IOC Report
Bire1g8ahY.exe

loading gif

Files

File Path
Type
Category
Malicious
Bire1g8ahY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\1I4F16VK8DFW90DXD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4830TYWIJQ5SCGDL2FZPZJN92URB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4830TYWIJQ5SCGDL2FZPZJN92URB.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Bire1g8ahY.exe
"C:\Users\user\Desktop\Bire1g8ahY.exe"
malicious
C:\Users\user\AppData\Local\Temp\4830TYWIJQ5SCGDL2FZPZJN92URB.exe
"C:\Users\user~1\AppData\Local\Temp\4830TYWIJQ5SCGDL2FZPZJN92URB.exe"
malicious
C:\Users\user\AppData\Local\Temp\1I4F16VK8DFW90DXD.exe
"C:\Users\user~1\AppData\Local\Temp\1I4F16VK8DFW90DXD.exe"
malicious

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
http://185.215.113.206/c4becf79229cb002.php/RP
unknown
https://lev-tolstoi.com/x
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://lev-tolstoi.com/t
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
aspecteirs.lat
http://185.215.113.206/ws
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
https://community.fastly.steamstaticp
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
http://store.steampowered.com
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://community.fastly.steamstatic.com/
unknown
https://steam.tv/
unknown
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://lev-tolstoi.com/2U
unknown
https://lev-tolstoi.com/piHt
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://185.215.113.206a
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
http://185.215.113.206/MP
unknown
http://185.215.113.206/c4becf79229cb002.phpZm
unknown
https://lev-tolstoi.com/api
172.67.157.254
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.16/off/def.exe3
unknown
http://185.215.113.16/off/def.exe
unknown
http://185.215.113.16/off/def.exe.
unknown
grannyejh.lat
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://lev-tolstoi.com/es
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
http://185.215.113.206/c4becf79229cb002.phpj
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://lev-tolstoi.com/apiy
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
http://185.215.113.16/steam/random.exeoot
unknown
crosshuaht.lat
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
lev-tolstoi.com
172.67.157.254
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
necklacebudi.lat
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
172.67.157.254
lev-tolstoi.com
United States
104.102.49.254
steamcommunity.com
United States
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
9AE000
heap
page read and write
malicious
C1000
unkown
page execute and read and write
malicious
48C0000
direct allocation
page read and write
malicious
B64000
heap
page read and write
5AE0000
trusted library allocation
page read and write
4A0000
unkown
page execute and write copy
28BF000
stack
page read and write
5ACE000
trusted library allocation
page read and write
6064000
trusted library allocation
page read and write
B87000
unkown
page execute and write copy
B64000
heap
page read and write
5B2D000
trusted library allocation
page read and write
480000
unkown
page execute and read and write
600F000
trusted library allocation
page read and write
B64000
heap
page read and write
5B14000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
905000
unkown
page execute and read and write
31FE000
stack
page read and write
5AFF000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
6066000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
12F6000
heap
page read and write
4E9000
unkown
page execute and write copy
5F52000
trusted library allocation
page read and write
4A51000
heap
page read and write
A07000
heap
page read and write
5AB8000
trusted library allocation
page read and write
1340000
heap
page read and write
5020000
direct allocation
page execute and read and write
607B000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
B07000
unkown
page execute and write copy
5F5A000
trusted library allocation
page read and write
4F12000
direct allocation
page read and write
469D000
trusted library allocation
page execute and read and write
AF1000
unkown
page execute and write copy
130A000
heap
page read and write
12D9000
heap
page read and write
5AC7000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
12F9000
heap
page read and write
A73000
unkown
page execute and write copy
4540000
heap
page read and write
5B21000
trusted library allocation
page read and write
A5A000
unkown
page execute and write copy
5ABE000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
656000
heap
page read and write
529000
unkown
page execute and read and write
496000
unkown
page execute and write copy
5010000
remote allocation
page read and write
5020000
direct allocation
page execute and read and write
5B23000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
A74000
unkown
page execute and read and write
B50000
direct allocation
page read and write
8DB000
stack
page read and write
1240000
direct allocation
page read and write
3E3E000
stack
page read and write
B64000
heap
page read and write
60BB000
trusted library allocation
page read and write
12ED000
heap
page read and write
5F5C000
trusted library allocation
page read and write
B64000
heap
page read and write
5B2E000
trusted library allocation
page read and write
12F9000
heap
