IOC Report
5kplayer-setup.exe

loading gif

Files

File Path
Type
Category
Malicious
5kplayer-setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_5kp.exe_62a77edd96bbf36f4741e2a9b852effc9e803e_f76daea9_f1600ac1-62a3-4192-80c6-43550a3d8940\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER238.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 19 05:58:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2784.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27B4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\5kplayer\5kp.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\5kplayer\5kp.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr8AE6.tmp\nsis7zU.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Digiarty\unique.bin
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5kplayer-setup.exe
"C:\Users\user\Desktop\5kplayer-setup.exe"
C:\Users\user\AppData\Local\Temp\5kplayer\5kp.exe
C:\Users\user\AppData\Local\Temp\5kplayer\5kp.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5436 -s 6324

URLs

Name
IP
Malicious
http://dl1.5kplayer.com:80mW
unknown
http://dejavu-fonts.org
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80mZ
unknown
http://dl1.5kplayer.com:80mM
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-jp.htm?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80mS
unknown
https://www.5kplayer.com/iphone-manager-zh?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.winxdvd.com/dvd-ripper-platinum?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/software/rip-dvd.htm?ttsoft=5kpwin-%1-instuidvdRepinstuiSetup/recsoftdvdRip
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-zh.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-jp.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80mw
unknown
https://www.5kplayer.com/iphone-manager-de?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80m3Y
unknown
http://dl1.5kplayer.com:80mt
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-es.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-fr.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80ms
unknown
http://dl1.5kplayer.com/download/onlineload.confighttp://dl1.5kplayer.com/download/5kplayer-64bit.ex
unknown
http://dl1.5kplayer.com:80mf
unknown
https://www.videoproc.com?ttsoft=5kpwin-%1-instuivideoporc_enhttps://jp.videoproc.com?ttsoft=5kpwin-
unknown
http://dl1.5kplayer.com:80mV1
unknown
http://dl1.5kplayer.com:80mi
unknown
http://dl1.5kplayer.com:80mh
unknown
http://dl1.5kplayer.com:80mb
unknown
https://www.videoproc.com/index-fr.htm?ttsoft=5kpwin-6.0-instui-undefL
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-de.htm?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80ma
unknown
http://dl1.5kplayer.com/download/onlineload.config
unknown
http://dl1.5kplayer.com:80my=
unknown
http://www.phreedom.org/md5)
unknown
http://dl1.5kplayer.com:80mgdz
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-fr.htm?ttsoft=5kpwin-%1-instui
unknown
https://jp.videoproc.com?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/iphone-manager-jp?ttsoft=5kpwin-6.0-instui-undef
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit.htm?ttsoft=5kpwin-%1-instuidownFailin
unknown
http://dl1.5kplayer.com:80m85
unknown
https://www.5kplayer.com/iphone-manager-de?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-it.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80m;
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-fr.htm?ttsoft=5kpwin-%1-instui
unknown
https://www.5kplayer.com/iphone-manager/?ttsoft=5kpwin-%1-instuiipManagerinstuiSetup/recsoftipmng/na
unknown
https://www.videoproc.com/index-zh.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com/download/onlineload.configN
unknown
https://www.videoproc.com/?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80y
unknown
http://dl1.5kplayer.com:80m)
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-pt.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/iphone-manager/?ttsoft=5kpwin-%1-instui
unknown
https://www.videoproc.com/index-fr.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-de.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80u
unknown
http://dl1.5kplayer.com:80I2
unknown
http://www.phreedom.org/md5)08:27
unknown
http://dl1.5kplayer.com:80m
unknown
https://www.videoproc.com/index-it.htm?ttsoft=5kpwin-6.0-instui-undefL
unknown
http://ocsp.sectigo.com0
unknown
https://www.5kplayer.com/iphone-manager-jp?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80z?
