IOC Report
f5OhlYjA9Q.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\f5OhlYjA9Q.exe
"C:\Users\user\Desktop\f5OhlYjA9Q.exe"
malicious

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://pastebin.com/raw/9uk330hR
172.67.34.170

Domains

Name
IP
Malicious
pastebin.com
172.67.34.170

IPs

IP
Domain
Country
Malicious
102.133.180.23
unknown
South Africa
malicious
172.67.34.170
pastebin.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\f5OhlYjA9Q_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\B1B32F58AD76
Rans-Status
HKEY_CURRENT_USER\Software\B1B32F58AD76
Flood
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D2000
unkown
page readonly
malicious
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
1103D579000
heap
page read and write
5420000
trusted library allocation
page read and write
1103D575000
heap
page read and write
5420000
trusted library allocation
page read and write
1537FAB0000
heap
page read and write
66D9000
trusted library allocation
page read and write
49ED000
stack
page read and write
4B20000
trusted library allocation
page read and write
67A9000
trusted library allocation
page read and write
24D5000
trusted library allocation
page read and write
6665000
trusted library allocation
page read and write
1103D595000
heap
page read and write
9F34B7D000
stack
page read and write
1103D5B4000
heap
page read and write
100478000
stack
page read and write
1103CA26000
heap
page read and write
24D0000
trusted library allocation
page read and write
9F34BFF000
stack
page read and write
501C000
stack
page read and write
6170000
trusted library allocation
page read and write
1103D579000
heap
page read and write
4AA0000
trusted library allocation
page read and write
223ACA57000
heap
page read and write
1103D59C000
heap
page read and write
6651000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
6AAF000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
9F34C79000
stack
page read and write
5420000
trusted library allocation
page read and write
6836000
trusted library allocation
page read and write
19FCBE13000
heap
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
E7E2377000
stack
page read and write
810000
heap
page read and write
4EDE000
stack
page read and write
6808000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
6981000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
6F7E000
stack
page read and write
694A000
trusted library allocation
page read and write
1103D575000
heap
page read and write
4970000
trusted library allocation
page read and write
66E8000
trusted library allocation
page read and write
6704000
trusted library allocation
page read and write
19FCBE00000
heap
page read and write
7B8000
heap
page read and write
60D8000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
19F63D00000
trusted library allocation
page read and write
1103D5CA000
heap
page read and write
617F000
trusted library allocation
page read and write
A83000
trusted library allocation
page execute and read and write
261C86B0000
trusted library allocation
page read and write
7D9000
heap
page read and write
2543F2C0000
heap
page read and write
5650000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
3511000
trusted library allocation
page read and write
21625A3C000
heap
page read and write
CD9B7F000
stack
page read and write
66B9000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103CA4C000
heap
page read and write
5420000
trusted library allocation
page read and write
8CF39FB000
stack
page read and write
21625A88000
heap
page read and write
1103DA02000
heap
page read and write
6730000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
223ACB00000
heap
page read and write
19F63D30000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
1103D578000
heap
page read and write
1103CA3C000
heap
page read and write
1103DA02000
heap
page read and write
1103D575000
heap
page read and write
6A9D000
trusted library allocation
page read and write
223ACB02000
heap
page read and write
1103D580000
heap
page read and write
E7E257D000
stack
page read and write
1537FB27000
heap
page read and write
5420000
trusted library allocation
page read and write
2543F3C0000
trusted library allocation
page read and write
AAA000
trusted library allocation
page execute and read and write
611F000
trusted library allocation
page read and write
6A79000
trusted library allocation
page read and write
1103D575000
heap
page read and write
1103D580000
heap
page read and write
67C0000
trusted library allocation
page read and write
1103D579000
heap
page read and write
6A89000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
B60000
trusted library allocation
page execute and read and write
6705000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
825000
heap
page read and write
694B000
trusted library allocation
page read and write
1537FB3E000
heap
page read and write
E7E1D2B000
stack
page read and write
615D000
trusted library allocation
page read and write
19F63E57000
heap
page read and write
67B1000
trusted library allocation
page read and write
1103D578000
heap
page read and write
6740000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6123000
trusted library allocation
page read and write
6185000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
5560000
remote allocation
page read and write
6730000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
6182000
trusted library allocation
page read and write
1103D580000
heap
page read and write
6795000
trusted library allocation
page read and write
67E7000
trusted library allocation
page read and write
69E3000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103DA44000
heap
page read and write
261C8460000
trusted library allocation
page read and write
1103DA02000
heap
