IOC Report
0gnHF2twcT.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0gnHF2twcT.exe
"C:\Users\user\Desktop\0gnHF2twcT.exe"
malicious

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://www.google.com/recaptcVcc
unknown
https://lev-tolstoi.com:443/apin.txtPK
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/profiles/7656119972433190066U
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://store.steampowered.comm
unknown
https://cdn.fastly.
unknown
aspecteirs.lat
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://store.steampow
unknown
https://www.youtube.com
unknown
https://necklacebudi.lat:443/apigl
unknown
https://www.google.com
unknown
https://grannyejh.lat:443/api
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://steambroadcast-test.akamaized
unknown
https://store.steamp
unknown
https://community.fastly.steamstatic.com/
unknown
https://steam.tv/
unknown
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://store.ste
unknown
https://lev-tolstoi.com/apickc6
unknown
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://aspecteirs.lat:443/api
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://crosshuaht.lat
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://lev-tolstoi.com/api
104.21.66.86
https://lev-tolstoi.com:443/apil
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
grannyejh.lat
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://lev-tolstoi.com/apivZ
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://sweepyribs.lat:443/api%l
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://checkout.steampowvc
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.55.153.106
lev-tolstoi.com
104.21.66.86
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
necklacebudi.lat
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.66.86
lev-tolstoi.com
United States
23.55.153.106
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4850000
direct allocation
page read and write
malicious
5206000
trusted library allocation
page read and write
4892000
direct allocation
page read and write
527E000
trusted library allocation
page read and write
5232000
trusted library allocation
page read and write
43D1000
heap
page read and write
51FC000
trusted library allocation
page read and write
5258000
trusted library allocation
page read and write
43D1000
heap
page read and write
5258000
trusted library allocation
page read and write
A54000
heap
page read and write
528F000
trusted library allocation
page read and write
36F000
unkown
page execute and read and write
5253000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5266000
trusted library allocation
page read and write
A5D000
heap
page read and write
5287000
trusted library allocation
page read and write
5253000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
8FB000
stack
page read and write
43D0000
heap
page read and write
414F000
stack
page read and write
5258000
trusted library allocation
page read and write
524F000
trusted library allocation
page read and write
A94000
heap
page read and write
51DF000
trusted library allocation
page read and write
51E3000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
39CF000
stack
page read and write
520E000
trusted library allocation
page read and write
300E000
stack
page read and write
43D1000
heap
page read and write
51F3000
trusted library allocation
page read and write
43D1000
heap
page read and write
5287000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
9F2000
heap
page read and write
5277000
trusted library allocation
page read and write
284F000
stack
page read and write
5266000
trusted library allocation
page read and write
4B2E000
stack
page read and write
2D4F000
stack
page read and write
C4000
unkown
page execute and read and write
2B0E000
stack
page read and write
9EF000
heap
page read and write
A35000
heap
page read and write
A35000
heap
page read and write
5256000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
A4E000
heap
page read and write
9F9000
heap
page read and write
49B0000
direct allocation
page execute and read and write
428F000
stack
page read and write
A94000
heap
page read and write
5259000
trusted library allocation
page read and write
A34000
heap
page read and write
A5A000
heap
page read and write
5253000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
25F0000
direct allocation
page execute and read and write
525C000
trusted library allocation
page read and write
51EA000
trusted library allocation
page read and write
38CE000
stack
page read and write
5266000
trusted library allocation
page read and write
9FF000
heap
page read and write
A2D000
heap
page read and write
520E000
trusted library allocation
page read and write
324F000
stack
page read and write
49B0000
direct allocation
page execute and read and write
528F000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
A5A000
heap
page read and write
288E000
stack
page read and write
3A0D000
stack
page read and write
43D1000
heap
page read and write
498F000
stack
page read and write
A44000
heap
page read and write
5273000
trusted library allocation
page read and write
527A000
trusted library allocation
page read and write
34CF000
stack
page read and write
51E6000
trusted library allocation
page read and write
25E0000
