IOC Report
Bluepoint2.exe

loading gif

Files

File Path
Type
Category
Malicious
Bluepoint2.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Wigwamer.Cro7
data
dropped
C:\Users\user\AppData\Local\Temp\emblem-default-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\lang-1026.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\network-cellular-hardware-disabled-symbolic.svg
SVG Scalable Vector Graphics image
modified
C:\Users\user\AppData\Local\Temp\nsh937B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\5eczunoo.5pr\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3036000
dropped
C:\Users\user\AppData\Roaming\5eczunoo.5pr\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3036000
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Bluepoint2.exe
"C:\Users\user\Desktop\Bluepoint2.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\Bluepoint2.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\Bluepoint2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://127.0.0.1:HTTP/1.1
unknown
http://www.certplus.com/CRL/class3.crl0
unknown
http://www.e-me.lv/repository0
unknown
http://www.acabogacia.org/doc0
unknown
https://doc-10-20-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mltfd60q
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
http://ocsp.suscerte.gob.ve0
unknown
http://www.postsignum.cz/crl/psrootqca2.crl02
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
unknown
http://www.chambersign.org1
unknown
http://www.pkioverheid.nl/policies/root-policy0
unknown
http://repository.swisssign.com/0
unknown
http://www.suscerte.gob.ve/lcr0#
unknown
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
unknown
http://crl.ssc.lt/root-c/cacrl.crl0
unknown
http://postsignum.ttc.cz/crl/psrootqca2.crl0
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0
unknown
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
unknown
http://www.certplus.com/CRL/class3P.crl0
unknown
http://www.suscerte.gob.ve/dpc0
unknown
http://www.certeurope.fr/reference/root2.crl0
unknown
http://www.certplus.com/CRL/class2.crl0
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0
unknown
http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
unknown
http://www.defence.gov.au/pki0
unknown
https://drive.google.com/
unknown
https://COMTWSUUu1KHWCDXUrc.org
unknown
http://www.sk.ee/cps/0
unknown
http://www.globaltrust.info0=
unknown
http://www.anf.es
unknown
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
unknown
http://pki.registradores.org/normativa/index.htm0
unknown
https://doc-10-20-docs.googleusercontent.com/L
unknown
http://cps.root-x1.letsencrypt.org0
unknown
http://policy.camerfirma.com0
unknown
http://www.ssc.lt/cps03
unknown
http://ocsp.pki.gva.es0
unknown
http://www.anf.es/es/address-direccion.html
unknown
https://www.anf.es/address/)1(0&
unknown
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
unknown
http://ca.mtin.es/mtin/ocsp0
unknown
http://cps.letsencrypt.org0
unknown
http://crl.ssc.lt/root-b/cacrl.crl0
unknown
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
unknown
http://www.certicamara.com/dpc/0Z
unknown
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
unknown
http://crl.pki.wellsfargo.com/wsprca.crl0
unknown
https://doc-10-20-docs.googleusercontent.com/sJcf
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://ca.mtin.es/mtin/DPCyPoliticas0
unknown
https://www.anf.es/AC/ANFServerCA.crl0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.globaltrust.info0
unknown
http://certificates.starfieldtech.com/repository/1604
unknown
https://doc-10-20-docs.googleusercontent.com/
unknown
http://acedicom.edicomgroup.com/doc0
unknown
http://www.certplus.com/CRL/class3TS.crl0
unknown
https://doc-10-20-docs.googleusercontent.com/DJ
unknown
https://crl.anf.es/AC/ANFServerCA.crl0
unknown
http://www.certeurope.fr/reference/pc-root2.pdf0
unknown
http://ac.economia.gob.mx/last.crl0G
unknown
https://www.catcert.net/verarrel
unknown
http://www.disig.sk/ca0f
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.e-szigno.hu/RootCA.crl
unknown
http://www.sk.ee/juur/crl/0
unknown
http://crl.chambersign.org/chambersignroot.crl0
unknown
http://certs.oati.net/repository/OATICA2.crl0
unknown
http://crl.oces.trust2408.com/oces.crl0
unknown
http://www.quovadis.bm0
unknown
https://eca.hinet.net/repository0
unknown
http://crl.ssc.lt/root-a/cacrl.crl0
unknown
http://certs.oaticerts.com/repository/OATICA2.crl
unknown
http://www.trustdst.com/certificates/policy/ACES-index.html0
unknown
http://certs.oati.net/repository/OATICA2.crt0
unknown
http://www.accv.es00
unknown
http://www.pkioverheid.nl/policies/root-policy-G20
unknown
https://www.netlock.net/docs
unknown
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
unknown
http://www.e-trust.be/CPS/QNcerts
unknown
http://ocsp.ncdc.gov.sa0
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0
unknown
http://XkBFAe.com
unknown
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
unknown
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
unknown
http://www.datev.de/zertifikat-policy-int0
unknown
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
unknown
https://repository.luxtrust.lu0
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
https://doc-10-20-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mltfd60qk512l24argm1l66nhg5fuhtt/1652377275000/13609515036127870368/*/1octpIAVRhdcovKdwE5x43Ys6qBKX9XGT?e=download
142.250.185.161
http://www.acabogacia.org0