page read and write
5AC7000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
134C000
heap
page read and write
25B7000
heap
page read and write
5C7D000
trusted library allocation
page read and write
61D5000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
2DFE000
stack
page read and write
904000
unkown
page execute and write copy
4BB000
unkown
page execute and read and write
8F0000
unkown
page readonly
5F5C000
trusted library allocation
page read and write
1358000
heap
page read and write
5ADA000
trusted library allocation
page read and write
488E000
stack
page read and write
83C000
stack
page read and write
B1E000
stack
page read and write
12F6000
heap
page read and write
2560000
direct allocation
page read and write
5F5B000
trusted library allocation
page read and write
B40000
heap
page read and write
3A3F000
stack
page read and write
600A000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
31BE000
stack
page read and write
4A10000
direct allocation
page execute and read and write
AAF000
unkown
page execute and write copy
5AC5000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
5AF2000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
566000
unkown
page execute and read and write
5F5E000
trusted library allocation
page read and write
1347000
heap
page read and write
5AE0000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
307F000
stack
page read and write
B87000
unkown
page execute and write copy
343E000
stack
page read and write
9AA000
heap
page read and write
5F54000
trusted library allocation
page read and write
4FD000
unkown
page execute and read and write
5B21000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
6145000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
255E000
stack
page read and write
5F53000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
46A4000
trusted library allocation
page read and write
12D9000
heap
page read and write
B0B000
unkown
page execute and write copy
5F54000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
B64000
heap
page read and write
760000
heap
page read and write
6D90000
heap
page execute and read and write
60DD000
trusted library allocation
page read and write
B64000
heap
page read and write
4A51000
heap
page read and write
5AA6000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
4561000
heap
page read and write
5F5C000
trusted library allocation
page read and write
5C75000
trusted library allocation
page read and write
61AD000
trusted library allocation
page read and write
B64000
heap
page read and write
5F51000
trusted library allocation
page read and write
347E000
stack
page read and write
4450000
heap
page read and write
38FF000
stack
page read and write
5AC7000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
6084000
trusted library allocation
page read and write
89E000
stack
page read and write
6080000
trusted library allocation
page read and write
4561000
heap
page read and write
4A40000
direct allocation
page execute and read and write
4561000
heap
page read and write
B64000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
7A4000
heap
page read and write
5F57000
trusted library allocation
page read and write
130A000
heap
page read and write
AD3000
unkown
page execute and write copy
60E000
stack
page read and write
36FE000
stack
page read and write
4A51000
heap
page read and write
B50000
direct allocation
page read and write
5F5C000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
B64000
heap
page read and write
60AD000
trusted library allocation
page read and write
599000
unkown
page execute and write copy
1347000
heap
page read and write
4840000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
4BA000
unkown
page execute and write copy
5BA6000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
5F5F000
trusted library allocation
page read and write
549000
unkown
page execute and write copy
5ACE000
trusted library allocation
page read and write
494000
unkown
page execute and read and write
5AB0000
trusted library allocation
page read and write
606A000
trusted library allocation
page read and write
3DFF000
stack
page read and write
307E000
stack
page read and write
5DA5000
trusted library allocation
page read and write
606A000
trusted library allocation
page read and write
6019000
trusted library allocation
page read and write
2F3E000
stack
page read and write
B64000
heap
page read and write
4A51000
heap
page read and write
5F59000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
12FA000
heap
page read and write
B64000
heap
page read and write
5BA1000
trusted library allocation
page read and write
B64000
heap
page read and write
6059000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
4A51000
heap
page read and write
5AF6000
trusted library allocation
page read and write
6205000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
3E7E000
stack
page read and write
5F54000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
12E2000
heap
page read and write
12E9000
heap
page read and write
4A5000
unkown
page execute and read and write
497000
unkown
page execute and read and write
28FF000
stack
page read and write
5F60000
trusted library allocation
page read and write
357F000
stack
page read and write
5AED000
trusted library allocation
page read and write
16F000
unkown
page execute and read and write
5DAA000
trusted library allocation
page read and write
