IOC Report
s31ydU1MpQ.exe

loading gif

Files

File Path
Type
Category
Malicious
s31ydU1MpQ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\BGXAMSUR4L24WR8IH77.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HXPC21YC8H3Q6AWWXLQHI1I.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HXPC21YC8H3Q6AWWXLQHI1I.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\s31ydU1MpQ.exe
"C:\Users\user\Desktop\s31ydU1MpQ.exe"
malicious
C:\Users\user\AppData\Local\Temp\HXPC21YC8H3Q6AWWXLQHI1I.exe
"C:\Users\user~1\AppData\Local\Temp\HXPC21YC8H3Q6AWWXLQHI1I.exe"
malicious
C:\Users\user\AppData\Local\Temp\BGXAMSUR4L24WR8IH77.exe
"C:\Users\user~1\AppData\Local\Temp\BGXAMSUR4L24WR8IH77.exe"
malicious

URLs

Name
IP
Malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.16/off/def.exeX
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://lev-tolstoi.com:443/apiocal
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://cdn.fastly.
unknown
aspecteirs.lat
http://185.215.113.206/ws
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
https://www.google.com/recaptc
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
sweepyribs.lat
http://185.215.113.16/off/def.exeKl
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
https://help.stRG
unknown
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://community.fastly.steamstatic.com/
unknown
https://steam.tv/
unknown
http://185.215.113.16/Q=
unknown
185.215.113.206/c4becf79229cb002.php
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://steamcommunity.com/p
unknown
https://lev-tolstoi.com/sw
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://lev-tolstoi.com/pi0Q
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://steambroadcast-test.akamaizedrG/
unknown
https://lev-tolstoi.com/api
104.21.66.86
http://185.215.113.16:80/off/def.exe
unknown
http://185.215.113.16/off/def.exe4
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.16/off/def.exe
unknown
grannyejh.lat
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://checkout.steampowBG
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
https://lev-tolstoi.com:443/apissio
unknown
necklacebudi.lat
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://lv.queni
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://lev-tolstoi.com/apim
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://lev-tolstoi.com/apin
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://lev-tolstoi.com/apis
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://185.215.113.16/steam/random.exeh
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.55.153.106
lev-tolstoi.com
104.21.66.86
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
necklacebudi.lat
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
104.21.66.86
lev-tolstoi.com
United States
23.55.153.106
steamcommunity.com
United States
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
4E90000
direct allocation
page read and write
malicious
103E000
heap
page read and write
malicious
681000
unkown
page execute and read and write
malicious
5930000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
401F000
stack
page read and write
1297000
heap
page read and write
F74000
heap
page read and write
597E000
trusted library allocation
page read and write
F74000
heap
page read and write
12B3000
heap
page read and write
595D000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
5952000
trusted library allocation
page read and write
12D1000
heap
page read and write
600000
unkown
page readonly
680000
unkown
page readonly
5D38000
trusted library allocation
page read and write
1214000
heap
page read and write
4EB1000
heap
page read and write
F74000
heap
page read and write
12B9000
heap
page read and write
5ED2000
trusted library allocation
page read and write
F74000
heap
page read and write
576D000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
76BE000
stack
page read and write
3C7E000
stack
page read and write
B16000
unkown
page execute and write copy
5958000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
337F000
stack
page read and write
5D31000
trusted library allocation
page read and write
F74000
heap
page read and write
5E41000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
327E000
stack
page read and write
CEB000
unkown
page execute and read and write
4FED000
trusted library allocation
page execute and read and write
D17000
unkown
page execute and read and write
D96000
unkown
page execute and write copy
6635000
trusted library allocation
page read and write
1214000
heap
page read and write
680000
unkown
page read and write
10C4000
heap
page read and write
5F3B000
trusted library allocation
page read and write
AD0000
unkown
page execute and write copy
F74000
heap
page read and write
5947000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
3DDE000
stack
page read and write
5EE7000
trusted library allocation
page read and write
4FF4000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
35FF000
stack
page read and write
2CE0000
direct allocation
page read and write
F74000
heap
page read and write
CFD000
unkown
page execute and read and write
5938000
trusted library allocation
page read and write
12B5000
heap
page read and write
597F000
trusted library allocation
page read and write
5948000
trusted library allocation
page read and write
F74000
heap
page read and write
5936000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
5A74000
trusted library allocation
page read and write
599D000
trusted library allocation
page read and write
8CA000
unkown
page write copy
5331000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
1214000
heap
page read and write
5765000
trusted library allocation
page read and write
F74000
heap
page read and write
43BF000
stack
page read and write
1214000
heap
page read and write
5E54000
trusted library allocation
page read and write
F74000
heap
page read and write
10C4000
heap
page read and write
595D000
trusted library allocation
page read and write
12B3000
heap
page read and write
5220000
heap
page execute and read and write
5E54000
trusted library allocation
page read and write
F74000
heap
page read and write
365E000
stack
page read and write
59E6000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
B1C000
unkown
page execute and read and write
F74000
heap
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
5950000
trusted library allocation
page read and write
4911000
heap
page read and write
597D000
trusted library allocation
page read and write
1214000
heap
page read and write
598B000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
12FF000
heap
page read and write
4911000
heap
page read and write
595D000
trusted library allocation
page read and write
12D1000
heap
page read and write
F74000
heap
page read and write
4A01000
heap
page read and write
596F000
trusted library allocation
