heap
page read and write
1400DF000
unkown
page readonly
4E2000
unkown
page execute and read and write
170000
heap
page read and write
100F000
heap
page read and write
4C60000
heap
page read and write
32F1000
heap
page read and write
33EA000
heap
page read and write
141E000
stack
page read and write
7AA000
unkown
page execute and read and write
CF6000
heap
page read and write
4C78000
heap
page read and write
4CE000
unkown
page execute and read and write
4CA5000
heap
page read and write
7DE000
stack
page read and write
140000000
unkown
page readonly
17C0000
heap
page read and write
32F6000
heap
page read and write
5140000
heap
page read and write
4CE9000
heap
page read and write
100000
heap
page read and write
30C4000
heap
page read and write
129F000
stack
page read and write
938000
unkown
page execute and write copy
CF0000
heap
page read and write
EC4000
heap
page read and write
4C80000
heap
page read and write
EE0000
heap
page read and write
140120000
unkown
page write copy
4C6F000
heap
page read and write
32FA000
heap
page read and write
4CCF000
heap
page read and write
54BF000
stack
page read and write
4CA5000
heap
page read and write
18E000
stack
page read and write
1E0000
heap
page read and write
EE0000
heap
page read and write
EE8000
heap
page read and write
4CA5000
heap
page read and write
9CC000
heap
page read and write
9F7000
heap
page read and write
FF2000
heap
page read and write
F62000
heap
page read and write
9F7000
heap
page read and write
62D2000
heap
page read and write
32F9000
heap
page read and write
4CB5000
heap
page read and write
EBB000
heap
page read and write
4C60000
heap
page read and write
EB8000
heap
page read and write
EE0000
heap
page read and write
4CE0000
heap
page read and write
4CA7000
heap
page read and write
32F4000
heap
page read and write
EB8000
heap
page read and write
4CA7000
heap
page read and write
2FC0000
heap
page read and write
EE1000
heap
page read and write
2FC3000
heap
page read and write
4D36000
heap
page read and write
4CCF000
heap
page read and write
4C43000
heap
page read and write
FE0000
heap
page read and write
FEE000
heap
page read and write
938000
unkown
page execute and write copy
115000
heap
page read and write
4C80000
heap
page read and write
4C83000
heap
page read and write
32FF000
heap
page read and write
4CCF000
heap
page read and write
140122000
unkown
page write copy
99000
stack
page read and write
9A000
stack
page read and write
7AD000
stack
page read and write
EE0000
heap
page read and write
33C1000
heap
page read and write
4C68000
heap
page read and write
FE8000
heap
page read and write
400000
unkown
page readonly
4EC000
unkown
page execute and read and write
1400FB000
unkown
page readonly
52D0000
trusted library allocation
page read and write
A0000
heap
page read and write
4CE3000
heap
page read and write
EF0000
heap
page read and write
14012A000
unkown
page readonly
7D7000
stack
page read and write
EB3000
heap
page read and write
32F8000
heap
page read and write
527C000
stack
page read and write
9D1000
heap
page read and write
FE8000
heap
page read and write
93A000
unkown
page write copy
4C78000
heap
page read and write
EB8000
heap
page read and write
EC4000
heap
page read and write
4C76000
heap
page read and write
4CB5000
heap
page read and write
4C80000
heap
page read and write
4D01000
heap
page read and write
93A000
unkown
page read and write
4CB4000
heap
page read and write
32F3000
heap
page read and write
7BE000
stack
page read and write
D47000
stack
page read and write
401000
unkown
page execute and read and write
5ADF000
heap
page read and write
4E2000
unkown
page execute and read and write
4C90000
heap
page read and write
EC5000
heap
page read and write
4CB5000
heap
page read and write
D23000
stack
page read and write
A07000
heap
page read and write
4DD0000
trusted library allocation
page read and write
3190000
heap
page read and write
FF1000
heap
page read and write
4CB4000
heap
page read and write
90000
heap
page read and write
4C70000
heap
page read and write
4CCF000
heap
page read and write
A0B000
heap
page read and write
100000
heap
page read and write
4CB4000
heap
page read and write
1002000
heap
page read and write
4C60000
heap
page read and write
2B79000
heap
page read and write
E35000
heap
page read and write
F18000
heap
page read and write
2B70000
heap
page read and write
DF8000
heap
page read and write