4A51000
heap
page read and write
5ADA000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
5F60000
trusted library allocation
page read and write
383D000
stack
page read and write
B64000
heap
page read and write
5ADD000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5B46000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
B64000
heap
page read and write
5AA2000
trusted library allocation
page read and write
6049000
trusted library allocation
page read and write
4561000
heap
page read and write
5B24000
trusted library allocation
page read and write
601F000
trusted library allocation
page read and write
12E2000
heap
page read and write
5F53000
trusted library allocation
page read and write
2F3F000
stack
page read and write
5B16000
trusted library allocation
page read and write
5AF2000
trusted library allocation
page read and write
12E9000
heap
page read and write
617D000
trusted library allocation
page read and write
2DFF000
stack
page read and write
B64000
heap
page read and write
4561000
heap
page read and write
5F63000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
293E000
stack
page read and write
AE1000
unkown
page execute and write copy
5A45000
trusted library allocation
page read and write
6009000
trusted library allocation
page read and write
1260000
direct allocation
page execute and read and write
4900000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
600B000
trusted library allocation
page read and write
7B4000
heap
page read and write
609F000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
6003000
trusted library allocation
page read and write
6496000
trusted library allocation
page read and write
12FA000
heap
page read and write
5F57000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
B64000
heap
page read and write
5F56000
trusted library allocation
page read and write
5F5F000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
48D0000
heap
page execute and read and write
B7F000
unkown
page execute and write copy
5DA6000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
6076000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
4540000
trusted library allocation
page read and write
630000
heap
page read and write
6BBD000
stack
page read and write
5F5E000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
5F5F000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
4A51000
heap
page read and write
5F5F000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
5AFB000
trusted library allocation
page read and write
9A0000
heap
page read and write
1341000
heap
page read and write
5010000
remote allocation
page read and write
617F000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
2A3F000
stack
page read and write
6209000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
6097000
trusted library allocation
page read and write
6011000
trusted library allocation
page read and write
48C0000
direct allocation
page read and write
5020000
direct allocation
page execute and read and write
B64000
heap
page read and write
25B0000
heap
page read and write
5ABB000
trusted library allocation
page read and write
4A51000
heap
page read and write
5AA4000
trusted library allocation
page read and write
76A000
heap
page read and write
5F57000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
12DB000
heap
page read and write
5F56000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
6F9E000
stack
page read and write
2560000
direct allocation
page read and write
5ADC000
trusted library allocation
page read and write
48FC000
stack
page read and write
990000
unkown
page readonly
B64000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
156000
unkown
page execute and read and write
60A4000
trusted library allocation
page read and write
4A1E000
stack
page read and write
B12000
unkown
page execute and read and write
B64000
heap
page read and write
5ACA000
trusted library allocation
page read and write
4441000
heap
page read and write
5F5C000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
12F9000
heap
page read and write
6009000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
8F2000
unkown
page execute and read and write
5BA2000
trusted library allocation
page read and write
B64000
heap
page read and write
B32000
unkown
page execute and write copy
5AB0000
trusted library allocation
page read and write
7C1000
heap
page read and write
A7C000
unkown
page execute and write copy
4A50000
direct allocation
page execute and read and write
603E000
trusted library allocation
page read and write
4E3E000
stack
page read and write
3ABE000
stack
page read and write
1240000
direct allocation
page read and write
133B000
heap
page read and write
2F8000
unkown
page execute and read and write
5AED000
trusted library allocation
page read and write
788000
heap
page read and write
6004000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
31BF000
stack
page read and write
4F9000
stack
page read and write
12D9000
heap
page read and write
4B50000
trusted library allocation
page read and write
B64000
heap
page read and write
B42000
unkown
page execute and read and write
12E2000
heap
page read and write
6070000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
8FA000
unkown
page execute and write copy
5F55000
trusted library allocation
page read and write
41BF000
stack
page read and write
6049000
trusted library allocation
page read and write