page read and write
1214000
heap
page read and write
5D40000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
B0D000
unkown
page execute and read and write
12C2000
heap
page read and write
576B000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
51A0000
trusted library allocation
page execute and read and write
F74000
heap
page read and write
F74000
heap
page read and write
387F000
stack
page read and write
5937000
trusted library allocation
page read and write
131D000
heap
page read and write
5ECC000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
1214000
heap
page read and write
315E000
stack
page read and write
F74000
heap
page read and write
593A000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
12D1000
heap
page read and write
5995000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
12A1000
heap
page read and write
5E0D000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
1214000
heap
page read and write
5D30000
trusted library allocation
page read and write
4911000
heap
page read and write
5D3C000
trusted library allocation
page read and write
F74000
heap
page read and write
10A9000
heap
page read and write
2CE0000
direct allocation
page read and write
12FF000
heap
page read and write
5975000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
1214000
heap
page read and write
12B3000
heap
page read and write
5E0E000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
3D9F000
stack
page read and write
4F10000
direct allocation
page execute and read and write
F74000
heap
page read and write
5AFD000
trusted library allocation
page read and write
311F000
stack
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
2CE0000
direct allocation
page read and write
120E000
stack
page read and write
F74000
heap
page read and write
5982000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
8D7000
unkown
page execute and read and write
ADD000
unkown
page execute and write copy
1214000
heap
page read and write
10C4000
heap
page read and write
5938000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
A5B000
unkown
page execute and write copy
5E76000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
2CFB000
heap
page read and write
4F00000
direct allocation
page execute and read and write
F74000
heap
page read and write
12A4000
heap
page read and write
141F000
heap
page read and write
596D000
trusted library allocation
page read and write
1214000
heap
page read and write
59A0000
trusted library allocation
page read and write
12FF000
heap
page read and write
5D41000
trusted library allocation
page read and write
A60000
unkown
page execute and read and write
5D39000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
F74000
heap
page read and write
5F65000
trusted library allocation
page read and write
F74000
heap
page read and write
4A1F000
stack
page read and write
59BC000
trusted library allocation
page read and write
F74000
heap
page read and write
139E000
heap
page read and write
AC0000
unkown
page execute and write copy
48FE000
stack
page read and write
5A21000
trusted library allocation
page read and write
10C4000
heap
page read and write
1214000
heap
page read and write
5E04000
trusted library allocation
page read and write
5FCD000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
1214000
heap
page read and write
5E00000
trusted library allocation
page read and write
72F000
unkown
page execute and read and write
5948000
trusted library allocation
page read and write
3AFF000
stack
page read and write
595D000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
AFB000
unkown
page execute and read and write
5D37000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
5A4A000
trusted library allocation
page read and write
2E6F000
stack
page read and write
51D0000
heap
page read and write
5D31000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
1214000
heap
page read and write
5933000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
1214000
heap
page read and write
5D3C000
trusted library allocation
page read and write
F74000
heap
page read and write
5D40000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
B0A000
unkown
page execute and read and write
5950000
trusted library allocation
page read and write
48BF000
stack
page read and write
5F5F000
trusted library allocation
page read and write
4911000
heap
page read and write
5FB5000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
4FE4000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
F74000
heap
page read and write
2CDE000
stack
page read and write
5D39000
trusted library allocation
page read and write
4EB1000
heap
page read and write
5D3C000
trusted library allocation
page read and write
514F000
stack
page read and write
ABF000
unkown
page execute and read and write
D43000
unkown
page execute and read and write
12BD000
heap
page read and write
128B000
heap
page read and write
F74000
heap
page read and write
375F000
stack
page read and write
593F000
trusted library allocation
page read and write
F74000
heap
page read and write
323F000
stack
page read and write
1324000
heap
page read and write
F3E000
stack
page read and write
F74000
heap
page read and write
5948000
trusted library allocation
page read and write
1214000
heap
page read and write
5761000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
B63000
unkown
page execute and read and write
2EFF000
stack
page read and write
451F000
stack
page read and write
593D000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
52CE000
stack
page read and write
F74000
heap
page read and write
5977000
trusted library allocation
page read and write
3DBE000
stack
page read and write
C8F000
unkown
page execute and read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
33BE000
stack
page read and write
595E000
trusted library allocation
page read and write
5E77000
trusted library allocation
page read and write
467E000
stack
page read and write
5767000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
131C000
heap
page read and write
59A2000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
5975000
trusted library allocation
page read and write
F74000
heap
page read and write
5955000
trusted library allocation
page read and write
F80000
heap
page read and write
43DF000
stack
page read and write
AF0000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
373F000
stack
page read and write
53CF000
stack
page read and write
1210000
direct allocation
page read and write
F74000
heap
page read and write
5D33000
trusted library allocation
page read and write
12BB000
heap
page read and write
1020000
heap
page read and write
754E000
stack
page read and write
F74000
heap
page read and write
12B3000
heap
page read and write
F74000
heap
page read and write
5DFA000
trusted library allocation
page read and write
1214000
heap
page read and write
463F000
stack