page read and write
1103D5A6000
heap
page read and write
B87000
heap
page read and write
1103D2E0000
remote allocation
page read and write
2543F502000
heap
page read and write
6675000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
21625960000
trusted library allocation
page read and write
1103D551000
heap
page read and write
69E5000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
223ACA66000
heap
page read and write
1103CA55000
heap
page read and write
6985000
trusted library allocation
page read and write
681F000
trusted library allocation
page read and write
19F5E629000
heap
page read and write
66F5000
trusted library allocation
page read and write
6707000
trusted library allocation
page read and write
1103D574000
heap
page read and write
1103D575000
heap
page read and write
4B00000
trusted library allocation
page execute and read and write
19F5E600000
heap
page read and write
55CE000
stack
page read and write
6661000
trusted library allocation
page read and write
6A35000
trusted library allocation
page read and write
6165000
trusted library allocation
page read and write
61A0000
heap
page read and write
1103D5BC000
heap
page read and write
5650000
trusted library allocation
page read and write
829000
heap
page read and write
560E000
stack
page read and write
5430000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6ADC000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
554E000
unkown
page read and write
19F63D40000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
679D000
trusted library allocation
page read and write
400000
heap
page read and write
6165000
trusted library allocation
page read and write
1103CAE1000
heap
page read and write
4A90000
trusted library allocation
page read and write
19F63EAA000
heap
page read and write
1103D579000
heap
page read and write
A90000
trusted library allocation
page read and write
261C7748000
heap
page read and write
6663000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6787000
trusted library allocation
page read and write
21625A50000
heap
page read and write
DE91FE000
stack
page read and write
6808000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
19F63AD0000
trusted library allocation
page read and write
6718000
trusted library allocation
page read and write
1103D575000
heap
page read and write
676D000
trusted library allocation
page read and write
67CB000
trusted library allocation
page read and write
1103D587000
heap
page read and write
6777000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
1103CB02000
heap
page read and write
4950000
heap
page read and write
1103D520000
heap
page read and write
618C000
trusted library allocation
page read and write
1537FB22000
heap
page read and write
90D63FE000
stack
page read and write
682C000
trusted library allocation
page read and write
541B000
stack
page read and write
5650000
trusted library allocation
page read and write
19FCBF13000
heap
page read and write
66D6000
trusted library allocation
page read and write
68F7000
trusted library allocation
page read and write
1103D579000
heap
page read and write
19F63C20000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
261C86D0000
trusted library allocation
page read and write
21625A90000
heap
page read and write
531D000
stack
page read and write
2543F467000
heap
page read and write
1103D576000
heap
page read and write
1103CAF8000
heap
page read and write
5194000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
677A000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103DA02000
heap
page read and write
6850000
trusted library allocation
page read and write
67A6000
trusted library allocation
page read and write
261C778F000
heap
page read and write
5650000
trusted library allocation
page read and write
1004FE000
stack
page read and write
F24D2F7000
stack
page read and write
6AA5000
trusted library allocation
page read and write
223ACA5F000
heap
page read and write
7B5000
heap
page read and write
76F000
heap
page read and write
6E7E000
stack
page read and write
21625B00000
heap
page read and write
223ACA79000
heap
page read and write
21625B08000
heap
page read and write
5420000
trusted library allocation
page read and write
19F63EAE000
heap
page read and write
4B10000
trusted library allocation
page read and write
19F5F6C0000
trusted library section
page readonly
616B000
trusted library allocation
page read and write
6748000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
19F63BF8000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
1103C910000
heap
page read and write
1103D574000
heap
page read and write
5C0000
trusted library allocation
page read and write
2543F508000
heap
page read and write
DE8FF7000
stack
page read and write
1103D592000
heap
page read and write
68E3000
trusted library allocation
page read and write
21625B02000
heap
page read and write
5420000
trusted library allocation
page read and write
1103C920000
heap
page read and write
664D000
trusted library allocation
page read and write
699E000
trusted library allocation
page read and write
19F5E713000
heap
page read and write
5420000
trusted library allocation
page read and write
683D000
trusted library allocation
page read and write
7DC000
heap
page read and write
5650000
trusted library allocation
page read and write
1103C9B0000
trusted library allocation
page read and write
680F000
trusted library allocation
page read and write
E7E227B000
stack
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
24E0000
heap
page execute and read and write
691B000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
68CF000
trusted library allocation
page read and write
4C9C000
stack
page read and write
19F5EF13000
heap
page read and write
1103D575000
heap
page read and write
6678000
trusted library allocation
