IOC Report
bP5g4FsSJk.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bP5g4FsSJk.exe
"C:\Users\user\Desktop\bP5g4FsSJk.exe"
malicious
C:\Users\user\Desktop\bP5g4FsSJk.exe
"C:\Users\user\Desktop\bP5g4FsSJk.exe"
malicious

URLs

Name
IP
Malicious
http://acacaca.org/test2/get.php
malicious
http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
unknown
https://api.2ip.ua/geo.jsonY
unknown
https://api.2ip.ua/
unknown
https://api.2ip.ua/geo.jsont
unknown
https://api.2ip.ua/geo.json
162.0.217.254
https://api.2ip.ua/geo.jsong
unknown
https://api.2ip.ua/geo.json6
unknown
http://www.openssl.org/support/faq.html
unknown
https://api.2ip.ua/geo.jsons
unknown
https://api.2ip.ua/Y%
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.2ip.ua
162.0.217.254

IPs

IP
Domain
Country
Malicious
162.0.217.254
api.2ip.ua
Canada

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
42D0000
direct allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1EF58626000
heap
page read and write
18F20E7B000
heap
page read and write
1EF5846C000
heap
page read and write
83737FD000
stack
page read and write
1EF51FA3000
heap
page read and write
83735F5000
stack
page read and write
1EF583D2000
heap
page read and write
1FE548A0000
heap
page read and write
1B0000
remote allocation
page read and write
1C52525C000
heap
page read and write
1EF56CD0000
trusted library allocation
page read and write
1EF56EC0000
trusted library allocation
page read and write
1C5251D0000
trusted library allocation
page read and write
1EF56E30000
trusted library allocation
page read and write
1EF5863C000
heap
page read and write
2B9E000
stack
page read and write
21795D58000
heap
page read and write
2B2E2A3C000
heap
page read and write
1EF583EA000
heap
page read and write
18F20E02000
heap
page read and write
4235000
trusted library allocation
page execute and read and write
1F0000
trusted library allocation
page read and write
2C9F000
stack
page read and write
400000
unkown
page readonly
F77727B000
stack
page read and write
1EF56E34000
trusted library allocation
page read and write
1EF51290000
heap
page read and write
1EF58433000
heap
page read and write
1EF51FBF000
heap
page read and write
12F2F3E0000
remote allocation
page read and write
258AAD80000
unkown
page readonly
2179AB00000
remote allocation
page read and write
1EF56CD4000
trusted library allocation
page read and write
1EF5845D000
heap
page read and write
1EF56CD0000
trusted library allocation
page read and write
1EF5825B000
heap
page read and write
1EF56CC5000
trusted library allocation
page read and write
18F20E41000
heap
page read and write
1A97AC62000
heap
page read and write
1EF5836E000
heap
page read and write
1EF56CDC000
trusted library allocation
page read and write
1C525A02000
trusted library allocation
page read and write
1EF58392000
heap
page read and write
1EF5861F000
heap
page read and write
1EF584E2000
heap
page read and write
1FE54A00000
heap
page read and write
1EF58239000
heap
page read and write
2E5E000
stack
page read and write
18F20E3A000
heap
page read and write
2179AD04000
heap
page read and write
1EF56ED0000
trusted library allocation
page read and write
682FFF7000
stack
page read and write
46DE5F9000
stack
page read and write
1EF586A7000
heap
page read and write
4220000
heap
page read and write
3FB6BF7000
stack
page read and write
2179AC4C000
heap
page read and write
21795C00000
heap
page read and write
12F2F402000
heap
page read and write
1EF51FDF000
heap
page read and write
2179A9A0000
trusted library allocation
page read and write
93D000
heap
page read and write
1EF56CE0000
trusted library allocation
page read and write
81D807C000
stack
page read and write
1EF5845E000
heap
page read and write
7618277000
stack
page read and write
1EF5837C000
heap
page read and write
1EF58444000
heap
page read and write
1EF583CD000
heap
page read and write
1EF51DC8000
heap
page read and write
23BE2A82000
heap
page read and write
23BE2A8F000
heap
page read and write
2B2E2A4F000
heap
page read and write
1EF58636000
heap
page read and write
1EF584CF000
heap
page read and write
1EF58689000
heap
page read and write
1C525070000
heap
page read and write
1EF58226000
heap
page read and write
21796800000
trusted library allocation
page read and write
258AAE89000
heap
page read and write
2B2E2A13000
heap
page read and write
1EF58604000
heap
page read and write
18F20E62000
heap
page read and write
1A97AC65000
heap
page read and write
84E000
stack
page read and write
1EF58606000
heap
page read and write
1EF51FFC000
heap
page read and write
64E000
stack
page read and write
1EF584D8000
heap
page read and write
2F70000
heap
page read and write
80E000
stack
page read and write
682FEFB000
stack
page read and write
21795D13000
heap
page read and write
1EF56CD6000
trusted library allocation
page read and write
258AAE81000
heap
page read and write
1EF58480000
heap
page read and write
1A97AC3C000
heap
page read and write
1EF58226000
heap
page read and write
1EF5865A000
heap
page read and write
1EF584A1000
heap
page read and write
23BE29D0000
trusted library allocation
page read and write
1FE54ABA000
heap
page read and write
1EF584BE000
heap
page read and write
1EF56E10000
trusted library allocation
page read and write
1EF58696000
heap
page read and write
1EF58620000
heap
page read and write
1EF58485000
heap
page read and write
1EF56CE2000
trusted library allocation
page read and write
1EF5864E000
heap
page read and write
1EF58433000
heap
page read and write
1EF584F1000
heap
page read and write
1EF5863E000
heap
page read and write
1EF5843B000
heap
page read and write
258AAE00000
heap
page read and write
6C5000
heap
page read and write
12F2F3E0000
remote allocation
page read and write
83732FD000
stack
page read and write
1A97AC5C000
heap
page read and write
18F20E77000
heap
page read and write
13BB2646000
heap