page read and write
A64000
unkown
page execute and read and write
5978000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
12BB000
heap
page read and write
AE0000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
413F000
stack
page read and write
5D37000
trusted library allocation
page read and write
F74000
heap
page read and write
595B000
trusted library allocation
page read and write
B78000
unkown
page execute and write copy
1324000
heap
page read and write
5E6A000
trusted library allocation
page read and write
B39000
unkown
page execute and read and write
565C000
stack
page read and write
5D3D000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
329E000
stack
page read and write
576C000
trusted library allocation
page read and write
158F000
stack
page read and write
4EA0000
direct allocation
page read and write
F74000
heap
page read and write
403D000
stack
page read and write
59AD000
trusted library allocation
page read and write
5982000
trusted library allocation
page read and write
F74000
heap
page read and write
143F000
stack
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
5E17000
trusted library allocation
page read and write
5E75000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
30FF000
stack
page read and write
12C2000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
6331000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
12AC000
heap
page read and write
12B9000
heap
page read and write
1214000
heap
page read and write
599C000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
2F17000
heap
page read and write
F74000
heap
page read and write
5E4E000
trusted library allocation
page read and write
1282000
heap
page read and write
F74000
heap
page read and write
12C7000
heap
page read and write
361F000
stack
page read and write
5E57000
trusted library allocation
page read and write
5E7B000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
597C000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
4FCF000
stack
page read and write
3C3F000
stack
page read and write
12FF000
heap
page read and write
2CE0000
direct allocation
page read and write
F74000
heap
page read and write
599D000
trusted library allocation
page read and write
128B000
heap
page read and write
5955000
trusted library allocation
page read and write
598C000
trusted library allocation
page read and write
12D1000
heap
page read and write
F74000
heap
page read and write
1390000
heap
page read and write
4911000
heap
page read and write
5990000
trusted library allocation
page read and write
5FD3000
trusted library allocation
page read and write
F74000
heap
page read and write
5993000
trusted library allocation
page read and write
5F22000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
F74000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5FB1000
trusted library allocation
page read and write
F74000
heap
page read and write
5988000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
1282000
heap
page read and write
F74000
heap
page read and write
405E000
stack
page read and write
F74000
heap
page read and write
4A01000
heap
page read and write
3C5F000
stack
page read and write
5E73000
trusted library allocation
page read and write
F74000
heap
page read and write
2CE0000
direct allocation
page read and write
5D39000
trusted library allocation
page read and write
F74000
heap
page read and write
595B000
trusted library allocation
page read and write
4E90000
direct allocation
page read and write
5D38000
trusted library allocation
page read and write
12B3000
heap
page read and write
417E000
stack
page read and write
5D35000
trusted library allocation
page read and write
681000
unkown
page execute and write copy
131D000
heap
page read and write
1214000
heap
page read and write
AF9000
unkown
page execute and write copy
594B000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
10C4000
heap
page read and write
595D000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
D95000
unkown
page execute and read and write
F74000
heap
page read and write
D62000
unkown
page execute and write copy
D94000
unkown
page execute and write copy
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5948000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
1214000
heap
page read and write
593A000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
F74000
heap
page read and write
1210000
direct allocation
page read and write
F74000
heap
page read and write
5D38000
trusted library allocation
page read and write
10F9000
stack
page read and write
1214000
heap
page read and write
5921000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5A22000
trusted library allocation
page read and write
A62000
unkown
page execute and write copy
5D33000
trusted library allocation
page read and write
5E5A000
trusted library allocation
page read and write
F74000
heap
page read and write
5D38000
trusted library allocation
page read and write
F74000
heap
page read and write
128B000
heap
page read and write
5D39000
trusted library allocation
page read and write
10C5000
heap
page read and write
612C000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
12D1000
heap
page read and write
4EA0000
direct allocation
page read and write
FFE000
stack
page read and write
10B6000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
8B8000
unkown
page execute and read and write
599B000
trusted library allocation
page read and write
12C2000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
2CE0000
direct allocation
page read and write
5E70000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
12FF000
heap
page read and write
597E000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5DFC000
trusted library allocation
page read and write
C8C000
unkown
page execute and write copy
5E7A000
trusted library allocation
page read and write
F74000
heap
page read and write
5966000
trusted library allocation
page read and write
12D1000
heap
page read and write
12D1000
heap
page read and write
5E6A000
trusted library allocation
page read and write
10C4000
heap
page read and write
F74000
heap
page read and write
2CE0000
direct allocation
page read and write
576D000
trusted library allocation
page read and write
A4D000
unkown
page execute and read and write
593F000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
5D45000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
F74000
heap
page read and write
131E000
heap
page read and write
1311000
heap
page read and write
12BD000
heap
page read and write
5D31000
trusted library allocation
page read and write
F74000
heap
page read and write
5770000
trusted library allocation
page read and write
441E000
stack
page read and write
F74000
heap
page read and write
5A26000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
A7C000
stack
page read and write
F74000
heap
page read and write
598D000