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-es.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com:443aming
unknown
http://dl1.5kplayer.com:80mc=
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-de.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80U
unknown
http://www.openssl.org/support/faq.html
unknown
http://dl1.5kplayer.com:80L
unknown
http://dl1.5kplayer.com:80O
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-zh.htm?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80N
unknown
https://www.videoproc.com?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com/download/5kplayer-64bit.exe
unknown
https://www.videoproc.com/?ttsoft=5kpwin-%1-instuivideoporcinstuiSetup/recsoftvdproc/namevdproc/info
unknown
https://www.videoproc.com/index-it.htm?ttsoft=5kpwin-%1-instui
unknown
https://www.videoproc.com/index-de.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-zh.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-zh.htm?ttsoft=5kpwin-%1-instui
unknown
https://www.videoproc.com/index-es.htm?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit.htm?ttsoft=5kpwin-%1-instui
unknown
https://www.videoproc.com?ttsoft=5kpwin-6.0-instui-undefX
unknown
https://www.videoproc.com/index-it.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://jp.videoproc.com?ttsoft=5kpwin-%1-instui
unknown
https://www.5kplayer.com/r/go.php?
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-jp.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.5kplayer.com/install/download-5kplayer-32bit-64bit-de.htm?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80)
unknown
https://sectigo.com/CPS0
unknown
https://www.5kplayer.com/iphone-manager?ttsoft=5kpwin-%1-instui
unknown
https://www.5kplayer.com/software/rip-dvd.htm?ttsoft=5kpwin-%1-instui
unknown
https://www.winxdvd.com/dvd-ripper-platinum/index-fr.htm?ttsoft=5kpwin-6.0-instui-undef
unknown
http://dl1.5kplayer.com:80#
unknown
https://www.5kplayer.com/iphone-manager?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.videoproc.com?ttsoft=5kpwin-6.0-instui-undef
unknown
https://www.videoproc.com/index-zh.htm?ttsoft=5kpwin-%1-instui
unknown
http://dl1.5kplayer.com:80%
unknown
https://www.videoproc.com/index-fr.htm?ttsoft=5kpwin-%1-instui
unknown
http://upx.sf.net
unknown
https://www.5kplayer.com/iphone-manager-zh?ttsoft=5kpwin-%1-instui
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.5kplayer.com
67.228.121.196
dl1.5kplayer.com
67.228.121.193

IPs

IP
Domain
Country
Malicious
67.228.121.196
www.5kplayer.com
United States
67.228.121.193
dl1.5kplayer.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
ProgramId
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
FileId
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
LowerCaseLongPath
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
LongPathHash
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
Name
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
OriginalFileName
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
Publisher
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
Version
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
BinFileVersion
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
BinaryType
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
ProductName
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
ProductVersion
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
LinkDate
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
BinProductVersion
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
AppxPackageFullName
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
AppxPackageRelativeId
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
Size
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
Language
\REGISTRY\A\{415cffab-ac87-1e5f-d101-610e83b14498}\Root\InventoryApplicationFile\5kp.exe|389e76e0c83b3e75
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
75D000
heap
page read and write
1CB5B000
stack
page read and write
11BB000
unkown
page read and write
9CDB000
stack
page read and write
ACDC000
stack
page read and write
792000
heap
page read and write
F71C000
stack
page read and write
14F9B000
stack
page read and write
5E5000
heap
page read and write
136DB000
stack
page read and write
1897000
unkown
page read and write
91DC000
stack
page read and write
787000
heap
page read and write
41F1000
heap
page read and write
3BAA000
heap
page read and write
1D71000
heap
page read and write
1665C000
stack
page read and write
5BB8000
heap
page read and write
1049C000
stack
page read and write
7A6B000
heap
page read and write
1DB5C000
stack
page read and write
400000
unkown
page readonly