page read and write
6856000
trusted library allocation
page read and write
2543F500000
heap
page read and write
1103D574000
heap
page read and write
1103D575000
heap
page read and write
6811000
trusted library allocation
page read and write
19F63C11000
trusted library allocation
page read and write
261C7710000
heap
page read and write
1103D575000
heap
page read and write
5420000
trusted library allocation
page read and write
2543F44D000
heap
page read and write
730000
heap
page read and write
4970000
trusted library allocation
page read and write
223ACA5B000
heap
page read and write
19F63EFC000
heap
page read and write
E7E217C000
stack
page read and write
1D0000
unkown
page readonly
90D64F7000
stack
page read and write
24D0000
trusted library allocation
page read and write
1537FB2F000
heap
page read and write
51DD000
unkown
page read and write
67E0000
trusted library allocation
page read and write
1001F9000
stack
page read and write
CD9479000
stack
page read and write
4A90000
trusted library allocation
page read and write
4D9F000
stack
page read and write
1103D578000
heap
page read and write
3539000
trusted library allocation
page read and write
1103D570000
heap
page read and write
4A90000
trusted library allocation
page read and write
66D1000
trusted library allocation
page read and write
699D000
trusted library allocation
page read and write
67AA000
trusted library allocation
page read and write
261C7620000
heap
page read and write
1537FB24000
heap
page read and write
4970000
trusted library allocation
page read and write
1103DA02000
heap
page read and write
1103D575000
heap
page read and write
19F63A60000
trusted library allocation
page read and write
1537F970000
heap
page read and write
6143000
trusted library allocation
page read and write
665F000
trusted library allocation
page read and write
66EF000
trusted library allocation
page read and write
1103D5A6000
heap
page read and write
19F5EF18000
heap
page read and write
19F5E613000
heap
page read and write
69D9000
trusted library allocation
page read and write
814000
heap
page read and write
5420000
trusted library allocation
page read and write
67FF000
trusted library allocation
page read and write
261C7790000
heap
page read and write
66F5000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
2543F445000
heap
page read and write
1103D575000
heap
page read and write
E7E267F000
stack
page read and write
E7E207E000
stack
page read and write
1103D595000
heap
page read and write
5420000
trusted library allocation
page read and write
19FCBF00000
heap
page read and write
1103D575000
heap
page read and write
96E000
stack
page read and write
5420000
trusted library allocation
page read and write
681F000
trusted library allocation
page read and write
90D66FF000
stack
page read and write
5420000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
66F7000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
19F5FA60000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
4A96000
trusted library allocation
page read and write
DE937E000
stack
page read and write
19F63C14000
trusted library allocation
page read and write
19F5E3E0000
heap
page read and write
1103D57A000
heap
page read and write
24D0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
616D000
trusted library allocation
page read and write
720000
heap
page read and write
80A000
heap
page read and write
B5E000
stack
page read and write
6A4A000
trusted library allocation
page read and write
19F5E450000
heap
page read and write
5430000
trusted library allocation
page read and write
1537FB26000
heap
page read and write
19F63F02000
heap
page read and write
10017F000
stack
page read and write
19F63E99000
heap
page read and write
24D0000
trusted library allocation
page read and write
66B9000
trusted library allocation
page read and write
2549000
trusted library allocation
page read and write
1103D58B000
heap
page read and write
DE8C7E000
stack
page read and write
5420000
trusted library allocation
page read and write
1103D5A6000
heap
page read and write
5174000
trusted library allocation
page read and write
AA2000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
19F65000000
heap
page read and write
67E8000
trusted library allocation
page read and write
3517000
trusted library allocation
page read and write
1103D582000
heap
page read and write
66FF000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
223ACA61000
heap
page read and write
614C000
trusted library allocation
page read and write
6128000
trusted library allocation
page read and write
7F2000
heap
page read and write
67B3000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103CA29000
heap
page read and write
19F63EF4000
heap
page read and write
4AA1000
trusted library allocation
page read and write
80F000
heap
page read and write
5420000
trusted library allocation
page read and write
67CC000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
1103D5A7000
heap
page read and write
5420000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
19F63C20000
trusted library allocation
page read and write
2543F48B000
heap
page read and write
60A0000
trusted library allocation
page read and write
19F5EF00000
heap
page read and write
19F63C34000
trusted library allocation
page read and write
6145000
trusted library allocation
page read and write
1103CA4D000
heap
page read and write
24D0000
trusted library allocation
page read and write
4B23000
trusted library allocation
page read and write
261C77AA000
heap
page read and write
1103CAB5000
heap
page read and write
668F000
trusted library allocation
page read and write
1103D588000
heap
page read and write
1103D5A2000
heap
page read and write
ABB000
trusted library allocation
page execute and read and write
6930000