unknown
http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.uce.gub.uy/acrn/acrn.crl0
unknown
http://www.avast.com0/
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.cpassociats.com
unknown
malicious
CE2020050617001.dnssw.net
81.25.126.48
drive.google.com
142.250.184.206
googlehosted.l.googleusercontent.com
142.250.185.161
doc-10-20-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
81.25.126.48
CE2020050617001.dnssw.net
Spain
142.250.185.161
googlehosted.l.googleusercontent.com
United States
142.250.184.206
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8
Blob

Memdumps

Base Address
Regiontype
Protect
Malicious
3350000
direct allocation
page execute and read and write
malicious
1000000
remote allocation
page execute and read and write
malicious
1DA31000
trusted library allocation
page read and write
malicious
1AD5D370000
heap
page read and write
6CF4C7C000
stack
page read and write
2095E000
trusted library allocation
page read and write
1AD5D35B000
heap
page read and write
1C691000
heap
page read and write
40A000
unkown
page write copy
1AD5D37C000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
208A0000
trusted library allocation
page read and write
1FC0E000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20650000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20904000
trusted library allocation
page read and write
20195000
trusted library allocation
page read and write
1AD5CAD8000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1D07E000
stack
page read and write
11D8000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5CAD7000
heap
page read and write
1AD5D37C000
heap
page read and write
1C691000
heap
page read and write
1CBAE000
stack
page read and write
1AD5CAF7000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
96000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20197000
trusted library allocation
page read and write
20C90000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
1AD5D337000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1FD20000
trusted library allocation
page read and write
1447000
heap
page read and write
C40000
heap
page read and write
20C90000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CB02000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5CA7B000
heap
page read and write
1C691000
heap
page read and write
11F5000
heap
page read and write
20640000
trusted library allocation
page read and write
1236000
heap
page read and write
2094A000
trusted library allocation
page read and write
1D8C6000
trusted library allocation
page execute and read and write
1238000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
2580000
heap
page read and write
20620000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1D8AA000
trusted library allocation
page execute and read and write
20975000
trusted library allocation
page read and write
1AD5D30E000
heap
page read and write
20640000
trusted library allocation
page read and write
17FE89C0000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
17FE9202000
trusted library allocation
page read and write
1AD5CAD2000
heap
page read and write
11E7000
heap
page read and write
17FE8A3B000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20195000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
17FE8A31000
heap
page read and write
20192000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
206A0000
trusted library allocation
page read and write
1C691000
heap
page read and write
20C96000
trusted library allocation
page read and write
20670000
trusted library allocation
page read and write
2055E000
stack
page read and write
202E2000
trusted library allocation
page read and write
20740000
trusted library allocation
page read and write
1C691000
heap
page read and write
20560000
trusted library allocation
page read and write
1D89D000
trusted library allocation
page read and write
1D780000
trusted library allocation
page read and write
1FC40000
trusted library allocation
page read and write
1C691000
heap
page read and write
205A0000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
1AD5D370000
heap
page read and write
1C691000
heap
page read and write
206E0000
trusted library allocation
page read and write
1AD5CAB4000
heap
page read and write
1D370000
remote allocation
page read and write
1C691000
heap
page read and write
201C0000
trusted library allocation
page read and write
1DAE2000
trusted library allocation
page read and write
20710000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
208DB000
trusted library allocation
page read and write
20907000
trusted library allocation
page read and write
20180000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5C9D0000
heap
page read and write
1C691000
heap
page read and write
1AD5D30E000
heap
page read and write
5D5000
heap
page read and write
1D866000
trusted library allocation
page read and write
1C691000
heap
page read and write
123A000
heap
page read and write
1160000
heap
page read and write
206EC000
trusted library allocation
page read and write
17FE8A89000
heap
page read and write
20640000
trusted library allocation
page read and write
20680000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
817000
heap
page read and write
2091A000
trusted library allocation
page read and write
1C691000
heap
page read and write
201B3000
trusted library allocation
page read and write
20642000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CA6B000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1CBF1000