1B90000
heap
page read and write
1641C000
stack
page read and write
22BE000
stack
page read and write
2120000
heap
page read and write
1D23000
heap
page read and write
3A5F000
heap
page read and write
7AA3000
heap
page read and write
869C000
stack
page read and write
E2DC000
stack
page read and write
1DFDC000
stack
page read and write
121DC000
stack
page read and write
16ADC000
stack
page read and write
1ED1A000
heap
page read and write
1B9DB000
stack
page read and write
128E0000
heap
page read and write
204FC000
stack
page read and write
1265C000
stack
page read and write
CE5B000
stack
page read and write
B39C000
stack
page read and write
189A000
unkown
page read and write
1CDDC000
stack
page read and write
3E41000
heap
page read and write
2007C000
stack
page read and write
1979B000
stack
page read and write
41F1000
heap
page read and write
409000
unkown
page readonly
3ED1000
heap
page read and write
16F5C000
stack
page read and write
F05C000
stack
page read and write
FFDB000
stack
page read and write
12881000
heap
page read and write
2147B000
stack
page read and write
2073C000
stack
page read and write
1715B000
stack
page read and write
B5DC000
stack
page read and write
7F9C000
stack
page read and write
B81C000
stack
page read and write
20EF000
stack
page read and write
241BC000
stack
page read and write
1D71000
heap
page read and write
1D41000
heap
page read and write
12DDB000
stack
page read and write
1C25B000
stack
page read and write
15F9C000
stack
page read and write
2890000
heap
page read and write
791E000
heap
page read and write
3EB7000
heap
page read and write
BA5C000
stack
page read and write
A81B000
stack
page read and write
21FFC000
stack
page read and write
2093B000
stack
page read and write
D79C000
stack
page read and write
1C05C000
stack
page read and write
1719C000
stack
page read and write
11F9C000
stack
page read and write
2340000
heap
page read and write
C79B000
stack
page read and write
EB9B000
stack
page read and write
15CF000
unkown
page readonly
8F5B000
stack
page read and write
1D2DC000
stack
page read and write
1D33000
heap
page read and write
791B000
heap
page read and write
401000
unkown
page execute read
243BB000
stack
page read and write
4C00000
direct allocation
page read and write
59E0000
heap
page read and write
500000
unkown
page readonly
FB9C000
stack
page read and write
24EFB000
stack
page read and write
799000
heap
page read and write
11CD000
unkown
page readonly
197DC000
stack
page read and write
8ADB000
stack
page read and write
D55C000
stack
page read and write
41EB000
stack
page read and write
1CE0000
heap
page read and write
5BB2000
heap
page read and write
5DDA000
stack
page read and write
1325B000
stack
page read and write
409000
unkown
page readonly
1959C000
stack
page read and write
158DC000
stack
page read and write
1A7DC000
stack
page read and write
1D86000
heap
page read and write
1EC62000
heap
page read and write
1D4E000
heap
page read and write
1541B000
stack
page read and write
781C000
heap
page read and write
228BB000
stack
page read and write
10B5C000
stack
page read and write
11BB000
unkown
page write copy
5B8C000
heap
page read and write
CC1B000
stack
page read and write
7A1000
heap
page read and write
C35C000
stack
page read and write
11C7000
unkown
page read and write
1D68000
heap
page read and write
11F5B000
stack
page read and write
5B98000
heap
page read and write
1AADC000
stack
page read and write
401000
unkown
page execute read
1CD9B000
stack
page read and write
15D1B000
stack
page read and write
D31C000
stack
page read and write
F91B000
stack
page read and write
106DC000
stack
page read and write
DC1C000
stack
page read and write
1C4DC000
stack
page read and write
105000
heap
page read and write
1C49B000
stack
page read and write
20FBB000
stack
page read and write
2995000
heap
page read and write
22D7C000
stack
page read and write
18CDB000
stack
page read and write
F29C000
stack
page read and write
645E000
stack
page read and write
20DBC000
stack
page read and write
D2DB000
stack
page read and write
1DD9C000
stack
page read and write
1565B000
stack
page read and write
1DD5B000
stack
page read and write
796000
heap
page read and write
965C000
stack
page read and write
1D71000
heap
page read and write
1241C000
stack
page read and write
253BC000
stack
page read and write
134DC000
stack
page read and write
1275000
unkown
page readonly
3E44000
heap
page read and write
3EC0000
heap
page read and write
221FB000
stack
page read and write
179DC000
stack
page read and write
1D66000
heap
page read and write
5B96000
heap
page read and write
1219B000
stack
page read and write
1D31000
heap
page read and write
9ADC000
stack