page read and write
1C525313000
heap
page read and write
C7A267F000
stack
page read and write
1EF52B00000
trusted library allocation
page read and write
1EF58337000
heap
page read and write
1EF5868B000
heap
page read and write
1A97AD13000
heap
page read and write
B63427E000
stack
page read and write
83736FF000
stack
page read and write
1EF58417000
heap
page read and write
1EF56F10000
trusted library allocation
page read and write
1EF5838A000
heap
page read and write
1EF5861D000
heap
page read and write
1A97AC13000
heap
page read and write
1EF51FD5000
heap
page read and write
1EF58438000
heap
page read and write
5AEA37C000
stack
page read and write
1EF584DE000
heap
page read and write
1EF58120000
trusted library allocation
page read and write
1EF51461000
heap
page read and write
217954A6000
heap
page read and write
2B2E2A50000
heap
page read and write
18F20E00000
heap
page read and write
18F20D60000
heap
page read and write
C7A26FF000
stack
page read and write
1EF5838F000
heap
page read and write
1B0000
remote allocation
page read and write
1EF58680000
heap
page read and write
269BB428000
heap
page read and write
5AEA87E000
stack
page read and write
5AEA77F000
stack
page read and write
1EF58360000
heap
page read and write
1EF584D1000
heap
page read and write
1EF58462000
heap
page read and write
1EF583D2000
heap
page read and write
1EF51D5C000
heap
page read and write
1EF56CBC000
trusted library allocation
page read and write
12F2F400000
heap
page read and write
1EF5148D000
heap
page read and write
1EF584AE000
heap
page read and write
1EF56E20000
trusted library allocation
page read and write
13BB263C000
heap
page read and write
161DDFD000
stack
page read and write
18F20E31000
heap
page read and write
2B2E2A81000
heap
page read and write
1EF583D4000
heap
page read and write
217952E0000
heap
page read and write
18F20E79000
heap
page read and write
B63437B000
stack
page read and write
1EF58691000
heap
page read and write
1A6C7A3E000
heap
page read and write
161DB7E000
stack
page read and write
21795513000
heap
page read and write
18F20E40000
heap
page read and write
1FE55070000
trusted library allocation
page read and write
1EF58434000
heap
page read and write
1EF5847C000
heap
page read and write
2B2E2990000
trusted library allocation
page read and write
1A6C7940000
heap
page read and write
1EF56F30000
trusted library allocation
page read and write
5AE9D4B000
stack
page read and write
1EF584B6000
heap
page read and write
1A6C7A5C000
heap
page read and write
1EF56D25000
trusted library allocation
page read and write
21795BD0000
trusted library section
page readonly
28DF000
stack
page read and write
1EF58210000
heap
page read and write
26BC8F40000
heap
page read and write
1EF58495000
heap
page read and write
1EF51DB0000
heap
page read and write
1EF584D6000
heap
page read and write
1EF58417000
heap
page read and write
1EF52748000
trusted library allocation
page read and write
1EF58382000
heap
page read and write
46DE7FB000
stack
page read and write
1EF583D1000
heap
page read and write
196000
stack
page read and write
1EF584E8000
heap
page read and write
1EF58255000
heap
page read and write
1EF56CD0000
trusted library allocation
page read and write
1EF56CCE000
trusted library allocation
page read and write
1EF56F40000
trusted library allocation
page read and write
161DEFD000
stack
page read and write
1EF56D0E000
trusted library allocation
page read and write
1EF5832E000
heap
page read and write
81D82FC000
stack
page read and write
23BE2A54000
heap
page read and write
1EF51E0A000
heap
page read and write
3FB65DB000
stack
page read and write
1EF5837D000
heap
page read and write
81D84FD000
stack
page read and write
30000
heap
page read and write
1A97AC5D000
heap
page read and write
1C52528D000
heap
page read and write
1EF51F86000
heap
page read and write
1EF5845C000
heap
page read and write
1EF5837C000
heap
page read and write
837317F000
stack
page read and write
1EF51FD8000
heap
page read and write
1EF58610000
heap
page read and write
F77737F000
stack
page read and write
1EF58495000
heap
page read and write
1B0000
remote allocation
page read and write
1B0000
remote allocation
page read and write
269BBA02000
trusted library allocation
page read and write
1EF5863F000
heap
page read and write
81D7FFF000
stack
page read and write
1EF584CA000
heap
page read and write
13BB2653000
heap
page read and write
1EF56CC8000
trusted library allocation
page read and write
258AAE71000
heap
page read and write
1EF58269000
heap
page read and write
401000
unkown
page execute read
1EF56CDC000
trusted library allocation
page read and write
46DE3F7000
stack
page read and write
2179A9C0000
trusted library allocation
page read and write
1FE54A29000
heap
page read and write
1EF58436000
heap
page read and write
401000
unkown
page execute read
1EF5866C000
heap
page read and write
939000
heap
page read and write
1EF5843B000
heap
page read and write
1EF5867E000
heap
page read and write
81D7CFB000
stack
page read and write
1EF584EA000
heap
page read and write
18F20E75000
heap
page read and write
26BC8D70000
heap
page read and write
2B2E2A4D000
heap
page read and write
1005FE000
stack
page read and write
2E5ABFE000
stack
page read and write
1EF51D26000
heap
page read and write
1EF56EC0000
trusted library allocation
page read and write
1EF58485000
heap
page read and write
A6F5D77000
stack
page read and write
1FE54A86000
heap
page read and write
1A97AC81000
heap
page read and write
1EF58494000
heap
page read and write
269BB468000
heap
page read and write
1C525060000
heap
page read and write
1EF56CCE000
trusted library allocation
page read and write
C7A287E000
stack
page read and write
1EF58474000
heap
page read and write
1EF58409000
heap
page read and write
3FB6DFF000
stack
page read and write
1EF58256000
heap
page read and write
1EF58667000
heap
page read and write