heap
page read and write
20C92000
trusted library allocation
page read and write
1C691000
heap
page read and write
2FC9000
trusted library allocation
page read and write
437000
unkown
page read and write
1C691000
heap
page read and write
13C0000
trusted library allocation
page read and write
1D7F2000
trusted library allocation
page read and write
20666000
trusted library allocation
page read and write
1000000
remote allocation
page execute and read and write
1AD5D36D000
heap
page read and write
1D736000
stack
page read and write
1AD5CA2A000
heap
page read and write
1C691000
heap
page read and write
1440000
heap
page read and write
1AD5D32C000
heap
page read and write
1C691000
heap
page read and write
5D7000
heap
page read and write
1C691000
heap
page read and write
206A0000
trusted library allocation
page read and write
11DF000
heap
page read and write
1DB7B000
trusted library allocation
page read and write
1AD5CAA4000
heap
page read and write
20640000
trusted library allocation
page read and write
20160000
trusted library allocation
page execute and read and write
1AD5CB2C000
heap
page read and write
6CF4AF9000
stack
page read and write
20720000
trusted library allocation
page read and write
1AD5D202000
heap
page read and write
20C90000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
12DE000
stack
page read and write
1FC60000
heap
page read and write
20195000
trusted library allocation
page read and write
1AD5CADD000
heap
page read and write
202E0000
trusted library allocation
page read and write
1EA31000
trusted library allocation
page read and write
32D0000
trusted library allocation
page read and write
1C691000
heap
page read and write
720000
trusted library allocation
page read and write
1C691000
heap
page read and write
20720000
trusted library section
page read and write
17FE8A8F000
heap
page read and write
20649000
trusted library allocation
page read and write
17FE8A13000
heap
page read and write
1C691000
heap
page read and write
1D0000
remote allocation
page read and write
1C827000
heap
page read and write
1C691000
heap
page read and write
1AD5CA27000
heap
page read and write
808000
heap
page read and write
821000
heap
page read and write
1C691000
heap
page read and write
1FB0C000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
443000
unkown
page readonly
1CDEE000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
2064A000
trusted library allocation
page read and write
1D8DA000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
20195000
trusted library allocation
page read and write
1C691000
heap
page read and write
6CF507C000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
6CF517E000
stack
page read and write
20650000
trusted library allocation
page execute and read and write
20710000
trusted library allocation
page execute and read and write
3529000
trusted library allocation
page read and write
1DB80000
trusted library allocation
page read and write
20C90000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
6CF487B000
stack
page read and write
1C691000
heap
page read and write
20660000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5D340000
heap
page read and write
1C691000
heap
page read and write
1D8DC000
trusted library allocation
page execute and read and write
20195000
trusted library allocation
page read and write
20700000
trusted library allocation
page execute and read and write
20640000
trusted library allocation
page read and write
1D8D2000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
DAF000
stack
page read and write
1AD5CA13000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5CA7C000
heap
page read and write
7D7000
heap
page read and write
2094A000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
400000
unkown
page readonly
20982000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5D376000
heap
page read and write
20195000
trusted library allocation
page read and write
20720000
trusted library allocation
page read and write
20192000
trusted library allocation
page read and write
1D7C0000
trusted library allocation
page read and write
3DF47F000
stack
page read and write
1AD5D329000
heap
page read and write
1C691000
heap
page read and write
17FE8A46000
heap
page read and write
1C690000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
1D8C0000
trusted library allocation
page read and write
2095E000
trusted library allocation
page read and write
1C691000
heap
page read and write
20962000
trusted library allocation
page read and write
20710000
trusted library allocation
page read and write
1AD5CA86000
heap
page read and write
20190000
trusted library allocation
page read and write
1AD5D356000
heap
page read and write
20640000
trusted library allocation
page read and write
20900000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1FA38000
trusted library allocation
page read and write
201A0000
trusted library allocation
page read and write
1C691000
heap
page read and write
427000
unkown
page read and write
17FE8A52000
heap
page read and write
12E0000
heap
page read and write
20190000
trusted library allocation
page read and write
20670000
trusted library allocation
page read and write
1C691000
heap
page read and write
1FEFC000
stack
page read and write
17FE8A7F000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
123E000
heap
page read and write
17FE8A6E000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