page read and write
500000
unkown
page readonly
AF1C000
stack
page read and write
16A9B000
stack
page read and write
740000
heap
page read and write
B15C000
stack
page read and write
1A0DC000
stack
page read and write
1C87000
heap
page read and write
1ED46000
heap
page read and write
11D5C000
stack
page read and write
24F3C000
stack
page read and write
773C000
heap
page read and write
146DC000
stack
page read and write
11BC000
unkown
page write copy
B59B000
stack
page read and write
E99C000
stack
page read and write
1761C000
stack
page read and write
1D39000
heap
page read and write
108DB000
stack
page read and write
1421B000
stack
page read and write
1FBFB000
stack
page read and write
2517C000
stack
page read and write
222F000
stack
page read and write
2223C000
stack
page read and write
1D29B000
stack
page read and write
2320000
direct allocation
page read and write
1BC3000
heap
page read and write
397F000
stack
page read and write
2487C000
stack
page read and write
78E5000
heap
page read and write
4200000
heap
page read and write
18A2000
unkown
page write copy
45F9000
heap
page read and write
1D29000
heap
page read and write
709C000
stack
page read and write
665F000
stack
page read and write
16F1B000
stack
page read and write
118DC000
stack
page read and write
1425C000
stack
page read and write
2267D000
stack
page read and write
621E000
stack
page read and write
1EC0A000
heap
page read and write
400000
unkown
page readonly
5B49000
heap
page read and write
C55B000
stack
page read and write
7728000
heap
page read and write
74B000
heap
page read and write
214BC000
stack
page read and write
1449C000
stack
page read and write
1913000
stack
page read and write
20D7B000
stack
page read and write
231BB000
stack
page read and write
1A55C000
stack
page read and write
1D68000
heap
page read and write
1EC3E000
heap
page read and write
180DB000
stack
page read and write
2483B000
stack
page read and write
1275000
unkown
page readonly
1D90000
heap
page read and write
5B49000
heap
page read and write
556C000
stack
page read and write
202BC000
stack
page read and write
18A4000
unkown
page write copy
F25B000
stack
page read and write
865B000
stack
page read and write
4B80000
direct allocation
page read and write
13BA000
unkown
page readonly
1CB9C000
stack
page read and write
12860000
heap
page read and write
1EC00000
heap
page read and write
19E9C000
stack
page read and write
4A80000
direct allocation
page read and write
1D69B000
stack
page read and write
1001C000
stack
page read and write
226BC000
stack
page read and write
1BDDB000
stack
page read and write
1789B000
stack
page read and write
A19C000
stack
page read and write
1299C000
stack
page read and write
1D71000
heap
page read and write
182DB000
stack
page read and write
7B5C000
stack
page read and write
81DB000
stack
page read and write
1B8E000
stack
page read and write
23ABB000
stack
page read and write
1AA9C000
stack
page read and write
19C5C000
stack
page read and write
5E0000
heap
page read and write
1D8A000
heap
page read and write
18EDB000
stack
page read and write
1D33000
heap
page read and write
40C000
unkown
page read and write
919B000
stack
page read and write
5B96000
heap
page read and write
400000
unkown
page readonly
7A0F000
heap
page read and write
1B5DB000
stack
page read and write
1D39000
heap
page read and write
67A0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
1CEA000
heap
page read and write
7D5F000
stack
page read and write
1F0000
heap
page read and write
1445B000
stack
page read and write
7927000
heap
page read and write
1A81C000
stack
page read and write
790000
heap
page read and write
2463C000
stack
page read and write
126E000
unkown
page readonly
7FDC000
stack
page read and write
12BDC000
stack
page read and write
1D71000
heap
page read and write
2DE5000
heap
page read and write
1B1DB000
stack
page read and write
E01000
unkown
page execute read
13DDC000
stack
page read and write
2CDA000
heap
page read and write
126E000
unkown
page readonly
17C9B000
stack
page read and write
1D6DC000
stack
page read and write
1931B000
stack
page read and write
1025C000
stack
page read and write
15D5C000
stack
page read and write
7A91000
heap
page read and write
1D46000
heap
page read and write
13BA000
unkown
page readonly
552C000
stack
page read and write
15CF000
unkown
page readonly
D09B000
stack
page read and write
1BC0000
heap
page read and write
1D5F000
heap
page read and write
2123B000
stack
page read and write
72DC000
stack
page read and write
1ECFA000
heap
page read and write
2537B000
stack
page read and write
BE9B000
stack
page read and write
783000
heap
page read and write
1ECA2000
heap
page read and write
DE1B000
stack