23BE2800000
heap
page read and write
46DEE7C000
stack
page read and write
1A97AC69000
heap
page read and write
2179547B000
heap
page read and write
2B2E2A29000
heap
page read and write
1EF56E10000
trusted library allocation
page read and write
1EF56E3C000
trusted library allocation
page read and write
1EF5848C000
heap
page read and write
1EF58651000
heap
page read and write
1EF51F75000
heap
page read and write
1EF58419000
heap
page read and write
1B0000
remote allocation
page read and write
1EF56CC0000
trusted library allocation
page read and write
26BC8F60000
heap
page read and write
A6F570B000
stack
page read and write
1EF58080000
remote allocation
page read and write
1EF58441000
heap
page read and write
2B2E2A77000
heap
page read and write
1EF58442000
heap
page read and write
1EF51454000
heap
page read and write
1A6C7A29000
heap
page read and write
30000
heap
page read and write
1EF58660000
heap
page read and write
1EF5824D000
heap
page read and write
1EF5838C000
heap
page read and write
1EF56CD8000
trusted library allocation
page read and write
23BE2A00000
heap
page read and write
1EF5846F000
heap
page read and write
1EF58648000
heap
page read and write
2179AAC0000
trusted library allocation
page read and write
18F20E5E000
heap
page read and write
1A6C79B0000
heap
page read and write
21795413000
heap
page read and write
52B000
remote allocation
page execute and read and write
2179ACE8000
heap
page read and write
21795380000
trusted library section
page read and write
1C5250D0000
heap
page read and write
1C525282000
heap
page read and write
18F20E61000
heap
page read and write
1EF58656000
heap
page read and write
1EF5831D000
heap
page read and write
3FB687D000
stack
page read and write
18F20F02000
heap
page read and write
1EF56E30000
trusted library allocation
page read and write
C7A23BA000
stack
page read and write
2179AAF0000
trusted library allocation
page read and write
12F2F43D000
heap
page read and write
12F2F320000
heap
page read and write
1EF51429000
heap
page read and write
1EF56F90000
trusted library allocation
page read and write
18F20D90000
trusted library allocation
page read and write
2B2E2A70000
heap
page read and write
1EF5833F000
heap
page read and write
18F20E58000
heap
page read and write
2179AA70000
trusted library allocation
page read and write
1EF58472000
heap
page read and write
1EF583CF000
heap
page read and write
1EF584AA000
heap
page read and write
1EF51400000
heap
page read and write
2B2E2B08000
heap
page read and write
21795BA0000
trusted library section
page readonly
1EF58253000
heap
page read and write
1EF5845F000
heap
page read and write
1EF58615000
heap
page read and write
2B2E28F0000
heap
page read and write
1EF56D25000
trusted library allocation
page read and write
7618577000
stack
page read and write
1A97A990000
heap
page read and write
1EF56E30000
trusted library allocation
page read and write
8C0000
heap
page read and write
2179A9E4000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
18F20E3C000
heap
page read and write
2179A880000
trusted library allocation
page read and write
1EF56CC0000
trusted library allocation
page read and write
1EF5832D000
heap
page read and write
21795441000
heap
page read and write
1EF584DC000
heap
page read and write
1EF58628000
heap
page read and write
2179ACDC000
heap
page read and write
1EF51F54000
heap
page read and write
1EF583A1000
heap
page read and write
880000
heap
page read and write
1EF584A8000
heap
page read and write
1EF56D60000
trusted library allocation
page read and write
1EF51D25000
heap
page read and write
9D000
stack
page read and write
46DE6FE000
stack
page read and write
1EF51D0A000
heap
page read and write
1EF56CD8000
trusted library allocation
page read and write
12F2F3E0000
remote allocation
page read and write
1EF56CDE000
trusted library allocation
page read and write
F7775FB000
stack
page read and write
1EF56E30000
trusted library allocation
page read and write
1FE55300000
heap
page read and write
1EF58395000
heap
page read and write
21795429000
heap
page read and write
1EF51488000
heap
page read and write
2179A9C1000
trusted library allocation
page read and write
1EF56E3C000
trusted library allocation
page read and write
161DC7D000
stack
page read and write
23BE2A3C000
heap
page read and write
1EF56E20000
trusted library allocation
page read and write
1EF58258000
heap
page read and write
1EF584A5000
heap
page read and write
2E5ADF9000
stack
page read and write
1A6C7A02000
heap
page read and write
13BB2629000
heap
page read and write
269BB479000
heap
page read and write
1EF5844A000
heap
page read and write
46DDFAC000
stack
page read and write
258AABF0000
heap
page read and write
8372D7F000
stack
page read and write
1EF58617000
heap
page read and write
1B0000
remote allocation
page read and write
1EF584F3000
heap
page read and write
282A000
heap
page read and write
2179548E000
heap
page read and write
1EF584E0000
heap
page read and write
1EF584F4000
heap
page read and write
13BB2590000
heap
page read and write
258AAF02000
heap
page read and write
18F21602000
trusted library allocation
page read and write
269BB500000
heap
page read and write
1EF51DF4000
heap
page read and write
269BB9A0000
trusted library allocation
page read and write
529000
remote allocation
page execute and read and write
46DF07E000
stack
page read and write
1EF5822F000
heap
page read and write
12F2FC02000
trusted library allocation
page read and write
1EF5860E000
heap
page read and write
ABF000
stack
page read and write
21795458000
heap
page read and write
1EF56CDC000
trusted library allocation
page read and write
1EF56CC0000
trusted library allocation
page read and write
18F20D00000
heap
page read and write
1A6C7A00000
heap
page read and write
1EF5839D000
heap
page read and write
18F20E63000
heap
page read and write
1B0000
remote allocation