132F000
heap
page read and write
5B49000
trusted library allocation
page read and write
B23000
unkown
page execute and read and write
B50000
direct allocation
page read and write
5ACA000
trusted library allocation
page read and write
6088000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
4A51000
heap
page read and write
46A000
unkown
page execute and read and write
1347000
heap
page read and write
5ACE000
trusted library allocation
page read and write
5F57000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
A87000
unkown
page execute and write copy
B34000
unkown
page execute and read and write
5AB1000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
B64000
heap
page read and write
F70000
direct allocation
page read and write
5AD5000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
609E000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
6055000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
2A7E000
stack
page read and write
3E3F000
stack
page read and write
5B5E000
trusted library allocation
page read and write
4A51000
heap
page read and write
B64000
heap
page read and write
5AE0000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
B50000
direct allocation
page read and write
B64000
heap
page read and write
AD2000
unkown
page execute and read and write
5F58000
trusted library allocation
page read and write
591000
unkown
page execute and read and write
5F5E000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
B64000
heap
page read and write
5ACE000
trusted library allocation
page read and write
5F51000
trusted library allocation
page read and write
33FF000
stack
page read and write
6091000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
1343000
heap
page read and write
5F65000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
6020000
trusted library allocation
page read and write
601C000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
4CD000
unkown
page execute and write copy
603C000
trusted library allocation
page read and write
B64000
heap
page read and write
4840000
direct allocation
page execute and read and write
906000
unkown
page execute and write copy
5DA9000
trusted library allocation
page read and write
4561000
heap
page read and write
4561000
heap
page read and write
5F5E000
trusted library allocation
page read and write
3A7F000
stack
page read and write
6040000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
614B000
trusted library allocation
page read and write
5BA7000
trusted library allocation
page read and write
3BBF000
stack
page read and write
32FE000
stack
page read and write
2570000
heap
page read and write
132F000
heap
page read and write
5F58000
trusted library allocation
page read and write
60B7000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
343F000
stack
page read and write
5AA6000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
B64000
heap
page read and write
5F59000
trusted library allocation
page read and write
B64000
heap
page read and write
4561000
heap
page read and write
B7E000
unkown
page execute and read and write
50B000
unkown
page execute and write copy
1362000
heap
page read and write
B1A000
unkown
page execute and write copy
303F000
stack
page read and write
5F59000
trusted library allocation
page read and write
600B000
trusted library allocation
page read and write
5F54000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
76E000
heap
page read and write
6094000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
36BF000
stack
page read and write
4561000
heap
page read and write
B64000
heap
page read and write
4A4E000
stack
page read and write
6D7E000
stack
page read and write
6002000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
37FF000
stack
page read and write
5DAE000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
30C000
unkown
page execute and read and write
5AC2000
trusted library allocation
page read and write
B64000
heap
page read and write
60B5000
trusted library allocation
page read and write
603E000
trusted library allocation
page read and write
B64000
heap
page read and write
5B35000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
B64000
heap
page read and write
5F5D000
trusted library allocation
page read and write
134C000
heap
page read and write
46C0000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
582000
unkown
page execute and write copy
C0000
unkown
page read and write
2F7E000
stack
page read and write
5010000
remote allocation
page read and write
6072000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
12ED000
heap
page read and write
60CB000
trusted library allocation
page read and write
4441000
heap
page read and write
5B37000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
B64000
heap
page read and write
5AE6000
trusted library allocation
page read and write
B64000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5010000
direct allocation
page execute and read and write
6092000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
6BFE000
stack
page read and write
4560000
heap
page read and write
36BE000
stack
page read and write
5AF0000
trusted library allocation
page read and write
6044000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
B64000
heap
page read and write
5A6000
unkown
page execute and write copy
604B000
trusted library allocation
page read and write
606E000
trusted library allocation