trusted library allocation
page read and write
1030000
heap
page read and write
D07000
unkown
page execute and write copy
595B000
trusted library allocation
page read and write
12A4000
heap
page read and write
5E64000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
F74000
heap
page read and write
12D1000
heap
page read and write
5D36000
trusted library allocation
page read and write
6355000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
521E000
stack
page read and write
13E0000
heap
page read and write
5D32000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
B69000
unkown
page execute and write copy
1214000
heap
page read and write
576C000
trusted library allocation
page read and write
597F000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
599D000
trusted library allocation
page read and write
10C4000
heap
page read and write
1214000
heap
page read and write
596A000
trusted library allocation
page read and write
716000
unkown
page execute and read and write
F74000
heap
page read and write
576A000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
B14000
unkown
page execute and write copy
5997000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
12C2000
heap
page read and write
12C7000
heap
page read and write
AF2000
unkown
page execute and read and write
F74000
heap
page read and write
5E12000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
B06000
unkown
page write copy
F74000
heap
page read and write
131D000
heap
page read and write
5D31000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
4911000
heap
page read and write
AE7000
unkown
page execute and write copy
62AC000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
F74000
heap
page read and write
C8B000
unkown
page execute and read and write
4EA0000
direct allocation
page read and write
5A21000
trusted library allocation
page read and write
F74000
heap
page read and write
301F000
stack
page read and write
1214000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
12A4000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
1282000
heap
page read and write
D41000
unkown
page execute and write copy
12A1000
heap
page read and write
5D39000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
579E000
stack
page read and write
1214000
heap
page read and write
5150000
trusted library allocation
page read and write
F74000
heap
page read and write
477F000
stack
page read and write
12FF000
heap
page read and write
4F10000
direct allocation
page execute and read and write
5937000
trusted library allocation
page read and write
1214000
heap
page read and write
4F10000
direct allocation
page execute and read and write
5D36000
trusted library allocation
page read and write
F74000
heap
page read and write
5E54000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
5410000
remote allocation
page read and write
5F00000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
12D1000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5E10000
trusted library allocation
page read and write
2F10000
heap
page read and write
5A59000
trusted library allocation
page read and write
5E06000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
F74000
heap
page read and write
12B3000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
ACF000
unkown
page execute and read and write
5950000
trusted library allocation
page read and write
3B3E000
stack
page read and write
596C000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
38DE000
stack
page read and write
77BF000
stack
page read and write
33DE000
stack
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
59C4000
trusted library allocation
page read and write
13D0000
heap
page read and write
3A1E000
stack
page read and write
5D3E000
trusted library allocation
page read and write
12BC000
heap
page read and write
5D37000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
F74000
heap
page read and write
2EEE000
stack
page read and write
1214000
heap
page read and write
5968000
trusted library allocation
page read and write
DAA000
unkown
page execute and write copy
5D32000
trusted library allocation
page read and write
1214000
heap
page read and write
5986000
trusted library allocation
page read and write
1297000
heap
page read and write
F74000
heap
page read and write
5947000
trusted library allocation
page read and write
377E000
stack
page read and write
5D32000
trusted library allocation
page read and write
F74000
heap
page read and write
5949000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
F74000
heap
page read and write
469E000
stack
page read and write
B00000
unkown
page readonly
5D31000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
5F05000
trusted library allocation
page read and write
12C6000
heap
page read and write
5942000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
F74000
heap
page read and write
4911000
heap
page read and write
4911000
heap
page read and write
1214000
heap
page read and write
10C4000
heap
page read and write
596D000
trusted library allocation
page read and write
1214000
heap
page read and write
5000000
direct allocation
page read and write
1214000
heap
page read and write
1214000
heap
page read and write
5D3A000
trusted library allocation
page read and write
DB8000
unkown
page execute and write copy
595D000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5A36000
trusted library allocation
page read and write
12AC000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
3B1F000
stack
page read and write
F74000
heap
page read and write
5E71000
trusted library allocation
page read and write
750D000
stack
page read and write
F74000
heap
page read and write
5E00000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5D41000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5955000
trusted library allocation
page read and write
10C4000
heap
page read and write
12B3000
heap
page read and write
F74000
heap
page read and write
5950000
trusted library allocation
page read and write
5EDF000
trusted library allocation
page read and write
415F000
stack
page read and write
D97000
unkown
page execute and read and write
1214000
heap
page read and write
5A39000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
1214000
heap
page read and write
12D1000
heap
page read and write
1214000
heap
page read and write
5951000
trusted library allocation
page read and write
10C4000
heap
page read and write
F34000
stack
page read and write
75B0000
heap
page execute and read and write
5EE3000
trusted library allocation
page read and write
3D7F000
stack
page read and write
5D33000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
12A1000
heap
page read and write
419D000
stack
page read and write
5D34000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
12FF000
heap
page read and write
5E11000
trusted library allocation
page read and write
DBA000
unkown