trusted library allocation
page read and write
223AC980000
trusted library allocation
page read and write
1103D580000
heap
page read and write
66EA000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
2543F45C000
heap
page read and write
1103D597000
heap
page read and write
1537F960000
heap
page read and write
21625A55000
heap
page read and write
1103D579000
heap
page read and write
19F5E560000
trusted library section
page read and write
DE90FA000
stack
page read and write
1103D580000
heap
page read and write
5420000
trusted library allocation
page read and write
1103D579000
heap
page read and write
6918000
trusted library allocation
page read and write
216258D0000
heap
page read and write
1103D588000
heap
page read and write
2543F483000
heap
page read and write
6860000
trusted library allocation
page read and write
21625A7D000
heap
page read and write
9F34A7E000
stack
page read and write
6172000
trusted library allocation
page read and write
6796000
trusted library allocation
page read and write
66A3000
trusted library allocation
page read and write
2543F260000
heap
page read and write
4A90000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
DE92FA000
stack
page read and write
B80000
heap
page read and write
1537FB16000
heap
page read and write
CD8ECC000
stack
page read and write
5420000
trusted library allocation
page read and write
1103D595000
heap
page read and write
223AC810000
heap
page read and write
261C778D000
heap
page read and write
5D0000
heap
page read and write
8CF32EB000
stack
page read and write
5420000
trusted library allocation
page read and write
1103D575000
heap
page read and write
66DA000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103CAC9000
heap
page read and write
19FCC802000
trusted library allocation
page read and write
66BA000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D575000
heap
page read and write
66F0000
trusted library allocation
page read and write
1103D579000
heap
page read and write
674B000
trusted library allocation
page read and write
1103D575000
heap
page read and write
261C86C0000
heap
page readonly
21625A2A000
heap
page read and write
10057E000
stack
page read and write
B1E000
stack
page read and write
19F63C30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D58D000
heap
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D5A6000
heap
page read and write
5650000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D581000
heap
page read and write
5650000
trusted library allocation
page read and write
90D637B000
stack
page read and write
1103D5A6000
heap
page read and write
21625A6F000
heap
page read and write
5420000
trusted library allocation
page read and write
6AA4000
trusted library allocation
page read and write
1103D575000
heap
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
F24D47F000
stack
page read and write
CD99FF000
stack
page read and write
5420000
trusted library allocation
page read and write
2543F250000
heap
page read and write
67E0000
trusted library allocation
page read and write
19F63BF0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
19F63E15000
heap
page read and write
7FF000
heap
page read and write
1537FB46000
heap
page read and write
632E000
stack
page read and write
1103DA02000
heap
page read and write
4B00000
trusted library allocation
page read and write
568000
stack
page read and write
1103D595000
heap
page read and write
5160000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
223AD202000
trusted library allocation
page read and write
6721000
trusted library allocation
page read and write
19F5E6FC000
heap
page read and write
4A90000
trusted library allocation
page read and write
1103D575000
heap
page read and write
4970000
trusted library allocation
page read and write
6A9D000
trusted library allocation
page read and write
1103CB16000
heap
page read and write
19F5E5E0000
trusted library allocation
page read and write
4B20000
unkown
page read and write
1103D575000
heap
page read and write
670A000
trusted library allocation
page read and write
223ACB13000
heap
page read and write
66AC000
trusted library allocation
page read and write
6A44000
trusted library allocation
page read and write
7C1000
heap
page read and write
6A4F000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
1103D517000
heap
page read and write
67C5000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
CD92F7000
stack
page read and write
1103D580000
heap
page read and write
614A000
trusted library allocation
page read and write
2551000
trusted library allocation
page read and write
19F63BFE000
trusted library allocation
page read and write
1103DA02000
heap
page read and write
261C7715000
heap
page read and write
242F000
stack
page read and write
1000FF000
stack
page read and write
1103D5A0000
heap
page read and write
1103D578000
heap
page read and write
19F63F00000
heap
page read and write
5420000
trusted library allocation
page read and write
1103D595000
heap
page read and write
5420000
trusted library allocation
page read and write
5D5E000
stack
page read and write
696D000
trusted library allocation
page read and write
692A000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
19F63D50000
remote allocation
page read and write
1103D578000
heap
page read and write
61A0000
trusted library allocation
page read and write
19FCBDF0000
trusted library allocation
page read and write
19F63EFE000
heap
page read and write
1103CA59000
heap
page read and write
636E000
stack
page read and write
5434000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D587000
heap
page read and write
1103D579000
heap
page read and write
DE89CB000
stack
page read and write
5421000
trusted library allocation
page read and write
19F5E695000
heap
page read and write
1103D59C000