page read and write
1350000
heap
page read and write
607E000
trusted library allocation
page read and write
397E000
stack
page read and write
28FE000
stack
page read and write
61F1000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
12F6000
heap
page read and write
1250000
direct allocation
page execute and read and write
26BE000
stack
page read and write
5DA3000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4561000
heap
page read and write
12ED000
heap
page read and write
6024000
trusted library allocation
page read and write
C97000
unkown
page execute and write copy
4561000
heap
page read and write
5ACE000
trusted library allocation
page read and write
AF5000
unkown
page execute and read and write
5B1F000
trusted library allocation
page read and write
48CC000
stack
page read and write
4CAF000
stack
page read and write
60DF000
trusted library allocation
page read and write
B0A000
unkown
page execute and read and write
5F57000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
609C000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
5B42000
trusted library allocation
page read and write
A16000
heap
page read and write
B50000
direct allocation
page read and write
B96000
unkown
page execute and write copy
2560000
direct allocation
page read and write
5AE0000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
3D3E000
stack
page read and write
B64000
heap
page read and write
B50000
direct allocation
page read and write
5ABF000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
2BBE000
stack
page read and write
B64000
heap
page read and write
5ACE000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
5F58000
trusted library allocation
page read and write
4A51000
heap
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
259C000
stack
page read and write
5F56000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
B64000
heap
page read and write
5F5B000
trusted library allocation
page read and write
8F2000
unkown
page execute and write copy
4B6F000
stack
page read and write
48F0000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
B64000
heap
page read and write
407F000
stack
page read and write
12ED000
heap
page read and write
11C000
stack
page read and write
6035000
trusted library allocation
page read and write
4DEF000
stack
page read and write
1FE000
stack
page read and write
4A51000
heap
page read and write
5AD5000
trusted library allocation
page read and write
1362000
heap
page read and write
5B1E000
trusted library allocation
page read and write
60EE000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
4BAE000
stack
page read and write
5ABE000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
B64000
heap
page read and write
6057000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
5ACE000
trusted library allocation
page read and write
B64000
heap
page read and write
251E000
stack
page read and write
134C000
heap
page read and write
5DA1000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
B64000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
B64000
heap
page read and write
5DA7000
trusted library allocation
page read and write
502000
unkown
page execute and read and write
5DB0000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
4FE000
unkown
page execute and write copy
5C85000
trusted library allocation
page read and write
60FF000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
61D1000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
46C000
unkown
page execute and write copy
3CFF000
stack
page read and write
3F3F000
stack
page read and write
61B1000
trusted library allocation
page read and write
5F52000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
592000
unkown
page execute and write copy
5F57000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
B98000
unkown
page execute and write copy
5AB8000
trusted library allocation
page read and write
B64000
heap
page read and write
F70000
direct allocation
page read and write
29FF000
stack
page read and write
5F58000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
27BF000
stack
page read and write
12F6000
heap
page read and write
7A2000
heap
page read and write
5F61000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5ABE000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
93E000
stack
page read and write
5BA6000
trusted library allocation
page read and write
2CBF000
stack
page read and write
604C000
trusted library allocation
page read and write
37BF000
stack
page read and write
5B18000
trusted library allocation
page read and write
75F000
stack
page read and write
3BFE000
stack
page read and write
4A40000
direct allocation
page execute and read and write
B64000
heap
page read and write
521000
unkown
page execute and write copy
5B12000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
3BBE000
stack
page read and write
5AA1000
trusted library allocation
page read and write
B64000
heap
page read and write
393E000
stack
page read and write
AB0000
heap
page read and write
5B0C000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
6084000
trusted library allocation
page read and write
B64000
heap
page read and write
5AFE000
trusted library allocation
page read and write
5F52000
trusted library allocation
page read and write
9E2000
unkown
page write copy
5ACE000
trusted library allocation
page read and write
C9F000
stack
page read and write