DD0000
remote allocation
page read and write
1C691000
heap
page read and write
20180000
trusted library allocation
page execute and read and write
20640000
trusted library allocation
page read and write
1D0000
remote allocation
page read and write
831000
heap
page read and write
1C691000
heap
page read and write
713C6000
unkown
page readonly
1D7A2000
trusted library allocation
page read and write
1C691000
heap
page read and write
2041E000
stack
page read and write
1C691000
heap
page read and write
201E0000
trusted library allocation
page read and write
2031E000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1EB40000
trusted library allocation
page read and write
1FFFD000
stack
page read and write
20720000
trusted library allocation
page read and write
1C691000
heap
page read and write
20716000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CA00000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20195000
trusted library allocation
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1AD5D359000
heap
page read and write
7D0000
heap
page read and write
1254000
heap
page read and write
1C691000
heap
page read and write
1AD5D329000
heap
page read and write
1DA2E000
stack
page read and write
1C691000
heap
page read and write
20901000
trusted library allocation
page read and write
1D8B2000
trusted library allocation
page execute and read and write
DD0000
remote allocation
page read and write
20CA0000
trusted library allocation
page read and write
1D3AE000
stack
page read and write
1C691000
heap
page read and write
11E7000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
3DEEBB000
stack
page read and write
20710000
trusted library allocation
page read and write
1AD5C8B0000
heap
page read and write
1C691000
heap
page read and write
202DC000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
C45000
heap
page read and write
1AD5C840000
heap
page read and write
1AD5D374000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5CB27000
heap
page read and write
1C691000
heap
page read and write
20C90000
trusted library allocation
page read and write
6CF4E7F000
stack
page read and write
1238000
heap
page read and write
2097B000
trusted library allocation
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
2095B000
trusted library allocation
page read and write
1D790000
heap
page read and write
2045E000
stack
page read and write
20643000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5D37C000
heap
page read and write
1C691000
heap
page read and write
1AD5C9C0000
unclassified section
page readonly
1AD5D30F000
heap
page read and write
1C691000
heap
page read and write
20195000
trusted library allocation
page read and write
1C691000
heap
page read and write
435000
unkown
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5D376000
heap
page read and write
1C691000
heap
page read and write
20710000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
24EF000
stack
page read and write
1C691000
heap
page read and write
1D370000
remote allocation
page read and write
17FE8A40000
heap
page read and write
20190000
trusted library allocation
page read and write
17FE8A66000
heap
page read and write
1C691000
heap
page read and write
1D7A0000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
2097B000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1400000
unclassified section
page readonly
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1D740000
heap
page execute and read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C790000
heap
page read and write
17FE8A4A000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
400000
unkown
page readonly
C40000
heap
page read and write
1AD5D300000
heap
page read and write
1C691000
heap
page read and write
C20000
heap
page read and write
2584000
heap
page read and write
20190000
trusted library allocation
page read and write
1FC10000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
713C4000
unkown
page readonly
206F0000
trusted library allocation
page read and write
6CF4B7F000
stack
page read and write
11E7000
heap
page read and write
1C691000
heap
page read and write
20642000
trusted library allocation
page read and write
1AD5D30E000
heap
page read and write
1D370000
remote allocation
page read and write
7AE000
stack
page read and write
11E2000
heap
page read and write
1C691000
heap
page read and write
1D80F000
trusted library allocation
page read and write
1C691000
heap
page read and write
7F540000
trusted library allocation
page execute and read and write
124C000
heap
page read and write
1D8E0000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
17FE8B02000
heap
page read and write
20190000
trusted library allocation
page read and write
20730000
trusted library allocation
page read and write
1CCEC000
stack
page read and write
1AD5D341000
heap
page read and write
2098B000
trusted library allocation
page read and write
1C691000
heap
page read and write
20690000
trusted library allocation
page read and write
1AD5D302000
heap
page read and write
17FE8A84000
heap
page read and write
1C691000
heap
page read and write
208E7000
trusted library allocation
page read and write
1D0000
remote allocation
page read and write
1AD5D32D000
heap
page read and write
1AD5CADA000
heap
page read and write
20190000
trusted library allocation
page read and write
443000
unkown
page readonly
1C691000
heap
page read and write
17FE8A55000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1D81A000