heap
page read and write
69C5000
trusted library allocation
page read and write
7B7000
heap
page read and write
5420000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
1103DA00000
heap
page read and write
1537FB3E000
heap
page read and write
19F63E63000
heap
page read and write
1103D59F000
heap
page read and write
6113000
trusted library allocation
page read and write
60F2000
trusted library allocation
page read and write
616D000
trusted library allocation
page read and write
19F5E672000
heap
page read and write
19F5EE00000
heap
page read and write
6915000
trusted library allocation
page read and write
1103CAD4000
heap
page read and write
67DB000
trusted library allocation
page read and write
1103D580000
heap
page read and write
1103D575000
heap
page read and write
677E000
trusted library allocation
page read and write
1103D575000
heap
page read and write
1103D595000
heap
page read and write
4A90000
trusted library allocation
page read and write
829000
heap
page read and write
19F5EE15000
heap
page read and write
19F5E656000
heap
page read and write
1103D595000
heap
page read and write
663E000
stack
page read and write
1103D570000
heap
page read and write
61A1000
heap
page read and write
5650000
trusted library allocation
page read and write
223ACA00000
heap
page read and write
7B4000
heap
page read and write
618E000
trusted library allocation
page read and write
5560000
remote allocation
page read and write
1103CABC000
heap
page read and write
19F5E5E3000
trusted library allocation
page read and write
1103D595000
heap
page read and write
81B000
heap
page read and write
1537FB11000
heap
page read and write
1103D579000
heap
page read and write
1103D5A9000
heap
page read and write
6A22000
trusted library allocation
page read and write
223AC820000
heap
page read and write
696A000
trusted library allocation
page read and write
1103D586000
heap
page read and write
5420000
trusted library allocation
page read and write
261C7690000
heap
page read and write
6944000
trusted library allocation
page read and write
261C8400000
trusted library allocation
page read and write
1103D575000
heap
page read and write
CD98FF000
stack
page read and write
CD987B000
stack
page read and write
67D0000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
5E5E000
stack
page read and write
1103CABF000
heap
page read and write
1103CA88000
heap
page read and write
66EE000
trusted library allocation
page read and write
6107000
trusted library allocation
page read and write
1103D59C000
heap
page read and write
1103D597000
heap
page read and write
5420000
trusted library allocation
page read and write
19FCBE3C000
heap
page read and write
6707000
trusted library allocation
page read and write
90D60FE000
stack
page read and write
E7E1DAF000
stack
page read and write
19F5E3F0000
heap
page read and write
19F5E66F000
heap
page read and write
6870000
trusted library allocation
page read and write
216258C0000
heap
page read and write
66A8000
trusted library allocation
page read and write
261C76B0000
heap
page read and write
2543F413000
heap
page read and write
1537FB2F000
heap
page read and write
261C77A4000
heap
page read and write
618E000
trusted library allocation
page read and write
CD9C7B000
stack
page read and write
6817000
trusted library allocation
page read and write
261C7719000
heap
page read and write
24D6000
trusted library allocation
page read and write
1103D58D000
heap
page read and write
AA0000
trusted library allocation
page read and write
261C8470000
trusted library allocation
page read and write
1537FB2F000
heap
page read and write
5650000
trusted library allocation
page read and write
1103D5A2000
heap
page read and write
1103DA19000
heap
page read and write
5650000
trusted library allocation
page read and write
1537FB41000
heap
page read and write
1103D595000
heap
page read and write
2543FC02000
trusted library allocation
page read and write
1103D575000
heap
page read and write
261C778F000
heap
page read and write
1103D574000
heap
page read and write
1103D57A000
heap
page read and write
CD967E000
stack
page read and write
5420000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
2511000
trusted library allocation
page read and write
6AA7000
trusted library allocation
page read and write
F24D77F000
stack
page read and write
460D000
stack
page read and write
6793000
trusted library allocation
page read and write
6192000
trusted library allocation
page read and write
7FB000
heap
page read and write
6AAC000
trusted library allocation
page read and write
19F63EED000
heap
page read and write
4B20000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
1103D575000
heap
page read and write
66F5000
trusted library allocation
page read and write
1103D576000
heap
page read and write
5420000
trusted library allocation
page read and write
19F63E50000
heap
page read and write
6167000
trusted library allocation
page read and write
19F63AE0000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6A1A000
trusted library allocation
page read and write
19F63D50000
remote allocation
page read and write
19F5E702000
heap
page read and write
1103D575000
heap
page read and write
AA6000
trusted library allocation
page execute and read and write
6103000
trusted library allocation
page read and write
1103D5B7000
heap
page read and write
255F000
trusted library allocation
page read and write
820000
heap
page read and write
19F5F6E0000
trusted library section
page readonly
67F8000
trusted library allocation
page read and write
66E6000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
92F000
stack
page read and write
64F0000
trusted library allocation
page read and write
612A000
trusted library allocation
page read and write
1103CAE5000
heap
page read and write
9F3476B000