page execute and write copy
12A4000
heap
page read and write
F74000
heap
page read and write
1282000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
B00000
unkown
page read and write
5947000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
5950000
trusted library allocation
page read and write
A5B000
unkown
page execute and read and write
5D38000
trusted library allocation
page read and write
1214000
heap
page read and write
5947000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5D39000
trusted library allocation
page read and write
13CE000
heap
page read and write
5FBA000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
596A000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
F74000
heap
page read and write
5D3C000
trusted library allocation
page read and write
A9A000
unkown
page execute and write copy
127B000
heap
page read and write
38BE000
stack
page read and write
5D36000
trusted library allocation
page read and write
AED000
unkown
page execute and read and write
139A000
heap
page read and write
2DFF000
stack
page read and write
127D000
heap
page read and write
1214000
heap
page read and write
576F000
trusted library allocation
page read and write
5F41000
trusted library allocation
page read and write
1214000
heap
page read and write
5937000
trusted library allocation
page read and write
12C6000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
4911000
heap
page read and write
5FBC000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
12C2000
heap
page read and write
652000
unkown
page write copy
5A5D000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
5E7D000
trusted library allocation
page read and write
128B000
heap
page read and write
F74000
heap
page read and write
D06000
unkown
page execute and read and write
5D40000
trusted library allocation
page read and write
5177000
trusted library allocation
page execute and read and write
5962000
trusted library allocation
page read and write
5E02000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
F74000
heap
page read and write
455E000
stack
page read and write
1210000
direct allocation
page read and write
5E5E000
trusted library allocation
page read and write
F74000
heap
page read and write
DBA000
unkown
page execute and write copy
1214000
heap
page read and write
5E18000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
1314000
heap
page read and write
6334000
trusted library allocation
page read and write
12B3000
heap
page read and write
5D39000
trusted library allocation
page read and write
5E7B000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
12A4000
heap
page read and write
1214000
heap
page read and write
4EB1000
heap
page read and write
1210000
direct allocation
page read and write
CE8000
unkown
page execute and write copy
1214000
heap
page read and write
5A70000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
D16000
unkown
page execute and write copy
5D38000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
1360000
heap
page read and write
48DF000
stack
page read and write
5D3D000
trusted library allocation
page read and write
F74000
heap
page read and write
5D3B000
trusted library allocation
page read and write
2CE0000
direct allocation
page read and write
CED000
unkown
page execute and read and write
501E000
stack
page read and write
39FE000
stack
page read and write
5769000
trusted library allocation
page read and write
517B000
trusted library allocation
page execute and read and write
5F7C000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
1320000
heap
page read and write
5D36000
trusted library allocation
page read and write
13ED000
heap
page read and write
F74000
heap
page read and write
12C2000
heap
page read and write
10C4000
heap
page read and write
B06000
unkown
page write copy
5E6D000
trusted library allocation
page read and write
1214000
heap
page read and write
593D000
trusted library allocation
page read and write
F74000
heap
page read and write
5D3B000
trusted library allocation
page read and write
12C2000
heap
page read and write
F74000
heap
page read and write
389F000
stack
page read and write
576D000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
4911000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
CCF000
unkown
page execute and write copy
1297000
heap
page read and write
F74000
heap
page read and write
13D8000
heap
page read and write
5E14000
trusted library allocation
page read and write
131D000
heap
page read and write
5958000
trusted library allocation
page read and write
5000000
direct allocation
page read and write
5937000
trusted library allocation
page read and write
594E000
trusted library allocation
page read and write
F74000
heap
page read and write
44FF000
stack
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5E68000
trusted library allocation
page read and write
363E000
stack
page read and write
127D000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
78FE000
stack
page read and write
5E4E000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
1214000
heap
page read and write
5765000
trusted library allocation
page read and write
B1B000
unkown
page execute and write copy
5D3C000
trusted library allocation
page read and write
B02000
unkown
page execute and read and write
70E000
unkown
page execute and read and write
12A4000
heap
page read and write
5D3C000
trusted library allocation
page read and write
595B000
trusted library allocation
page read and write
12BB000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5E04000
trusted library allocation
page read and write
576E000
trusted library allocation
page read and write
5EED000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
12FF000
heap
page read and write
D38000
unkown
page execute and read and write
43FE000
stack
page read and write
5E20000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
59CE000
trusted library allocation
page read and write
F74000
heap
page read and write
596D000
trusted library allocation
page read and write
F74000
heap
page read and write
5F61000
trusted library allocation
page read and write
F74000
heap
page read and write
D0E000
unkown
page execute and read and write
A76000
unkown
page execute and read and write
5D39000
trusted library allocation
page read and write
10C4000
heap
page read and write
5979000
trusted library allocation
page read and write
CD9000
unkown
page execute and read and write
5946000
trusted library allocation
page read and write
8D6000
unkown
page execute and write copy
5958000
trusted library allocation
page read and write
4FE3000
trusted library allocation
page execute and read and write
B02000
unkown
page execute and write copy
5E05000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
592B000
trusted library allocation
page read and write
F74000
heap
page read and write
4EA0000
direct allocation
page read and write