page read and write
1521C000
stack
page read and write
A39B000
stack
page read and write
1DA4000
heap
page read and write
1D5F000
heap
page read and write
190DB000
stack
page read and write
1B7DB000
stack
page read and write
1B3DB000
stack
page read and write
1189B000
stack
page read and write
1D3DC000
stack
page read and write
1C8A000
heap
page read and write
21B3B000
stack
page read and write
2127C000
stack
page read and write
21DBC000
stack
page read and write
1D34000
heap
page read and write
7720000
heap
page read and write
1D5F000
heap
page read and write
12886000
heap
page read and write
771F000
stack
page read and write
12864000
heap
page read and write
1A75B000
stack
page read and write
17A1C000
stack
page read and write
1D1B000
heap
page read and write
1ECD7000
heap
page read and write
1349B000
stack
page read and write
7ADB000
heap
page read and write
1955B000
stack
page read and write
1C01B000
stack
page read and write
1D7F000
heap
page read and write
18ADB000
stack
page read and write
55AE000
stack
page read and write
10FDC000
stack
page read and write
1C91B000
stack
page read and write
228FC000
stack
page read and write
44EF000
unkown
page read and write
1AB1C000
stack
page read and write
10D9C000
stack
page read and write
2103C000
stack
page read and write
20FFC000
stack
page read and write
5BA7000
heap
page read and write
23F3B000
stack
page read and write
1D71000
heap
page read and write
148DB000
stack
page read and write
821C000
stack
page read and write
1545C000
stack
page read and write
1A31C000
stack
page read and write
186DB000
stack
page read and write
15ADB000
stack
page read and write
12B9B000
stack
page read and write
151DB000
stack
page read and write
1C50000
trusted library section
page readonly
1795C000
stack
page read and write
1DB1B000
stack
page read and write
1D8DB000
stack
page read and write
1AA5C000
stack
page read and write
1EC13000
heap
page read and write
700000
heap
page read and write
1AB5C000
stack
page read and write
5B43000
heap
page read and write
1765C000
stack
page read and write
641F000
stack
page read and write
1D7C000
heap
page read and write
729B000
stack
page read and write
377F000
stack
page read and write
2417B000
stack
page read and write
22B3C000
stack
page read and write
19A000
stack
page read and write
10B1B000
stack
page read and write
1165B000
stack
page read and write
128E7000
heap
page read and write
255FC000
stack
page read and write
8D5C000
stack
page read and write
5B83000
heap
page read and write
E51C000
stack
page read and write
17EDB000
stack
page read and write
3DBF000
heap
page read and write
F49B000
stack
page read and write
A5DB000
stack
page read and write
EDDB000
stack
page read and write
9B000
stack
page read and write
9F5C000
stack
page read and write
10F9B000
stack
page read and write
257FB000
stack
page read and write
A15B000
stack
page read and write
570000
heap
page read and write
22FBC000
stack
page read and write
1D5F000
heap
page read and write
5FDD000
stack
page read and write
2003B000
stack
page read and write
88DC000
stack
page read and write
1DBE000
heap
page read and write
173DC000
stack
page read and write
14B5C000
stack
page read and write
5B98000
heap
page read and write
1BE1C000
stack
page read and write
11C1000
unkown
page read and write
6FE000
stack
page read and write
1D90000
heap
page read and write
1169C000
stack
page read and write
23D3C000
stack
page read and write
216BB000
stack
page read and write
7F5B000
stack
page read and write
1DB8000
heap
page read and write
BC9C000
stack
page read and write
1689C000
stack
page read and write
B11B000
stack
page read and write
5A63000
heap
page read and write
1799C000
stack
page read and write
1DF9B000
stack
page read and write
2513B000
stack
page read and write
9D5000
heap
page read and write
1D09C000
stack
page read and write
7AAF000
heap
page read and write
1A51B000
stack
page read and write
93DB000
stack
page read and write
1F9FB000
stack
page read and write
14FDC000
stack
page read and write
2343C000
stack
page read and write
1935C000
stack
page read and write
F01B000
stack
page read and write
1D46000
heap
page read and write
AA9C000
stack
page read and write
7724000
heap
page read and write
226E000
stack
page read and write
1305C000
stack
page read and write
CC5C000
stack
page read and write
EBDC000
stack
page read and write
1371C000
stack
page read and write
7813000
heap
page read and write
1B4E000
stack
page read and write
5BAF000
heap
page read and write
13FDB000
stack
page read and write
FD9B000
stack
page read and write
1661B000
stack
page read and write
43C000
unkown
page read and write
255BB000
stack
page read and write
1D5F000