stack
page read and write
2563000
trusted library allocation
page read and write
1103D519000
heap
page read and write
19F5E5F0000
trusted library allocation
page read and write
80C000
heap
page read and write
261C7740000
heap
page read and write
5650000
trusted library allocation
page read and write
679F000
trusted library allocation
page read and write
1103DA03000
heap
page read and write
F24D1FB000
stack
page read and write
223ACA3C000
heap
page read and write
67D9000
trusted library allocation
page read and write
1103D578000
heap
page read and write
615D000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6782000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
67BA000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6A59000
trusted library allocation
page read and write
4F1E000
stack
page read and write
6735000
trusted library allocation
page read and write
618A000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
6929000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1103D576000
heap
page read and write
B70000
trusted library allocation
page read and write
19F5E68C000
heap
page read and write
5420000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
6669000
trusted library allocation
page read and write
1103D575000
heap
page read and write
1103D574000
heap
page read and write
19F63D50000
remote allocation
page read and write
5420000
trusted library allocation
page read and write
761000
heap
page read and write
1103D55E000
heap
page read and write
19F5F700000
trusted library section
page readonly
1103D579000
heap
page read and write
5420000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
62ED000
stack
page read and write
67FD000
trusted library allocation
page read and write
690A000
trusted library allocation
page read and write
6787000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
DE8CFE000
stack
page read and write
4990000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
6985000
trusted library allocation
page read and write
6816000
trusted library allocation
page read and write
1103D5B4000
heap
page read and write
9AE000
stack
page read and write
6191000
trusted library allocation
page read and write
674A000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
1103D57A000
heap
page read and write
1103CAAE000
heap
page read and write
67F1000
trusted library allocation
page read and write
6954000
trusted library allocation
page read and write
5185000
trusted library allocation
page read and write
6696000
trusted library allocation
page read and write
67D3000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
67F8000
trusted library allocation
page read and write
90D607B000
stack
page read and write
A9D000
trusted library allocation
page execute and read and write
CD9AFF000
stack
page read and write
21625930000
heap
page read and write
24D0000
trusted library allocation
page read and write
616E000
trusted library allocation
page read and write
1103D580000
heap
page read and write
21625A13000
heap
page read and write
5188000
trusted library allocation
page read and write
1103CA4F000
heap
page read and write
1103D575000
heap
page read and write
5420000
trusted library allocation
page read and write
19F5E550000
trusted library allocation
page read and write
261C7730000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
6991000
trusted library allocation
page read and write
19F5E6AE000
heap
page read and write
1103D578000
heap
page read and write
19F63EDE000
heap
page read and write
6830000
trusted library allocation
page read and write
1103D58A000
heap
page read and write
66B2000
trusted library allocation
page read and write
1103D576000
heap
page read and write
4AFE000
stack
page read and write
19F5F6D0000
trusted library section
page readonly
19F5E68E000
heap
page read and write
5650000
trusted library allocation
page read and write
674C000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
261C86E0000
trusted library allocation
page read and write
69AC000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
90D627B000
stack
page read and write
1103D2E0000
remote allocation
page read and write
19F63D50000
trusted library allocation
page read and write
CD9A7F000
stack
page read and write
19F63CC0000
trusted library allocation
page read and write
1103D5B7000
heap
page read and write
67AD000
trusted library allocation
page read and write
1103D595000
heap
page read and write
19F63EF8000
heap
page read and write
6725000
trusted library allocation
page read and write
67A8000
trusted library allocation
page read and write
664A000
trusted library allocation
page read and write
5F9E000
stack
page read and write
19FCBE52000
heap
page read and write
4B10000
trusted library allocation
page read and write
1103D5A6000
heap
page read and write
19F63D20000
trusted library allocation
page read and write
261C778E000
heap
page read and write
609F000
stack
page read and write
1537FB48000
heap
page read and write
5420000
trusted library allocation
page read and write
CD977A000
stack
page read and write
1103CA13000
heap
page read and write
5420000
trusted library allocation
page read and write
66D1000
trusted library allocation
page read and write
664F000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D5A6000
heap
page read and write
E7E247F000
stack
page read and write
6123000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
19FCBDC0000
heap
page read and write
6A79000
trusted library allocation
page read and write
68D8000
trusted library allocation
page read and write
19F5E690000
heap
page read and write
19FCBE77000
heap
page read and write
1103C980000
heap
page read and write
5420000
trusted library allocation
page read and write
6104000
trusted library allocation
page read and write
5D5000
heap