5FC0000
trusted library allocation
page read and write
598E000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
103A000
heap
page read and write
F74000
heap
page read and write
5953000
trusted library allocation
page read and write
12A4000
heap
page read and write
5A59000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
5948000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
1214000
heap
page read and write
5766000
trusted library allocation
page read and write
F74000
heap
page read and write
CFE000
unkown
page execute and write copy
CAD000
unkown
page execute and read and write
5E5A000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
5D42000
trusted library allocation
page read and write
1311000
heap
page read and write
541E000
stack
page read and write
34DF000
stack
page read and write
5769000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
4911000
heap
page read and write
5950000
trusted library allocation
page read and write
12A4000
heap
page read and write
130E000
heap
page read and write
592F000
trusted library allocation
page read and write
59BD000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
1214000
heap
page read and write
5D39000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
2FFF000
stack
page read and write
5D31000
trusted library allocation
page read and write
1210000
heap
page read and write
C95000
unkown
page execute and write copy
5030000
direct allocation
page execute and read and write
F74000
heap
page read and write
5767000
trusted library allocation
page read and write
A31000
unkown
page execute and read and write
5D36000
trusted library allocation
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
12FF000
heap
page read and write
5E57000
trusted library allocation
page read and write
8CC000
unkown
page execute and write copy
592F000
trusted library allocation
page read and write
131D000
heap
page read and write
F74000
heap
page read and write
5D3A000
trusted library allocation
page read and write
5410000
remote allocation
page read and write
42DE000
stack
page read and write
5A21000
trusted library allocation
page read and write
1310000
heap
page read and write
5E28000
trusted library allocation
page read and write
D2E000
unkown
page execute and write copy
5930000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
133E000
stack
page read and write
1214000
heap
page read and write
1301000
heap
page read and write
5D41000
trusted library allocation
page read and write
1214000
heap
page read and write
5970000
trusted library allocation
page read and write
F74000
heap
page read and write
5EDD000
trusted library allocation
page read and write
F74000
heap
page read and write
47BE000
stack
page read and write
12D1000
heap
page read and write
4D90000
direct allocation
page read and write
B0A000
unkown
page execute and write copy
5D38000
trusted library allocation
page read and write
F74000
heap
page read and write
569E000
stack
page read and write
5978000
trusted library allocation
page read and write
F74000
heap
page read and write
AD3000
unkown
page execute and read and write
F74000
heap
page read and write
12A1000
heap
page read and write
4EA0000
direct allocation
page read and write
8CA000
unkown
page write copy
59B1000
trusted library allocation
page read and write
F74000
heap
page read and write
429E000
stack
page read and write
34BF000
stack
page read and write
2C1E000
stack
page read and write
77FE000
stack
page read and write
127B000
heap
page read and write
5E6E000
trusted library allocation
page read and write
5E6F000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
597E000
trusted library allocation
page read and write
A99000
unkown
page execute and read and write
F74000
heap
page read and write
F74000
heap
page read and write
594E000
trusted library allocation
page read and write
1317000
heap
page read and write
1214000
heap
page read and write
A8D000
unkown
page execute and read and write
596D000
trusted library allocation
page read and write
F74000
heap
page read and write
5B05000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
12FF000
heap
page read and write
5010000
direct allocation
page execute and read and write
5F03000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
4911000
heap
page read and write
5770000
trusted library allocation
page read and write
A73000
unkown
page execute and write copy
12B9000
heap
page read and write
5974000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
DAA000
unkown
page execute and write copy
CF9000
unkown
page execute and write copy
A9D000
unkown
page execute and read and write
5768000
trusted library allocation
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
4A00000
heap
page read and write
5996000
trusted library allocation
page read and write
465F000
stack
page read and write
5975000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
F74000
heap
page read and write
1317000
heap
page read and write
12B3000
heap
page read and write
1214000
heap
page read and write
4E90000
direct allocation
page read and write
F74000
heap
page read and write
12FF000
heap
page read and write
AEE000
unkown
page execute and write copy
595B000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
131D000
heap
page read and write
5150000
direct allocation
page execute and read and write
5D3A000
trusted library allocation
page read and write
F74000
heap
page read and write
5190000
direct allocation
page execute and read and write
1214000
heap
page read and write
453E000
stack
page read and write
5765000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
4A01000
heap
page read and write
5D30000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
618A000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
551F000
stack
page read and write
5E6C000
trusted library allocation
page read and write
5FCF000
trusted library allocation
page read and write
1214000
heap
page read and write
601000
unkown
page execute and write copy
CC8000
unkown
page execute and read and write
5937000
trusted library allocation
page read and write
5976000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
1214000
heap
page read and write
5E06000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
5FFE000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
10C4000
heap
page read and write
1214000
heap
page read and write
555E000
stack
page read and write
5E13000
trusted library allocation
page read and write
F74000
heap
page read and write
12BB000
heap
page read and write
5937000
trusted library allocation
page read and write
758E000
stack
page read and write
740C000
stack
page read and write
5E3A000
trusted library allocation
page read and write
2CE0000
direct allocation
page read and write
5D3F000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
1214000
heap
page read and write
5963000
trusted library allocation