heap
page read and write
E01000
unkown
page execute read
21FBB000
stack
page read and write
14D9C000
stack
page read and write
19E5B000
stack
page read and write
1A79C000
stack
page read and write
1739B000
stack
page read and write
F95C000
stack
page read and write
941C000
stack
page read and write
128B9000
heap
page read and write
FB5B000
stack
page read and write
E09C000
stack
page read and write
5BB8000
heap
page read and write
1D7C000
heap
page read and write
1AB9C000
stack
page read and write
E4DB000
stack
page read and write
D75B000
stack
page read and write
79A000
heap
page read and write
1D86000
heap
page read and write
A85C000
stack
page read and write
2243B000
stack
page read and write
1ED56000
heap
page read and write
1491C000
stack
page read and write
AC9B000
stack
page read and write
1141B000
stack
page read and write
1E5FB000
stack
page read and write
1DCE000
heap
page read and write
1D91C000
stack
page read and write
188DB000
stack
page read and write
1C29C000
stack
page read and write
189F000
unkown
page read and write
13D9B000
stack
page read and write
401000
unkown
page execute read
128EA000
heap
page read and write
401000
unkown
page execute read
1D5F000
heap
page read and write
1D1D000
heap
page read and write
23CFB000
stack
page read and write
231FC000
stack
page read and write
1619B000
stack
page read and write
20B7B000
stack
page read and write
18A9000
unkown
page write copy
889B000
stack
page read and write
1C80000
heap
page read and write
19A1C000
stack
page read and write
2027B000
stack
page read and write
F6DB000
stack
page read and write
216FC000
stack
page read and write
1D7C000
heap
page read and write
163DB000
stack
page read and write
11CD000
unkown
page readonly
21B7C000
stack
page read and write
1C2C000
stack
page read and write
1D41C000
stack
page read and write
BEDC000
stack
page read and write
17A5C000
stack
page read and write
16CDB000
stack
page read and write
1301B000
stack
page read and write
B35B000
stack
page read and write
A3DC000
stack
page read and write
C0DB000
stack
page read and write
1288C000
heap
page read and write
11B1C000
stack
page read and write
218FB000
stack
page read and write
1ABDC000
stack
page read and write
7734000
heap
page read and write
184DB000
stack
page read and write
DBDB000
stack
page read and write
1145C000
stack
page read and write
243FC000
stack
page read and write
1D39C000
stack
page read and write
9F1B000
stack
page read and write
1D45C000
stack
page read and write
DE5C000
stack
page read and write
5B50000
heap
page read and write
1CFDB000
stack
page read and write
1401C000
stack
page read and write
204BB000
stack
page read and write
1685B000
stack
page read and write
1791C000
stack
page read and write
1EBFB000
stack
page read and write
1BBDB000
stack
page read and write
1569C000
stack
page read and write
1021B000
stack
page read and write
8B1C000
stack
page read and write
1911C000
stack
page read and write
1CCE000
stack
page read and write
11C3000
unkown
page write copy
1D35C000
stack
page read and write
1D66000
heap
page read and write
1069B000
stack
page read and write
1391B000
stack
page read and write
10D5B000
stack
page read and write
D99B000
stack
page read and write
751C000
stack
page read and write
D9DC000
stack
page read and write
A61C000
stack
page read and write
5B50000
heap
page read and write
1BE0000
heap
page read and write
15B1C000
stack
page read and write
1D68000
heap
page read and write
EE1C000
stack
page read and write
F0000
heap
page read and write
2367C000
stack
page read and write
1E7FB000
stack
page read and write
1D01C000
stack
page read and write
24ABC000
stack
page read and write
2AAF000
heap
page read and write
1E0000
heap
page read and write
1C90000
trusted library allocation
page read and write
2BC7000
heap
page read and write
845C000
stack
page read and write
3ED4000
heap
page read and write
18A2000
unkown
page read and write
123DB000
stack
page read and write
1A09B000
stack
page read and write
1891000
unkown
page read and write
40C000
unkown
page write copy
E29B000
stack
page read and write
E95B000
stack
page read and write
1ECE6000
heap
page read and write
D0DC000
stack
page read and write
1D71000
heap
page read and write
1FE3C000
stack
page read and write
1769C000
stack
page read and write
46B000
unkown
page read and write
41F0000
heap
page read and write
13B9C000
stack
page read and write
CE9C000
stack
page read and write
3EB9000
heap
page read and write
13B5B000
stack
page read and write
1329C000
stack
page read and write
2193C000
stack
page read and write
4B00000
direct allocation
page read and write
C31B000
stack
page read and write
1D67000
heap
page read and write