page read and write
1EF5843D000
heap
page read and write
1EF56CBC000
trusted library allocation
page read and write
400000
unkown
page readonly
1EF58441000
heap
page read and write
1EF51E23000
heap
page read and write
1EF58237000
heap
page read and write
1EF56F60000
trusted library allocation
page read and write
41BF000
stack
page read and write
46DEBFE000
stack
page read and write
13BB2637000
heap
page read and write
258AAF00000
heap
page read and write
1EF584EF000
heap
page read and write
1EF58358000
heap
page read and write
1EF52AB0000
trusted library section
page readonly
1EF583D1000
heap
page read and write
1C525276000
heap
page read and write
1EF5867B000
heap
page read and write
1EF524C0000
trusted library allocation
page read and write
258AAD50000
trusted library allocation
page read and write
21795493000
heap
page read and write
2179AC2D000
heap
page read and write
400000
remote allocation
page execute and read and write
1EF5860A000
heap
page read and write
1FE54A13000
heap
page read and write
21795340000
heap
page read and write
1EF58365000
heap
page read and write
2CDE000
stack
page read and write
1EF5848F000
heap
page read and write
1EF51513000
heap
page read and write
1A97AC52000
heap
page read and write
1EF584BD000
heap
page read and write
21795D02000
heap
page read and write
1EF58318000
heap
page read and write
93A000
heap
page read and write
1EF5849B000
heap
page read and write
1EF56CD2000
trusted library allocation
page read and write
1EF584F7000
heap
page read and write
12F2F380000
heap
page read and write
400000
unkown
page readonly
2179AC0E000
heap
page read and write
1EF584A6000
heap
page read and write
1EF584AC000
heap
page read and write
1EF584D1000
heap
page read and write
1EF58437000
heap
page read and write
91A000
heap
page read and write
18F20E57000
heap
page read and write
1EF5839B000
heap
page read and write
269BB1E0000
heap
page read and write
1EF52AF0000
trusted library allocation
page read and write
1EF583F6000
heap
page read and write
1EF58444000
heap
page read and write
269BB1D0000
heap
page read and write
1FE54AE1000
heap
page read and write
6C7000
heap
page read and write
21795BE0000
trusted library section
page readonly
1EF52A90000
trusted library section
page readonly
1A97AC56000
heap
page read and write
C7A2779000
stack
page read and write
269BB402000
heap
page read and write
1A6C7A72000
heap
page read and write
401000
unkown
page execute read
2E5ACFF000
stack
page read and write
F7776F7000
stack
page read and write
1EF52A80000
trusted library section
page readonly
1EF56CA0000
trusted library allocation
page read and write
1EF5832F000
heap
page read and write
761807C000
stack
page read and write
1EF51443000
heap
page read and write
23BE2B02000
heap
page read and write
1EF58419000
heap
page read and write
1EF583ED000
heap
page read and write
1EF5860C000
heap
page read and write
1C525276000
heap
page read and write
5AEA67E000
stack
page read and write
252E000
unkown
page readonly
46DED7F000
stack
page read and write
1EF58692000
heap
page read and write
23BE2790000
heap
page read and write
1EF56E20000
trusted library allocation
page read and write
1EF58444000
heap
page read and write
21795370000
trusted library allocation
page read and write
7617E7C000
stack
page read and write
1EF5843B000
heap
page read and write
1EF56E3C000
trusted library allocation
page read and write
1EF56F00000
trusted library allocation
page read and write
93D000
heap
page read and write
81D81FB000
stack
page read and write
1EF58243000
heap
page read and write
26BC8F65000
heap
page read and write
1EF5843D000
heap
page read and write
400000
unkown
page readonly
1EF56CE2000
trusted library allocation
page read and write
1A6C7A78000
heap
page read and write
46DECFD000
stack
page read and write
13BB2D40000
trusted library allocation
page read and write
2179A9C4000
trusted library allocation
page read and write
1EF5864F000
heap
page read and write
252E000
unkown
page readonly
1EF51D33000
heap
page read and write
46DEB7D000
stack
page read and write
1EF52990000
trusted library allocation
page read and write
1EF58439000
heap
page read and write
1EF58433000
heap
page read and write
1EF56E3C000
trusted library allocation
page read and write
258AAC50000
heap
page read and write
1EF586DB000
heap
page read and write
18F20E55000
heap
page read and write
258AABE0000
heap
page read and write
1EF5830E000
heap
page read and write
1EF58672000
heap
page read and write
21795C15000
heap
page read and write
1EF5849E000
heap
page read and write
1EF51D73000
heap
page read and write
1EF5146E000
heap
page read and write
931000
heap
page read and write
9C000
stack
page read and write
1EF5841D000
heap
page read and write
1EF56CDA000
trusted library allocation
page read and write
2179ACFD000
heap
page read and write
1A6C7B02000
heap
page read and write
6C0000
heap
page read and write
2820000
heap
page read and write
1C525200000
heap
page read and write
13BB2625000
heap
page read and write
1EF51DC3000
heap
page read and write
1EF56E30000
trusted library allocation
page read and write
1EF58319000
heap
page read and write
291E000
stack
page read and write
1EF51FFF000
heap
page read and write
2179AD02000
heap
page read and write
1C525261000
heap
page read and write
F7777FD000
stack
page read and write
1A97AD08000
heap
page read and write
18F20E48000
heap
page read and write
1A97AD00000
heap
page read and write
1EF58675000
heap
page read and write
1006FE000
stack
page read and write
1EF58302000
heap
page read and write
1FE54ACB000
heap
page read and write
1EF5833F000
heap
page read and write
1C525213000
heap
page read and write
B633E7B000
stack
page read and write
1EF584AB000
heap
page read and write
1EF5867A000
heap
page read and write
1EF58323000
heap
page read and write
1C525256000
heap
page read and write
1EF56B10000