page read and write
CEC000
unkown
page execute and write copy
B0C000
unkown
page execute and write copy
5950000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
39BF000
stack
page read and write
F74000
heap
page read and write
51C0000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
C96000
unkown
page execute and read and write
12BD000
heap
page read and write
597B000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
1297000
heap
page read and write
12FF000
heap
page read and write
12D1000
heap
page read and write
F74000
heap
page read and write
3FFF000
stack
page read and write
F74000
heap
page read and write
5766000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
3C9E000
stack
page read and write
5F1E000
trusted library allocation
page read and write
528F000
stack
page read and write
596D000
trusted library allocation
page read and write
F74000
heap
page read and write
1210000
direct allocation
page read and write
5A54000
trusted library allocation
page read and write
F74000
heap
page read and write
5D44000
trusted library allocation
page read and write
1214000
heap
page read and write
8D8000
unkown
page execute and write copy
1214000
heap
page read and write
5EE9000
trusted library allocation
page read and write
AC5000
unkown
page execute and read and write
593F000
trusted library allocation
page read and write
2CE0000
direct allocation
page read and write
5771000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
1214000
heap
page read and write
5E77000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
128B000
heap
page read and write
5D32000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
518E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
F74000
heap
page read and write
5991000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
F74000
heap
page read and write
595D000
trusted library allocation
page read and write
F90000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
4911000
heap
page read and write
F74000
heap
page read and write
4EA0000
direct allocation
page read and write
12FF000
stack
page read and write
5D36000
trusted library allocation
page read and write
479F000
stack
page read and write
F74000
heap
page read and write
5A22000
trusted library allocation
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5D3E000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
F74000
heap
page read and write
8F6000
unkown
page execute and write copy
5D40000
trusted library allocation
page read and write
1214000
heap
page read and write
2CE0000
direct allocation
page read and write
5975000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
1319000
heap
page read and write
532E000
stack
page read and write
5010000
direct allocation
page execute and read and write
5A51000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
AB9000
unkown
page execute and write copy
59CC000
trusted library allocation
page read and write
1214000
heap
page read and write
5E24000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
F74000
heap
page read and write
2C9E000
stack
page read and write
3EBF000
stack
page read and write
5767000
trusted library allocation
page read and write
5974000
trusted library allocation
page read and write
4911000
heap
page read and write
594C000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
12BB000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
595D000
trusted library allocation
page read and write
5F1C000
trusted library allocation
page read and write
E3C000
stack
page read and write
5D3D000
trusted library allocation
page read and write
F74000
heap
page read and write
5775000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
127B000
heap
page read and write
5AC0000
trusted library allocation
page read and write
F74000
heap
page read and write
B69000
unkown
page execute and write copy
F74000
heap
page read and write
5968000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
59BE000
trusted library allocation
page read and write
10C4000
heap
page read and write
629F000
trusted library allocation
page read and write
ACE000
unkown
page execute and write copy
2CE0000
direct allocation
page read and write
5D33000
trusted library allocation
page read and write
1214000
heap
page read and write
5D36000
trusted library allocation
page read and write
3EDF000
stack
page read and write
F74000
heap
page read and write
5D37000
trusted library allocation
page read and write
597C000
trusted library allocation
page read and write
5FF8000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
10C4000
heap
page read and write
5E0B000
trusted library allocation
page read and write
5ECE000
trusted library allocation
page read and write
F74000
heap
page read and write
59BE000
trusted library allocation
page read and write
131D000
heap
page read and write
A33000
unkown
page execute and write copy
5E3A000
trusted library allocation
page read and write
F74000
heap
page read and write
4D50000
trusted library allocation
page read and write
F74000
heap
page read and write
3F1E000
stack
page read and write
5760000
trusted library allocation
page read and write
49FF000
stack
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
2CF7000
heap
page read and write
CC7000
unkown
page execute and write copy
12A4000
heap
page read and write
5955000
trusted library allocation
page read and write
1214000
heap
page read and write
5765000
trusted library allocation
page read and write
34FE000
stack
page read and write
594C000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
5040000
direct allocation
page execute and read and write
5D32000
trusted library allocation
page read and write
1302000
heap
page read and write
1297000
heap
page read and write
F74000
heap
page read and write
DA1000
unkown
page execute and write copy
12C2000
heap
page read and write
F74000
heap
page read and write
59A4000
trusted library allocation
page read and write
CB2000
unkown
page execute and read and write
595B000
trusted library allocation
page read and write
F74000
heap
page read and write
5769000
trusted library allocation
page read and write
2CE0000
direct allocation
page read and write
5976000
trusted library allocation
page read and write
ADC000
unkown
page execute and read and write
351E000
stack
page read and write
F74000
heap
page read and write
12AC000
heap
page read and write
4A5E000
stack
page read and write
1214000
heap
page read and write
10C4000
heap
page read and write
12D1000
heap
page read and write
1210000
direct allocation
page read and write
F74000
heap
page read and write
325F000
stack
page read and write
AE0000
unkown
page execute and read and write
4B5F000
stack
page read and write
5E3C000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
5DFE000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
5949000
trusted library allocation
page read and write