1C30000
heap
page read and write
5BA9000
heap
page read and write
79F000
heap
page read and write
5BAF000
heap
page read and write
1D9C000
heap
page read and write
1AFDB000
stack
page read and write
100000
heap
page read and write
CA1C000
stack
page read and write
7762000
heap
page read and write
1D5F000
heap
page read and write
19C1B000
stack
page read and write
175DB000
stack
page read and write
111DB000
stack
page read and write
5B7E000
heap
page read and write
5B7E000
heap
page read and write
17CDC000
stack
page read and write
1D5F000
heap
page read and write
1F7FB000
stack
page read and write
22D3B000
stack
page read and write
1469B000
stack
page read and write
F4DC000
stack
page read and write
37E5000
heap
page read and write
22AFB000
stack
page read and write
1121C000
stack
page read and write
3E4A000
heap
page read and write
3E4E000
heap
page read and write
772C000
heap
page read and write
5BA9000
heap
page read and write
14D5B000
stack
page read and write
7AD9000
heap
page read and write
1C95C000
stack
page read and write
1D68000
heap
page read and write
16D1C000
stack
page read and write
7738000
heap
page read and write
420000
unkown
page read and write
24CFC000
stack
page read and write
11ADB000
stack
page read and write
9A9B000
stack
page read and write
AA5B000
stack
page read and write
D51B000
stack
page read and write
3E48000
heap
page read and write
B7DB000
stack
page read and write
9D1C000
stack
page read and write
1AA1B000
stack
page read and write
2097C000
stack
page read and write
11D1B000
stack
page read and write
8D1B000
stack
page read and write
841B000
stack
page read and write
199DB000
stack
page read and write
989C000
stack
page read and write
E05B000
stack
page read and write
22F7B000
stack
page read and write
3E02000
heap
page read and write
AEDB000
stack
page read and write
BA1B000
stack
page read and write
233FB000
stack
page read and write
BC5B000
stack
page read and write
1395C000
stack
page read and write
1D71000
heap
page read and write
401000
unkown
page execute read
1A2DB000
stack
page read and write
278F000
stack
page read and write
C59C000
stack
page read and write
985B000
stack
page read and write
20F0000
heap
page read and write
1589B000
stack
page read and write
FDDC000
stack
page read and write
1EC32000
heap
page read and write
15F5B000
stack
page read and write
9D0000
heap
page read and write
17A9C000
stack
page read and write
61DF000
stack
page read and write
1CFD000
heap
page read and write
7730000
heap
page read and write
C9DB000
stack
page read and write
C7DC000
stack
page read and write
1261B000
stack
page read and write
12E1C000
stack
page read and write
99000
stack
page read and write
5B46000
heap
page read and write
1C71C000
stack
page read and write
5602000
trusted library allocation
page read and write
206FB000
stack
page read and write
1091C000
stack
page read and write
14B1B000
stack
page read and write
400000
unkown
page readonly
288F000
stack
page read and write
1D7D000
heap
page read and write
C11C000
stack
page read and write
796000
heap
page read and write
5CE000
stack
page read and write
1D32000
heap
page read and write
1C6DB000
stack
page read and write
24A7B000
stack
page read and write
3A65000
heap
page read and write
5B45000
heap
page read and write
1ADDB000
stack
page read and write
2247C000
stack
page read and write
1E9FB000
stack
page read and write
18A9000
unkown
page write copy
7A69000
heap
page read and write
245FB000
stack
page read and write
23AFC000
stack
page read and write
1285B000
stack
page read and write
1D31C000
stack
page read and write
1D39000
heap
page read and write
1D30000
heap
page read and write
E71B000
stack
page read and write
24CBB000
stack
page read and write
1D49C000
stack
page read and write
E75C000
stack
page read and write
961B000
stack
page read and write
128F4000
heap
page read and write
78E000
heap
page read and write
1F5FB000
stack
page read and write
74DD000
stack
page read and write
3EB7000
heap
page read and write
178DC000
stack
page read and write
3ED4000
heap
page read and write
238BC000
stack
page read and write
1ECCA000
heap
page read and write
8F9C000
stack
page read and write
1D05C000
stack
page read and write
23F7C000
stack
page read and write
1E3FB000
stack
page read and write
796000
heap
page read and write
1045B000
stack
page read and write
1FDFB000
stack
page read and write
161DC000
stack
page read and write
11BD000
unkown
page read and write
5B83000
heap
page read and write
11C0000
unkown
page write copy
2387B000
stack
page read and write
2363B000
stack
page read and write
21D7B000
stack
page read and write
There are 694 hidden memdumps, click here to show them.