trusted library allocation
page read and write
68300FF000
stack
page read and write
12F2F502000
heap
page read and write
18F20E6B000
heap
page read and write
1EF56CC0000
trusted library allocation
page read and write
23BE2A70000
heap
page read and write
5AEA17A000
stack
page read and write
1EF584C1000
heap
page read and write
1000FE000
stack
page read and write
1EF56CC0000
trusted library allocation
page read and write
2A5D000
stack
page read and write
401000
unkown
page execute read
1EF584BB000
heap
page read and write
2179AC3F000
heap
page read and write
1EF5848D000
heap
page read and write
264E000
stack
page read and write
2179AC8A000
heap
page read and write
18F20E59000
heap
page read and write
1EF56DF0000
trusted library allocation
page read and write
1EF513B0000
trusted library allocation
page read and write
1EF52AD1000
trusted library allocation
page read and write
23BE2A29000
heap
page read and write
682FC7E000
stack
page read and write
1EF58658000
heap
page read and write
1EF5838E000
heap
page read and write
83728FF000
stack
page read and write
761817B000
stack
page read and write
1EF584C2000
heap
page read and write
13BB2613000
heap
page read and write
68301FD000
stack
page read and write
1A97AA00000
heap
page read and write
21795456000
heap
page read and write
1EF51E00000
heap
page read and write
2B2E2A8E000
heap
page read and write
1EF56CD4000
trusted library allocation
page read and write
27CF000
stack
page read and write
90D000
heap
page read and write
7617EFE000
stack
page read and write
2179A9D0000
trusted library allocation
page read and write
21795400000
heap
page read and write
1EF52A70000
trusted library section
page readonly
1EF584A2000
heap
page read and write
2DDE000
stack
page read and write
1EF51E02000
heap
page read and write
10017E000
stack
page read and write
21795471000
heap
page read and write
401000
unkown
page execute read
1EF51390000
trusted library allocation
page read and write
1EF51492000
heap
page read and write
1EF56CD0000
trusted library allocation
page read and write
2179B000000
heap
page read and write
18F20E4D000
heap
page read and write
1EF56E20000
trusted library allocation
page read and write
1EF5866D000
heap
page read and write
1A6C8202000
trusted library allocation
page read and write
1EF51DB3000
heap
page read and write
1001FE000
stack
page read and write
3FB6AFB000
stack
page read and write
1EF58380000
heap
page read and write
23BE3002000
trusted library allocation
page read and write
1EF583F9000
heap
page read and write
83726FA000
stack
page read and write
1EF5822C000
heap
page read and write
258AB602000
trusted library allocation
page read and write
1EF58613000
heap
page read and write
1EF56E3C000
trusted library allocation
page read and write
258AAE29000
heap
page read and write
3FB68FE000
stack
page read and write
2B2E2B00000
heap
page read and write
1EF5846A000
heap
page read and write
1A97B202000
trusted library allocation
page read and write
1EF58470000
heap
page read and write
52B000
remote allocation
page execute and read and write
21795BF3000
trusted library allocation
page read and write
939000
heap
page read and write
1EF56E90000
trusted library allocation
page read and write
1EF5847E000
heap
page read and write
1EF58444000
heap
page read and write
1EF56E34000
trusted library allocation
page read and write
1EF5843B000
heap
page read and write
83727FF000
stack
page read and write
3FB69FC000
stack
page read and write
44E0000
heap
page read and write
46DE97E000
stack
page read and write
1EF51DD1000
heap
page read and write
1EF51220000
heap
page read and write
1EF56CC8000
trusted library allocation
page read and write
1EF58200000
heap
page read and write
2B2E2A52000
heap
page read and write
1EF52740000
trusted library allocation
page read and write
1EF51E5A000
heap
page read and write
217954FD000
heap
page read and write
258AAE3C000
heap
page read and write
1EF5822D000
heap
page read and write
1EF51F95000
heap
page read and write
4A8000
unkown
page write copy
1C525278000
heap
page read and write
12F2F3B0000
trusted library allocation
page read and write
4A8000
unkown
page write copy
18F20E42000
heap
page read and write
1EF58439000
heap
page read and write
1EF58356000
heap
page read and write
1EF58380000
heap
page read and write
1EF5861C000
heap
page read and write
400000
unkown
page readonly
1EF57010000
heap
page read and write
4A8000
unkown
page write copy
83734FE000
stack
page read and write
13BB262F000
heap
page read and write
F7772FF000
stack
page read and write
1EF51F6A000
heap
page read and write
1EF56B00000
trusted library allocation
page read and write
252B000
unkown
page read and write
217953E1000
trusted library allocation
page read and write
1A97AC60000
heap
page read and write
1EF58439000
heap
page read and write
1EF56CD4000
trusted library allocation
page read and write
1EF58347000
heap
page read and write
1EF5866A000
heap
page read and write
F7774FF000
stack
page read and write
1EF51E1B000
heap
page read and write
1EF5824F000
heap
page read and write
1EF57010000
heap
page read and write
46DE4FA000
stack
page read and write
1EF58448000
heap
page read and write
1A6C7950000
heap
page read and write
1EF56CD2000
trusted library allocation
page read and write
1EF58456000
heap
page read and write
1FE54AC1000
heap
page read and write
18F20E60000
heap
page read and write
1EF58630000
heap
page read and write
1EF515C2000
heap
page read and write
2179AB00000
remote allocation
page read and write
12F2F310000
heap
page read and write
1A97AC75000
heap
page read and write
1EF51D94000
heap
page read and write
1FE55202000
heap
page read and write
2179A9D0000
trusted library allocation
page read and write
1EF586BA000
heap
page read and write
1EF51FC5000
heap
page read and write
2B2E2900000
heap
page read and write
1EF56E34000
trusted library allocation
page read and write