1214000
heap
page read and write
39DF000
stack
page read and write
5410000
remote allocation
page read and write
5E01000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
47DE000
stack
page read and write
59A5000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
B15000
unkown
page execute and read and write
F74000
heap
page read and write
12FF000
heap
page read and write
1214000
heap
page read and write
12D1000
heap
page read and write
A8F000
unkown
page execute and write copy
5160000
heap
page read and write
427F000
stack
page read and write
5996000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
5E15000
trusted library allocation
page read and write
F74000
heap
page read and write
12D1000
heap
page read and write
5D37000
trusted library allocation
page read and write
10C4000
heap
page read and write
1214000
heap
page read and write
594A000
trusted library allocation
page read and write
F74000
heap
page read and write
5DFC000
trusted library allocation
page read and write
1214000
heap
page read and write
5949000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
1320000
heap
page read and write
5DEE000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
2C5B000
stack
page read and write
1214000
heap
page read and write
313E000
stack
page read and write
CAC000
unkown
page execute and write copy
3B5E000
stack
page read and write
1214000
heap
page read and write
491E000
stack
page read and write
12FF000
heap
page read and write
5D3E000
trusted library allocation
page read and write
4911000
heap
page read and write
131F000
stack
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
5A45000
trusted library allocation
page read and write
10C4000
heap
page read and write
D63000
unkown
page execute and read and write
5E56000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
503C000
stack
page read and write
4EA0000
direct allocation
page read and write
1082000
heap
page read and write
1214000
heap
page read and write
599B000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
F74000
heap
page read and write
5B95000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
F74000
heap
page read and write
4EB0000
heap
page read and write
1210000
direct allocation
page read and write
DB8000
unkown
page execute and read and write
5E80000
trusted library allocation
page read and write
4911000
heap
page read and write
B57000
unkown
page execute and write copy
F74000
heap
page read and write
135E000
stack
page read and write
F74000
heap
page read and write
B62000
unkown
page execute and write copy
4911000
heap
page read and write
5989000
trusted library allocation
page read and write
1314000
heap
page read and write
5F09000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
B79000
unkown
page execute and write copy
576C000
trusted library allocation
page read and write
F74000
heap
page read and write
5D38000
trusted library allocation
page read and write
2D6E000
stack
page read and write
576A000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
4DD2000
direct allocation
page read and write
5D34000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
12BD000
heap
page read and write
5020000
direct allocation
page execute and read and write
C72000
unkown
page execute and write copy
596D000
trusted library allocation
page read and write
5764000
trusted library allocation
page read and write
1282000
heap
page read and write
F74000
heap
page read and write
2CE0000
direct allocation
page read and write
5A39000
trusted library allocation
page read and write
5FFA000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
379E000
stack
page read and write
F74000
heap
page read and write
CAE000
unkown
page execute and write copy
594B000
trusted library allocation
page read and write
12FF000
heap
page read and write
10C4000
heap
page read and write
5941000
trusted library allocation
page read and write
10C4000
heap
page read and write
5D33000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1321000
heap
page read and write
4F10000
direct allocation
page execute and read and write
5E53000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
C70000
unkown
page execute and read and write
F74000
heap
page read and write
127D000
heap
page read and write
596F000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
5F3D000
trusted library allocation
page read and write
A89000
unkown
page execute and write copy
F74000
heap
page read and write
12B9000
heap
page read and write
576F000
trusted library allocation
page read and write
595B000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
4ECC000
stack
page read and write
339F000
stack
page read and write
5D36000
trusted library allocation
page read and write
2CF0000
heap
page read and write
5956000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
1326000
heap
page read and write
5E00000
trusted library allocation
page read and write
3EFE000
stack
page read and write
5D37000
trusted library allocation
page read and write
A5F000
unkown
page execute and write copy
2EAC000
stack
page read and write
5D3A000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
B64000
unkown
page execute and write copy
1099000
heap
page read and write
5768000
trusted library allocation
page read and write
8CC000
unkown
page execute and read and write
42BE000
stack
page read and write
576D000
trusted library allocation
page read and write
F74000
heap
page read and write
5ACD000
trusted library allocation
page read and write
F74000
heap
page read and write
4911000
heap
page read and write
5947000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5D30000
trusted library allocation
page read and write
F70000
heap
page read and write
5940000
trusted library allocation
page read and write
B62000
unkown
page execute and write copy
5E1E000
trusted library allocation
page read and write
5971000
trusted library allocation
page read and write
F74000
heap
page read and write
F74000
heap
page read and write
2EF0000
direct allocation
page read and write
513E000
stack
page read and write
B78000
unkown
page execute and read and write
5AC8000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
F74000
heap
page read and write
5940000
trusted library allocation
page read and write
F74000
heap
page read and write
1214000
heap
page read and write
F74000
heap
page read and write
593F000
trusted library allocation
page read and write
130E000
heap
page read and write
5E47000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
ADB000
unkown
page execute and write copy
F74000
heap
page read and write
5E15000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
5D35000
trusted library allocation
page read and write
515A000
trusted library allocation
page execute and read and write
5A26000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
There are 1494 hidden memdumps, click here to show them.