direct allocation
page read and write
2C0F000
stack
page read and write
529E000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
52A6000
trusted library allocation
page read and write
70000
unkown
page read and write
9FF000
heap
page read and write
5234000
trusted library allocation
page read and write
418E000
stack
page read and write
5543000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
70000
unkown
page readonly
49B0000
direct allocation
page execute and read and write
525E000
trusted library allocation
page read and write
A30000
heap
page read and write
A80000
direct allocation
page read and write
43D1000
heap
page read and write
51FC000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
5270000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
51D0000
trusted library allocation
page read and write
4840000
remote allocation
page read and write
A53000
heap
page read and write
A94000
heap
page read and write
2607000
heap
page read and write
5203000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
521C000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
A94000
heap
page read and write
A5A000
heap
page read and write
71000
unkown
page execute and write copy
5274000
trusted library allocation
page read and write
4C6D000
stack
page read and write
540F000
stack
page read and write
43D1000
heap
page read and write
3ECF000
stack
page read and write
A09000
heap
page read and write
310F000
stack
page read and write
A80000
direct allocation
page read and write
51FF000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
2E8F000
stack
page read and write
A06000
heap
page read and write
4DEE000
stack
page read and write
5297000
trusted library allocation
page read and write
388F000
stack
page read and write
42CE000
stack
page read and write
5256000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
4840000
remote allocation
page read and write
A80000
direct allocation
page read and write
400F000
stack
page read and write
5297000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
A94000
heap
page read and write
9AB000
heap
page read and write
5273000
trusted library allocation
page read and write
5267000
trusted library allocation
page read and write
A34000
heap
page read and write
5277000
trusted library allocation
page read and write
5264000
trusted library allocation
page read and write
43D1000
heap
page read and write
51FC000
trusted library allocation
page read and write
5249000
trusted library allocation
page read and write
3D8F000
stack
page read and write
96A000
heap
page read and write
9E8000
heap
page read and write
29CE000
stack
page read and write
A80000
direct allocation
page read and write
A09000
heap
page read and write
3B4E000
stack
page read and write
5585000
trusted library allocation
page read and write
33CE000
stack
page read and write
378E000
stack
page read and write
5297000
trusted library allocation
page read and write
A5E000
heap
page read and write
A80000
direct allocation
page read and write
999000
heap
page read and write
9CA000
heap
page read and write
A94000
heap
page read and write
544D000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
A4C000
heap
page read and write
43D1000
heap
page read and write
51DF000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
51E3000
trusted library allocation
page read and write
4CAE000
stack
page read and write
5203000
trusted library allocation
page read and write
4A2D000
stack
page read and write
52AC000
trusted library allocation
page read and write
5295000
trusted library allocation
page read and write
370000
unkown
page execute and write copy
5266000
trusted library allocation
page read and write
A94000
heap
page read and write
5214000
trusted library allocation
page read and write
54ED000
trusted library allocation
page read and write
5266000
trusted library allocation
page read and write
374F000
stack
page read and write
2ACF000
stack
page read and write
298F000
stack
page read and write
43D1000
heap
page read and write
910000
heap
page read and write
51F3000
trusted library allocation
page read and write
5249000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
274C000
stack
page read and write
52A3000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
A06000
heap
page read and write
364E000
stack
page read and write
5274000
trusted library allocation
page read and write
5203000
trusted library allocation
page read and write
4840000
remote allocation
page read and write
5287000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
5258000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
4810000
heap
page read and write
524F000
trusted library allocation
page read and write
A4D000
heap
page read and write
9CA000
heap
page read and write
4B6D000
stack
page read and write
A34000
heap
page read and write
A80000
direct allocation
page read and write
5213000
trusted library allocation
page read and write
9F2000
heap
page read and write
5E2E000
trusted library allocation
page read and write
5201000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
51C0000
heap
page read and write
5256000
trusted library allocation
page read and write
43D1000
heap
page read and write
43D1000
heap
page read and write
5297000
trusted library allocation
page read and write
A94000
heap