30C0000
heap
page read and write
14011F000
unkown
page read and write
4C78000
heap
page read and write
140001000
unkown
page execute read
F00000
heap
page read and write
140123000
unkown
page read and write
DF0000
trusted library section
page read and write
400000
unkown
page readonly
CFA000
heap
page read and write
4C78000
heap
page read and write
D1E000
heap
page read and write
32FB000
heap
page read and write
4CB5000
heap
page read and write
4C94000
heap
page read and write
F65000
heap
page read and write
32F5000
heap
page read and write
32F8000
heap
page read and write
5ACF000
stack
page read and write
4C68000
heap
page read and write
4C4E000
heap
page read and write
34DC000
stack
page read and write
A2D000
heap
page read and write
4C83000
heap
page read and write
4CA7000
heap
page read and write
F28000
heap
page read and write
9CB000
heap
page read and write
513F000
stack
page read and write
32FF000
heap
page read and write
4CA5000
heap
page read and write
4C84000
heap
page read and write
190000
heap
page read and write
140123000
unkown
page read and write
4C80000
heap
page read and write
32FE000
heap
page read and write
4C94000
heap
page read and write
4C58000
heap
page read and write
4C80000
heap
page read and write
140001000
unkown
page execute read
181F000
stack
page read and write
4CB4000
heap
page read and write
EC3000
heap
page read and write
E9E000
stack
page read and write
175000
heap
page read and write
4C62000
heap
page read and write
4EC000
unkown
page execute and read and write
4CCF000
heap
page read and write
14E000
stack
page read and write
E20000
heap
page read and write
190000
heap
page read and write
2F70000
heap
page read and write
7E5000
stack
page read and write
1400FB000
unkown
page readonly
7EE000
stack
page read and write
EE1000
heap
page read and write
EE8000
heap
page read and write
4D26000
heap
page read and write
E35000
heap
page read and write
EE0000
heap
page read and write
4C76000
heap
page read and write
4C5D000
heap
page read and write
4C50000
heap
page read and write
CE0000
heap
page read and write
332E000
stack
page read and write
32F6000
heap
page read and write
4CA7000
heap
page read and write
14011F000
unkown
page read and write
4C83000
heap
page read and write
1FE000
heap
page read and write
14011C000
unkown
page write copy
4C80000
heap
page read and write
4C60000
heap
page read and write
33C0000
trusted library allocation
page read and write
6ACD000
stack
page read and write
400000
unkown
page readonly
4C94000
heap
page read and write
2760000
heap
page read and write
3360000
heap
page read and write
33B0000
heap
page read and write
4C68000
heap
page read and write
FE3000
heap
page read and write
EE8000
heap
page read and write
EBE000
heap
page read and write
4CE5000
heap
page read and write
108000
heap
page read and write
4C50000
heap
page read and write
32FD000
heap
page read and write
4C68000
heap
page read and write
32F4000
heap
page read and write
100F000
heap
page read and write
4CA7000
heap
page read and write
A10000
heap
page read and write
4D1F000
heap
page read and write
4CCF000
heap
page read and write
32F5000
heap
page read and write
4C60000
heap
page read and write
140120000
unkown
page write copy
3466000
heap
page read and write
ED9000
heap
page read and write
2A40000
heap
page read and write
EE0000
heap
page read and write
32F2000
heap
page read and write
4CCF000
heap
page read and write
D06000
heap
page read and write
62CD000
stack
page read and write
4D1D000
heap
page read and write
4C77000
heap
page read and write
4CA7000
heap
page read and write
4D25000
heap
page read and write
7F8000
stack
page read and write
C0000
heap
page read and write
D1E000
stack
page read and write
32F2000
heap
page read and write
EE0000
heap
page read and write
666000
unkown
page execute and write copy
4C78000
heap
page read and write
7ED000
stack
page read and write
100000
heap
page read and write
D0C000
heap
page read and write
32F2000
heap
page read and write
4C78000
heap
page read and write
4C78000
heap
page read and write
4CE5000
heap
page read and write
FF8000
heap
page read and write
7BE000
stack
page read and write
354E000
stack
page read and write
5BAC000
heap
page read and write
1A0000
heap
page read and write
18A000
heap
page read and write
4C90000
heap
page read and write
There are 468 hidden memdumps, click here to show them.