page read and write
6948000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
67F4000
trusted library allocation
page read and write
19FCBE02000
heap
page read and write
8CF37FB000
stack
page read and write
4B10000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6785000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
696A000
trusted library allocation
page read and write
9F34AF9000
stack
page read and write
19F63F04000
heap
page read and write
5F5E000
stack
page read and write
21625A4E000
heap
page read and write
10007A000
stack
page read and write
CD957A000
stack
page read and write
4A90000
trusted library allocation
page read and write
52D8000
stack
page read and write
1103CA4B000
heap
page read and write
F24CDAC000
stack
page read and write
1103CAE8000
heap
page read and write
1103D59C000
heap
page read and write
6657000
trusted library allocation
page read and write
19F5EF18000
heap
page read and write
805000
heap
page read and write
7BE000
heap
page read and write
66CF000
trusted library allocation
page read and write
261C778D000
heap
page read and write
1103CA70000
heap
page read and write
699E000
trusted library allocation
page read and write
8CF38FB000
stack
page read and write
1103D59E000
heap
page read and write
AB2000
trusted library allocation
page read and write
1103D575000
heap
page read and write
2543F42A000
heap
page read and write
A84000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
223AC880000
heap
page read and write
68E6000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D575000
heap
page read and write
680B000
trusted library allocation
page read and write
19F63E2F000
heap
page read and write
1103D402000
heap
page read and write
1103D5BF000
heap
page read and write
49A0000
heap
page execute and read and write
19FCBD60000
heap
page read and write
1103D575000
heap
page read and write
1103D576000
heap
page read and write
4AA0000
trusted library allocation
page read and write
1103D575000
heap
page read and write
7BF000
heap
page read and write
5650000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D5B7000
heap
page read and write
675C000
trusted library allocation
page read and write
1537FB00000
heap
page read and write
1103D579000
heap
page read and write
6145000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
A93000
trusted library allocation
page read and write
1103D579000
heap
page read and write
19F63C10000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103CA00000
heap
page read and write
1103D574000
heap
page read and write
4B20000
trusted library allocation
page read and write
2543F42E000
heap
page read and write
19FCBE28000
heap
page read and write
66F0000
trusted library allocation
page read and write
1103D575000
heap
page read and write
19F5E63C000
heap
page read and write
667C000
trusted library allocation
page read and write
671A000
trusted library allocation
page read and write
1103CB13000
heap
page read and write
1103D5C7000
heap
page read and write
5650000
trusted library allocation
page read and write
66C7000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
21625B13000
heap
page read and write
5420000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
1103DA20000
heap
page read and write
646D000
stack
page read and write
5420000
trusted library allocation
page read and write
66F5000
trusted library allocation
page read and write
1103D595000
heap
page read and write
5650000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
4DDE000
stack
page read and write
261C7630000
trusted library allocation
page read and write
19F63EE3000
heap
page read and write
46C000
stack
page read and write
1103D58D000
heap
page read and write
19F5E627000
heap
page read and write
4990000
trusted library allocation
page read and write
223ACA2A000
heap
page read and write
2543F43C000
heap
page read and write
1103CAEA000
heap
page read and write
19FCBE75000
heap
page read and write
19F5EE02000
heap
page read and write
67A1000
trusted library allocation
page read and write
699D000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
1103D595000
heap
page read and write
6840000
trusted library allocation
page read and write
5D7000
heap
page read and write
6850000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
5560000
remote allocation
page read and write
612A000
trusted library allocation
page read and write
19F5F710000
trusted library section
page readonly
1103D578000
heap
page read and write
6835000
trusted library allocation
page read and write
69A3000
trusted library allocation
page read and write
DE93FF000
unkown
page read and write
19F63E43000
heap
page read and write
1537FB43000
heap
page read and write
69DE000
trusted library allocation
page read and write
66EC000
trusted library allocation
page read and write
6661000
trusted library allocation
page read and write
CD997E000
stack
page read and write
694E000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
CD9E7E000
stack
page read and write
5420000
trusted library allocation
page read and write
F24D07E000
stack
page read and write
66EA000
trusted library allocation
page read and write
1103DA02000
heap
page read and write
4970000
trusted library allocation
page read and write
19F63E00000
heap
page read and write
19F5E5C1000
trusted library allocation
page read and write
676B000
trusted library allocation
page read and write
19FCBD50000
heap
page read and write
24F0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6EE000
stack
page read and write
6927000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
1537FB3E000
heap
page read and write
5420000
trusted library allocation
page read and write
816000
heap
page read and write
1103CB08000
heap
page read and write
6956000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