page read and write
9A7000
heap
page read and write
5297000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
51F3000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
9E3000
heap
page read and write
5297000
trusted library allocation
page read and write
5259000
trusted library allocation
page read and write
43D1000
heap
page read and write
DEF000
stack
page read and write
5277000
trusted library allocation
page read and write
3B0F000
stack
page read and write
9F9000
heap
page read and write
5201000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
3F0E000
stack
page read and write
5277000
trusted library allocation
page read and write
591B000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
359000
unkown
page execute and read and write
51E6000
trusted library allocation
page read and write
71000
unkown
page execute and read and write
5297000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
A94000
heap
page read and write
A51000
heap
page read and write
5297000
trusted library allocation
page read and write
A06000
heap
page read and write
530E000
stack
page read and write
525E000
trusted library allocation
page read and write
5274000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
9E8000
heap
page read and write
5416000
trusted library allocation
page read and write
525C000
trusted library allocation
page read and write
36F000
unkown
page execute and write copy
5297000
trusted library allocation
page read and write
5258000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
51FC000
trusted library allocation
page read and write
5261000
trusted library allocation
page read and write
488C000
stack
page read and write
5287000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
A56000
heap
page read and write
525E000
trusted library allocation
page read and write
360F000
stack
page read and write
5222000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
A5E000
heap
page read and write
5256000
trusted library allocation
page read and write
5234000
trusted library allocation
page read and write
A94000
heap
page read and write
51F2000
trusted library allocation
page read and write
527F000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
43D1000
heap
page read and write
5273000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
5208000
trusted library allocation
page read and write
5AB000
stack
page read and write
A46000
heap
page read and write
2FCF000
stack
page read and write
9E8000
heap
page read and write
5274000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
328E000
stack
page read and write
5259000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
516F000
stack
page read and write
A5E000
heap
page read and write
5297000
trusted library allocation
page read and write
2600000
heap
page read and write
51FA000
trusted library allocation
page read and write
A35000
heap
page read and write
CAF000
stack
page read and write
49C0000
direct allocation
page execute and read and write
5261000
trusted library allocation
page read and write
2C4E000
stack
page read and write
5213000
trusted library allocation
page read and write
A51000
heap
page read and write
A94000
heap
page read and write
A94000
heap
page read and write
2ECE000
stack
page read and write
43D1000
heap
page read and write
5266000
trusted library allocation
page read and write
A94000
heap
page read and write
525E000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
4F2D000
stack
page read and write
3C8E000
stack
page read and write
525E000
trusted library allocation
page read and write
5278000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
527C000
trusted library allocation
page read and write
920000
heap
page read and write
A94000
heap
page read and write
9D0000
heap
page read and write
5256000
trusted library allocation
page read and write
A94000
heap
page read and write
5202000
trusted library allocation
page read and write
5274000
trusted library allocation
page read and write
5265000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
5258000
trusted library allocation
page read and write
52AB000
trusted library allocation
page read and write
A51000
heap
page read and write
5273000
trusted library allocation
page read and write
CEE000
stack
page read and write
25E0000
direct allocation
page read and write
5216000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
9D0000
heap
page read and write
527E000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
C2000
unkown
page write copy
9AE000
heap
page read and write
5266000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
9CA000
heap
page read and write
A3E000
heap
page read and write
5201000
trusted library allocation
page read and write
9F9000
heap
page read and write
A51000
heap
page read and write
350E000
stack
page read and write
525E000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
9CC000
heap
page read and write
A51000
heap
page read and write
A46000
heap
page read and write
54AA000
trusted library allocation
page read and write
5213000
trusted library allocation
page read and write
5259000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
51EE000
trusted library allocation
page read and write
9D0000
heap
page read and write
5262000
trusted library allocation
page read and write