8372E7A000
stack
page read and write
1EF584D2000
heap
page read and write
1EF58390000
heap
page read and write
1EF584D4000
heap
page read and write
1EF51425000
heap
page read and write
18F20E7A000
heap
page read and write
1EF584DA000
heap
page read and write
5AEA97F000
stack
page read and write
1A97AC61000
heap
page read and write
1EF583C3000
heap
page read and write
18F20E13000
heap
page read and write
1EF58354000
heap
page read and write
83729FB000
stack
page read and write
1EF584E3000
heap
page read and write
21795B90000
trusted library section
page readonly
1EF51443000
heap
page read and write
A6F578E000
stack
page read and write
1EF5848E000
heap
page read and write
68E000
stack
page read and write
269BB43E000
heap
page read and write
21795D18000
heap
page read and write
1EF5838A000
heap
page read and write
1EF584D1000
heap
page read and write
8C7000
heap
page read and write
1EF58638000
heap
page read and write
1EF58481000
heap
page read and write
1EF58497000
heap
page read and write
23BE2B00000
heap
page read and write
1A97ABD0000
trusted library allocation
page read and write
1EF58632000
heap
page read and write
252E000
unkown
page readonly
2E5A7DC000
stack
page read and write
5AEAA7F000
stack
page read and write
18F20E7E000
heap
page read and write
1A6C7B13000
heap
page read and write
1EF58328000
heap
page read and write
1EF58130000
trusted library allocation
page read and write
1EF56CA1000
trusted library allocation
page read and write
2179ACFF000
heap
page read and write
23BE27A0000
heap
page read and write
1C525229000
heap
page read and write
1EF5843F000
heap
page read and write
13BB2602000
heap
page read and write
1EF58413000
heap
page read and write
1EF51FAE000
heap
page read and write
1FE55332000
heap
page read and write
1EF56E80000
trusted library allocation
page read and write
1A6C7A13000
heap
page read and write
2179A9AE000
trusted library allocation
page read and write
1EF58427000
heap
page read and write
1EF5146C000
heap
page read and write
1C525300000
heap
page read and write
1EF51FB0000
heap
page read and write
10007C000
stack
page read and write
1EF56D0A000
trusted library allocation
page read and write
1EF584F6000
heap
page read and write
4480000
heap
page read and write
1B0000
remote allocation
page read and write
2B2E2A00000
heap
page read and write
1EF583D7000
heap
page read and write
3FB6CFF000
stack
page read and write
23BE2A78000
heap
page read and write
217952D0000
heap
page read and write
1EF56CC0000
trusted library allocation
page read and write
2179AAB0000
trusted library allocation
page read and write
1EF584CC000
heap
page read and write
1EF5823F000
heap
page read and write
1EF583CF000
heap
page read and write
1EF58631000
heap
page read and write
2179A800000
trusted library allocation
page read and write
1EF584C5000
heap
page read and write
1EF583F4000
heap
page read and write
2B2E2960000
heap
page read and write
1EF5832A000
heap
page read and write
1EF586A9000
heap
page read and write
81D817E000
stack
page read and write
1EF58483000
heap
page read and write
13BB2580000
heap
page read and write
21795BB0000
trusted library section
page readonly
1EF58300000
heap
page read and write
400000
remote allocation
page execute and read and write
B63447E000
stack
page read and write
2179ACFF000
heap
page read and write
23BE2A13000
heap
page read and write
1EF56E34000
trusted library allocation
page read and write
1EF56CA0000
trusted library allocation
page read and write
18F20E2C000
heap
page read and write
1EF56CD6000
trusted library allocation
page read and write
1EF51C00000
heap
page read and write
1EF5866E000
heap
page read and write
1EF56CDE000
trusted library allocation
page read and write
1EF5864C000
heap
page read and write
2179AC2B000
heap
page read and write
1A6C7A41000
heap
page read and write
2179AC63000
heap
page read and write
1EF58646000
heap
page read and write
18F20E5D000
heap
page read and write
2179AB00000
remote allocation
page read and write
269BB464000
heap
page read and write
52B000
remote allocation
page execute and read and write
1EF58382000
heap
page read and write
A6F5F7F000
stack
page read and write
1EF51230000
heap
page read and write
1EF584B4000
heap
page read and write
1EF584AA000
heap
page read and write
1EF583FF000
heap
page read and write
12F2F429000
heap
page read and write
1EF58443000
heap
page read and write
2E20000
remote allocation
page read and write
1EF58458000
heap
page read and write
269BB400000
heap
page read and write
1EF56E34000
trusted library allocation
page read and write
1A97AC67000
heap
page read and write
1EF51458000
heap
page read and write
1EF56CC0000
trusted library allocation
page read and write
26BC8D50000
heap
page read and write
1EF58654000
heap
page read and write
2179ACB2000
heap
page read and write
18F20E68000
heap
page read and write
1C525302000
heap
page read and write
1EF58248000
heap
page read and write
269BB502000
heap
page read and write
46DE8FE000
stack
page read and write
269E000
stack
page read and write
1EF5862D000
heap
page read and write
252E000
unkown
page readonly
2F5F000
stack
page read and write
1EF583FF000
heap
page read and write
1F0000
trusted library allocation
page read and write
1EF52AC0000
trusted library section
page readonly
682FCFE000
stack
page read and write
21795502000
heap
page read and write
C7A27FD000
stack
page read and write
1EF58326000
heap
page read and write
13BB2702000
heap
page read and write
8372C7C000
stack
page read and write
2179A890000
trusted library allocation
page read and write
1FE54A6B000
heap
page read and write
1EF51FFC000
heap
page read and write
1EF584EC000
heap
page read and write
1EF56D40000
trusted library allocation
page read and write
1EF5843B000
heap
page read and write
1EF56CD0000
trusted library allocation
page read and write
2179A9A0000
trusted library allocation