trusted library allocation
page read and write
20710000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
1AD5D32B000
heap
page read and write
1DB85000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
2097B000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1AD5CA76000
heap
page read and write
20642000
trusted library allocation
page read and write
17FE87F0000
heap
page read and write
408000
unkown
page readonly
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CAFC000
heap
page read and write
20931000
trusted library allocation
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
29DE000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5D332000
heap
page read and write
20660000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20C90000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
1DB74000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
2079E000
stack
page read and write
29CF000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20710000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
17DE000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
3DF67A000
stack
page read and write
20640000
trusted library allocation
page read and write
1236000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5DA02000
heap
page read and write
1C691000
heap
page read and write
206D0000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
20195000
trusted library allocation
page read and write
835000
heap
page read and write
1AD5D32F000
heap
page read and write
20190000
trusted library allocation
page read and write
1D8E2000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1FC50000
trusted library allocation
page execute and read and write
1AD5CAA1000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1EAE0000
trusted library allocation
page read and write
1C691000
heap
page read and write
1D8CA000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
2064E000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
20195000
trusted library allocation
page read and write
1DAE4000
trusted library allocation
page read and write
20710000
trusted library allocation
page read and write
20647000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20949000
trusted library allocation
page read and write
19A000
stack
page read and write
11F0000
heap
page read and write
20934000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CA5D000
heap
page read and write
20680000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
12E4000
heap
page read and write
3451000
trusted library allocation
page read and write
1C691000
heap
page read and write
2094E000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5D215000
heap
page read and write
1C691000
heap
page read and write
5D0000
heap
page read and write
1AD5D32C000
heap
page read and write
20600000
trusted library allocation
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
713C1000
unkown
page execute read
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5D32E000
heap
page read and write
DE0000
unclassified section
page readonly
1D847000
trusted library allocation
page read and write
1D92E000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
DD0000
remote allocation
page read and write
11CC000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1FC70000
trusted library allocation
page read and write
11F0000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
29E9000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
20985000
trusted library allocation
page read and write
1CCAE000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
17FE8A70000
heap
page read and write
34F0000
trusted library allocation
page read and write
1C691000
heap
page read and write
1D8D0000
trusted library allocation
page read and write
11F5000
heap
page read and write
1C691000
heap
page read and write
17FE8A2A000
heap
page read and write
1C691000
heap
page read and write
1D7A8000
trusted library allocation
page read and write
20911000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CA90000
heap
page read and write
1C691000
heap
page read and write
30000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1D8A2000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
401000
unkown
page execute read
20C90000
trusted library allocation
page read and write
1D63A000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1D866000
trusted library allocation
page read and write
1C691000
heap
page read and write
20195000
trusted library allocation
page read and write
206B0000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
1C691000
heap
page read and write
1AD5D1C0000
trusted library allocation
page read and write
1C820000
heap
page read and write
20190000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
201D0000
trusted library allocation
page read and write
20C90000
trusted library allocation
page read and write
1C691000
heap
page read and write
20192000
trusted library allocation
page read and write
1AD5D310000
heap
page read and write
1C691000
heap
page read and write
11D8000
heap
page read and write
20730000
trusted library allocation
page read and write
20946000
trusted library allocation
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
206B0000
trusted library allocation
page read and write
DD0000
remote allocation
page read and write
1C691000
heap
page read and write
206C0000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
20913000
trusted library allocation