5234000
trusted library allocation
page read and write
43CF000
stack
page read and write
B3000
unkown
page execute and read and write
54B8000
trusted library allocation
page read and write
25CE000
stack
page read and write
960000
heap
page read and write
A09000
heap
page read and write
5265000
trusted library allocation
page read and write
3DCE000
stack
page read and write
51E0000
trusted library allocation
page read and write
520B000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
9D0000
heap
page read and write
51E8000
trusted library allocation
page read and write
2D8E000
stack
page read and write
5296000
trusted library allocation
page read and write
5282000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
514000
unkown
page execute and write copy
314E000
stack
page read and write
49B0000
direct allocation
page execute and read and write
A5E000
heap
page read and write
5262000
trusted library allocation
page read and write
52A6000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
5268000
trusted library allocation
page read and write
9B4000
heap
page read and write
513000
unkown
page execute and read and write
A90000
heap
page read and write
5203000
trusted library allocation
page read and write
BAE000
stack
page read and write
541B000
trusted library allocation
page read and write
43D1000
heap
page read and write
3C4F000
stack
page read and write
A70000
heap
page read and write
43D1000
heap
page read and write
A94000
heap
page read and write
5249000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
5284000
trusted library allocation
page read and write
5264000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
5266000
trusted library allocation
page read and write
5266000
trusted library allocation
page read and write
A44000
heap
page read and write
A09000
heap
page read and write
A94000
heap
page read and write
250000
unkown
page execute and read and write
9B4000
heap
page read and write
A80000
direct allocation
page read and write
5259000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
526C000
trusted library allocation
page read and write
C2000
unkown
page write copy
528F000
trusted library allocation
page read and write
9F4000
heap
page read and write
5261000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
43D1000
heap
page read and write
5272000
trusted library allocation
page read and write
51E3000
trusted library allocation
page read and write
528E000
trusted library allocation
page read and write
9E8000
heap
page read and write
A94000
heap
page read and write
506E000
stack
page read and write
5204000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
528E000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
330000
unkown
page execute and read and write
5256000
trusted library allocation
page read and write
9F4000
heap
page read and write
5256000
trusted library allocation
page read and write
43E1000
heap
page read and write
A4C000
heap
page read and write
5262000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
96E000
heap
page read and write
4EEE000
stack
page read and write
525E000
trusted library allocation
page read and write
A80000
direct allocation
page read and write
361000
unkown
page execute and read and write
51EC000
trusted library allocation
page read and write
A94000
heap
page read and write
54F5000
trusted library allocation
page read and write
A51000
heap
page read and write
5435000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
A52000
heap
page read and write
9F4000
heap
page read and write
A5E000
heap
page read and write
5233000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
270F000
stack
page read and write
5277000
trusted library allocation
page read and write
521C000
trusted library allocation
page read and write
A5E000
heap
page read and write
5297000
trusted library allocation
page read and write
526C000
trusted library allocation
page read and write
51FC000
trusted library allocation
page read and write
A94000
heap
page read and write
A3C000
heap
page read and write
541C000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
A4C000
heap
page read and write
44D0000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5232000
trusted library allocation
page read and write
526C000
trusted library allocation
page read and write
A5E000
heap
page read and write
A2E000
heap
page read and write
520D000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
9B4000
heap
page read and write
52AE000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
51E3000
trusted library allocation
page read and write
43D1000
heap
page read and write
5277000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
338F000
stack
page read and write
404E000
stack
page read and write
5204000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
260D000
heap
page read and write
49A0000
direct allocation
page execute and read and write
4DAF000
stack
page read and write
502D000
stack
page read and write
9AD000
heap
page read and write
52B6000
trusted library allocation
page read and write
A5E000
heap
page read and write
A09000
heap
page read and write
527B000
trusted library allocation
page read and write
525E000
trusted library allocation
page read and write
There are 509 hidden memdumps, click here to show them.