19F5EF02000
heap
page read and write
694A000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
19F5E68A000
heap
page read and write
7F800000
trusted library allocation
page execute and read and write
19F63BF0000
trusted library allocation
page read and write
2543F45F000
heap
page read and write
1103D579000
heap
page read and write
6197000
trusted library allocation
page read and write
81C000
heap
page read and write
A8D000
trusted library allocation
page execute and read and write
6808000
trusted library allocation
page read and write
6824000
trusted library allocation
page read and write
6767000
trusted library allocation
page read and write
6799000
trusted library allocation
page read and write
1103D5D8000
heap
page read and write
4A90000
trusted library allocation
page read and write
564E000
stack
page read and write
1103D2E0000
remote allocation
page read and write
1103DA03000
heap
page read and write
617A000
trusted library allocation
page read and write
223ACB08000
heap
page read and write
1103D575000
heap
page read and write
6850000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
6824000
trusted library allocation
page read and write
21626402000
trusted library allocation
page read and write
261C8730000
trusted library allocation
page read and write
2543F462000
heap
page read and write
5650000
trusted library allocation
page read and write
66DF000
trusted library allocation
page read and write
19F5F5E0000
trusted library allocation
page read and write
6771000
trusted library allocation
page read and write
21625A00000
heap
page read and write
90D617D000
stack
page read and write
727000
heap
page read and write
4A90000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
68FC000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
2543F513000
heap
page read and write
90D65FF000
stack
page read and write
1103D5BC000
heap
page read and write
1537FB16000
heap
page read and write
261C7910000
trusted library allocation
page read and write
6703000
trusted library allocation
page read and write
653E000
stack
page read and write
5420000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
1103CA57000
heap
page read and write
6A97000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
19FCBE24000
heap
page read and write
667E000
trusted library allocation
page read and write
6783000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
9F347EE000
stack
page read and write
DE94FB000
stack
page read and write
F24D0FE000
stack
page read and write
1103D500000
heap
page read and write
6153000
trusted library allocation
page read and write
19F5F6F0000
trusted library section
page readonly
25D4000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6836000
trusted library allocation
page read and write
1103D5B7000
heap
page read and write
61A0000
trusted library allocation
page read and write
806000
heap
page read and write
6145000
trusted library allocation
page read and write
1103D584000
heap
page read and write
AB7000
trusted library allocation
page execute and read and write
1103D575000
heap
page read and write
4B10000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
6744000
trusted library allocation
page read and write
66AF000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
F24D57F000
stack
page read and write
1103D59C000
heap
page read and write
5570000
trusted library allocation
page read and write
2500000
heap
page read and write
5420000
trusted library allocation
page read and write
DE8EF7000
stack
page read and write
69FD000
trusted library allocation
page read and write
1537FA90000
heap
page read and write
5420000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
5C5E000
stack
page read and write
19F5E6A0000
heap
page read and write
6A35000
trusted library allocation
page read and write
19F5E66A000
heap
page read and write
5420000
trusted library allocation
page read and write
67A2000
trusted library allocation
page read and write
2543F400000
heap
page read and write
5650000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
66DF000
trusted library allocation
page read and write
1103D576000
heap
page read and write
21625A4B000
heap
page read and write
1103D570000
heap
page read and write
5650000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
7FF000
heap
page read and write
19FCBF02000
heap
page read and write
F24D67D000
stack
page read and write
66F0000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
261C7750000
heap
page read and write
1103D575000
heap
page read and write
82C000
heap
page read and write
6828000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
1103D597000
heap
page read and write
1103D584000
heap
page read and write
19F63D10000
trusted library allocation
page read and write
F24D37E000
stack
page read and write
66DB000
trusted library allocation
page read and write
223ACA83000
heap
page read and write
1103DA02000
heap
page read and write
6917000
trusted library allocation
page read and write
4AB0000
heap
page read and write
4B20000
trusted library allocation
page read and write
261C7786000
heap
page read and write
80D000
heap
page read and write
1103D579000
heap
page read and write
223ACA13000
heap
page read and write
19F63E23000
heap
page read and write
5420000
trusted library allocation
page read and write
6679000
trusted library allocation
page read and write
1103D5A7000
heap
page read and write
1103D575000
heap
page read and write
6141000
trusted library allocation
page read and write
2438000
trusted library allocation
page read and write
8CF3AFF000
stack
page read and write
1537F975000
heap
page read and write
21625A22000
heap
page read and write
67AF000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
There are 1120 hidden memdumps, click here to show them.