page read and write
1EF56CA0000
trusted library allocation
page read and write
1EF56FC3000
trusted library allocation
page read and write
258AADA0000
unkown
page write copy
1EF58491000
heap
page read and write
1EF58350000
heap
page read and write
1EF5825F000
heap
page read and write
83730FE000
stack
page read and write
1EF584AC000
heap
page read and write
1EF56E34000
trusted library allocation
page read and write
1EF583AF000
heap
page read and write
269BB456000
heap
page read and write
161D8FE000
stack
page read and write
2179A9A8000
trusted library allocation
page read and write
1EF58436000
heap
page read and write
1EF58470000
heap
page read and write
2F71000
heap
page read and write
2179549D000
heap
page read and write
2179548C000
heap
page read and write
A6F5A7E000
stack
page read and write
1EF58653000
heap
page read and write
18F20E74000
heap
page read and write
1EF5849F000
heap
page read and write
1EF58493000
heap
page read and write
401000
unkown
page execute read
1EF5148A000
heap
page read and write
1EF5143C000
heap
page read and write
1EF51D00000
heap
page read and write
161D54B000
stack
page read and write
1EF58434000
heap
page read and write
2E5AEFE000
stack
page read and write
8372F7B000
stack
page read and write
21795476000
heap
page read and write
269F000
stack
page read and write
1EF52AA0000
trusted library section
page readonly
1EF51FDF000
heap
page read and write
8372A79000
stack
page read and write
1EF5847A000
heap
page read and write
1EF51DCF000
heap
page read and write
2B5A000
stack
page read and write
1EF5867C000
heap
page read and write
18F20E29000
heap
page read and write
13BB2600000
heap
page read and write
2179ACE2000
heap
page read and write
1EF56CCC000
trusted library allocation
page read and write
837238B000
stack
page read and write
1EF51FFA000
heap
page read and write
1EF5846F000
heap
page read and write
12F2F413000
heap
page read and write
1EF5849D000
heap
page read and write
1EF583F6000
heap
page read and write
2A1F000
stack
page read and write
1EF56CE0000
trusted library allocation
page read and write
8372FFE000
stack
page read and write
1EF5865E000
heap
page read and write
1C52525E000
heap
page read and write
4A8000
unkown
page write copy
1EF51D31000
heap
page read and write
1EF58080000
remote allocation
page read and write
1EF56B90000
trusted library allocation
page read and write
1EF583C3000
heap
page read and write
1A6C7A6B000
heap
page read and write
1EF56E20000
trusted library allocation
page read and write
1EF58202000
heap
page read and write
161DA7E000
stack
page read and write
2179AB00000
trusted library allocation
page read and write
1EF51FFD000
heap
page read and write
1EF56EA0000
trusted library allocation
page read and write
83731FE000
stack
page read and write
18F20E6A000
heap
page read and write
1EF58643000
heap
page read and write
1EF583EA000
heap
page read and write
2179AC00000
heap
page read and write
1EF58400000
heap
page read and write
1EF58250000
heap
page read and write
7CF000
stack
page read and write
1EF58688000
heap
page read and write
1A97AC00000
heap
page read and write
1EF58484000
heap
page read and write
18F20E65000
heap
page read and write
1EF58405000
heap
page read and write
1EF51D35000
heap
page read and write
2B2E3202000
trusted library allocation
page read and write
1EF58670000
heap
page read and write
1EF58448000
heap
page read and write
2179ACFB000
heap
page read and write
1EF58499000
heap
page read and write
400000
unkown
page readonly
1EF56E20000
trusted library allocation
page read and write
1EF5158E000
heap
page read and write
26BC8D9E000
heap
page read and write
1EF5843F000
heap
page read and write
1EF58661000
heap
page read and write
1EF5862A000
heap
page read and write
1EF58633000
heap
page read and write
1EF51C15000
heap
page read and write
27DE000
stack
page read and write
890000
heap
page read and write
1A97AC5F000
heap
page read and write
1EF584C3000
heap
page read and write
1EF58642000
heap
page read and write
23BE2B13000
heap
page read and write
1EF58472000
heap
page read and write
18F20E84000
heap
page read and write
23BE2A4B000
heap
page read and write
46DE87E000
stack
page read and write
252E000
unkown
page readonly
21795D00000
heap
page read and write
2179AAD0000
trusted library allocation
page read and write
2B2E2B13000
heap
page read and write
1EF5864B000
heap
page read and write
12F2F424000
heap
page read and write
1007FF000
stack
page read and write
21795BC0000
trusted library section
page readonly
2179ACBC000
heap
page read and write
1EF58480000
heap
page read and write
1EF56D0E000
trusted library allocation
page read and write
1EF583D1000
heap
page read and write
1EF58213000
heap
page read and write
2B2E2A4B000
heap
page read and write
21795D18000
heap
page read and write
1EF58302000
heap
page read and write
1EF58344000
heap
page read and write
1EF56E70000
trusted library allocation
page read and write
81D7EFE000
stack
page read and write
1EF586EC000
heap
page read and write
1EF58439000
heap
page read and write
2E20000
remote allocation
page read and write
1EF51FE9000
heap
page read and write
1EF5841D000
heap
page read and write
18F20E2F000
heap
page read and write
1A6C7A58000
heap
page read and write
1EF58663000
heap
page read and write
1EF58677000
heap
page read and write
1EF56E3C000
trusted library allocation
page read and write
1EF58647000
heap
page read and write
1EF56E40000
trusted library allocation
page read and write
1EF58080000
remote allocation
page read and write
1EF584EB000
heap
page read and write
1EF5825C000
heap
page read and write
193000
stack
page read and write
2179A810000
trusted library allocation
page read and write
7617F7E000
stack
page read and write
1EF51DD3000
heap
page read and write
1EF58262000
heap
page read and write
252E000
unkown
page readonly
23BE2A4E000
heap
page read and write