page read and write
1C691000
heap
page read and write
20C90000
trusted library allocation
page read and write
20720000
trusted library allocation
page read and write
20911000
trusted library allocation
page read and write
201B0000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5D36B000
heap
page read and write
2530000
trusted library allocation
page read and write
11DF000
heap
page read and write
11E2000
heap
page read and write
6CF4F7C000
stack
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
17FE8960000
unclassified section
page readonly
20900000
trusted library allocation
page read and write
1C691000
heap
page read and write
20192000
trusted library allocation
page read and write
1C691000
heap
page read and write
1DAE6000
trusted library allocation
page read and write
1D8E7000
trusted library allocation
page execute and read and write
1CBF0000
heap
page read and write
20640000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
1D8EB000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
20645000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
401000
unkown
page execute read
20195000
trusted library allocation
page read and write
1C691000
heap
page read and write
1AD5CA81000
heap
page read and write
1C691000
heap
page read and write
2089E000
stack
page read and write
1EAAC000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
408000
unkown
page readonly
B7E000
stack
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
208E9000
trusted library allocation
page read and write
20642000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
20195000
trusted library allocation
page read and write
1AD5D374000
heap
page read and write
1FCE0000
trusted library allocation
page read and write
1CF7E000
stack
page read and write
1AD5D313000
heap
page read and write
1AD5D30E000
heap
page read and write
1AD5CA40000
heap
page read and write
1C691000
heap
page read and write
206C0000
trusted library allocation
page read and write
6CF4D7B000
stack
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
20730000
trusted library allocation
page read and write
17FE8A7D000
heap
page read and write
20190000
trusted library allocation
page read and write
42D000
unkown
page read and write
11A7000
heap
page read and write
1C691000
heap
page read and write
24F0000
trusted library allocation
page read and write
1DB18000
trusted library allocation
page read and write
1C691000
heap
page read and write
17FE8A00000
heap
page read and write
20190000
trusted library allocation
page read and write
17FE8850000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5D329000
heap
page read and write
1C691000
heap
page read and write
2093E000
trusted library allocation
page read and write
1C691000
heap
page read and write
1D739000
stack
page read and write
1C691000
heap
page read and write
1AD5D32A000
heap
page read and write
20C92000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
17FE8A20000
heap
page read and write
1D4AE000
stack
page read and write
20700000
trusted library allocation
page read and write
1C691000
heap
page read and write
20640000
trusted library allocation
page read and write
20640000
trusted library allocation
page read and write
20690000
trusted library allocation
page read and write
1EA57000
trusted library allocation
page read and write
1AD5CAFF000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5D32C000
heap
page read and write
1C691000
heap
page read and write
40A000
unkown
page read and write
1C691000
heap
page read and write
116B000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
201DE000
stack
page read and write
1AD5D32C000
heap
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
20193000
trusted library allocation
page read and write
1C691000
heap
page read and write
20190000
trusted library allocation
page read and write
1AD5CB13000
heap
page read and write
1AD5CAA1000
heap
page read and write
3DF57E000
stack
page read and write
20640000
trusted library allocation
page read and write
1C691000
heap
page read and write
DD0000
remote allocation
page read and write
20941000
trusted library allocation
page read and write
1AD5D200000
heap
page read and write
20710000
trusted library allocation
page read and write
1AD5D30F000
heap
page read and write
20740000
trusted library allocation
page read and write
1AD5CB29000
heap
page read and write
20C90000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
1C691000
heap
page read and write
1FEA0000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1AD5CA8C000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
713C0000
unkown
page readonly
20190000
trusted library allocation
page read and write
20000000
trusted library allocation
page execute and read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1D837000
trusted library allocation
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
1C691000
heap
page read and write
17FE8970000
heap
page read and write
1C691000
heap
page read and write
CAD000
stack
page read and write
20740000
trusted library allocation
page read and write
1AD5CB29000
heap
page read and write
1C691000
heap
page read and write
AD0000
heap
page read and write
1D8C2000
trusted library allocation
page read and write
20190000
trusted library allocation
page read and write
20710000
trusted library allocation
page read and write
208F5000
trusted library allocation
page read and write
There are 829 hidden memdumps, click here to show them.