279F000
stack
page read and write
19A000
stack
page read and write
18F20E56000
heap
page read and write
1EF56D0A000
trusted library allocation
page read and write
1FE54B02000
heap
page read and write
1FE548B0000
heap
page read and write
1EF58621000
heap
page read and write
761847D000
stack
page read and write
269BB422000
heap
page read and write
21795BF0000
trusted library allocation
page read and write
21795525000
heap
page read and write
4A8000
unkown
page write copy
F7778FF000
stack
page read and write
1FE54B13000
heap
page read and write
1EF5836E000
heap
page read and write
1EF5832C000
heap
page read and write
1FE54A3E000
heap
page read and write
1FE54AE6000
heap
page read and write
1EF584E7000
heap
page read and write
269BB240000
heap
page read and write
18F20E6D000
heap
page read and write
81D85FE000
stack
page read and write
1EF5823A000
heap
page read and write
13BB2E02000
trusted library allocation
page read and write
5AEA27F000
stack
page read and write
1EF51F8E000
heap
page read and write
26BC8CF0000
heap
page read and write
1EF58465000
heap
page read and write
258AAF13000
heap
page read and write
682FDFC000
stack
page read and write
52B000
remote allocation
page execute and read and write
81D83FF000
stack
page read and write
269BB413000
heap
page read and write
A6F5E7F000
stack
page read and write
258AAE13000
heap
page read and write
12F2F451000
heap
page read and write
161D9FE000
stack
page read and write
2B2E2B02000
heap
page read and write
23BE2A51000
heap
page read and write
18F20E2D000
heap
page read and write
1EF51F43000
heap
page read and write
1B0000
remote allocation
page read and write
2179A9E0000
trusted library allocation
page read and write
1EF583F3000
heap
page read and write
1B0000
remote allocation
page read and write
1EF5865B000
heap
page read and write
F77747B000
stack
page read and write
1EF58350000
heap
page read and write
1EF56CCC000
trusted library allocation
page read and write
1A97AC9B000
heap
page read and write
1EF56CDA000
trusted library allocation
page read and write
1EF56E30000
trusted library allocation
page read and write
B63417B000
stack
page read and write
26C0000
heap
page read and write
1EF51C02000
heap
page read and write
1A6C79E0000
trusted library allocation
page read and write
2179AAE0000
trusted library allocation
page read and write
1EF5863A000
heap
page read and write
1EF56B80000
trusted library allocation
page read and write
1EF51FC7000
heap
page read and write
C7A28FC000
stack
page read and write
1EF56CC5000
trusted library allocation
page read and write
1EF58608000
heap
page read and write
21795C02000
heap
page read and write
1EF5832E000
heap
page read and write
1EF58624000
heap
page read and write
1EF51F00000
heap
page read and write
1C525266000
heap
page read and write
1EF56FC0000
trusted library allocation
page read and write
1EF583BA000
heap
page read and write
1EF51413000
heap
page read and write
8372B7A000
stack
page read and write
1EF584B0000
heap
page read and write
1EF5865F000
heap
page read and write
1EF51E58000
heap
page read and write
1EF58600000
heap
page read and write
1EF58478000
heap
page read and write
1A97AC64000
heap
page read and write
837277F000
stack
page read and write
258AAEA0000
heap
page read and write
18F20E5A000
heap
page read and write
1EF584A6000
heap
page read and write
1EF584CD000
heap
page read and write
1EF58234000
heap
page read and write
1EF51D25000
heap
page read and write
1EF58253000
heap
page read and write
1C52523C000
heap
page read and write
23BE2B08000
heap
page read and write
18F20CF0000
heap
page read and write
1EF58669000
heap
page read and write
1EF5835C000
heap
page read and write
1EF58684000
heap
page read and write
761837E000
stack
page read and write
217963E0000
trusted library allocation
page read and write
5AEA47F000
stack
page read and write
1EF58398000
heap
page read and write
1EF584B2000
heap
page read and write
1EF56E00000
trusted library allocation
page read and write
1EF58238000
heap
page read and write
8EF000
heap
page read and write
1EF584C9000
heap
page read and write
1A97AC29000
heap
page read and write
1EF584A8000
heap
page read and write
1EF5865D000
heap
page read and write
5AEA57D000
stack
page read and write
A6F5C7B000
stack
page read and write
81D789B000
stack
page read and write
1EF58324000
heap
page read and write
13BB25E0000
heap
page read and write
269BB513000
heap
page read and write
1A97AD02000
heap
page read and write
1EF5843B000
heap
page read and write
1EF58604000
heap
page read and write
1EF583F3000
heap
page read and write
1EF58347000
heap
page read and write
1EF515EB000
heap
page read and write
1EF584C0000
heap
page read and write
1A97AC6A000
heap
page read and write
1EF51494000
heap
page read and write
1A97A9A0000
heap
page read and write
F7779FE000
stack
page read and write
1EF58635000
heap
page read and write
83733FE000
stack
page read and write
1FE54A24000
heap
page read and write
1C525308000
heap
page read and write
19E000
stack
page read and write
217954A0000
heap
page read and write
1EF584E6000
heap
page read and write
93D000
heap
page read and write
1EF58693000
heap
page read and write
161DCFE000
stack
page read and write
1FE54910000
heap
page read and write
4A8000
unkown
page read and write
1EF584E4000
heap
page read and write
1EF51FC7000
heap
page read and write
46DEA7F000
stack
page read and write
1EF58368000
heap
page read and write
837307F000
stack
page read and write
2E20000
remote allocation
page read and write
1EF51DCC000
heap
page read and write
682F99C000
stack
page read and write
1EF56D4C000
trusted library allocation
page read and write
1EF56E30000
trusted library allocation
page read and write
1EF58476000
heap
page read and write
18F20E64000
heap
page read and write
1EF58683000
heap
page read and write
There are 1126 hidden memdumps, click here to show them.