4561000
heap
page read and write
1341000
heap
page read and write
5ADF000
trusted library allocation
page read and write
638B000
trusted library allocation
page read and write
601B000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
6096000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
B64000
heap
page read and write
5ACE000
trusted library allocation
page read and write
4A51000
heap
page read and write
5DAB000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
48E0000
trusted library allocation
page execute and read and write
B64000
heap
page read and write
F70000
direct allocation
page read and write
5F58000
trusted library allocation
page read and write
6098000
trusted library allocation
page read and write
443F000
stack
page read and write
5F54000
trusted library allocation
page read and write
5F62000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
AD5000
unkown
page execute and read and write
41FE000
stack
page read and write
601E000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
5F54000
trusted library allocation
page read and write
604F000
trusted library allocation
page read and write
12E9000
heap
page read and write
5F61000
trusted library allocation
page read and write
8F6000
unkown
page write copy
4FA000
unkown
page execute and write copy
4A51000
heap
page read and write
46E0000
heap
page read and write
5F5A000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
4F3F000
stack
page read and write
318000
unkown
page execute and write copy
B64000
heap
page read and write
5ACA000
trusted library allocation
page read and write
5AAA000
trusted library allocation
page read and write
1309000
heap
page read and write
2560000
direct allocation
page read and write
5F56000
trusted library allocation
page read and write
B41000
unkown
page execute and write copy
51BC000
stack
page read and write
5AA2000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
483000
unkown
page execute and read and write
B50000
direct allocation
page read and write
4441000
heap
page read and write
2560000
direct allocation
page read and write
F70000
direct allocation
page read and write
611D000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
49FF000
stack
page read and write
5ABF000
trusted library allocation
page read and write
650000
heap
page read and write
5F5A000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
4570000
heap
page read and write
6123000
trusted library allocation
page read and write
367F000
stack
page read and write
2B3F000
stack
page read and write
B7D000
unkown
page execute and write copy
5020000
direct allocation
page execute and read and write
601A000
trusted library allocation
page read and write
3CBF000
stack
page read and write
C0000
unkown
page readonly
5ACA000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
353F000
stack
page read and write
B64000
heap
page read and write
5AD5000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
12D9000
heap
page read and write
12D9000
heap
page read and write
5ACA000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
B64000
heap
page read and write
B1C000
unkown
page execute and write copy
607B000
trusted library allocation
page read and write
30A000
unkown
page write copy
5B25000
trusted library allocation
page read and write
590000
unkown
page execute and write copy
32FF000
stack
page read and write
5A24000
trusted library allocation
page read and write
B64000
heap
page read and write
51C0000
heap
page read and write
5F58000
trusted library allocation
page read and write
6CFF000
stack
page read and write
5AA1000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
35BE000
stack
page read and write
12FA000
heap
page read and write
48C0000
direct allocation
page read and write
5B00000
trusted library allocation
page read and write
519000
unkown
page execute and write copy
B64000
heap
page read and write
4EE000
unkown
page execute and read and write
5F5A000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5ABB000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
991000
unkown
page execute and write copy
603B000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
3A7D000
stack
page read and write
5AC5000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
B64000
heap
page read and write
F70000
direct allocation
page read and write
5BC5000
trusted library allocation
page read and write
4440000
heap
page read and write
5B0A000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
6059000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
604A000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
40BE000
stack
page read and write
B64000
heap
page read and write
5AE7000
trusted library allocation
page read and write
2E3E000
stack
page read and write
5F53000
trusted library allocation
page read and write
B64000
heap
page read and write
5F62000
trusted library allocation
page read and write
4A51000
heap
page read and write
77F000
heap
page read and write
60A2000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
48D000
unkown
page execute and read and write
5AF0000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
2DBF000
stack
page read and write
5B36000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
267F000
stack
page read and write
607A000
trusted library allocation
page read and write
46DB000
trusted library allocation
page execute and read and write
5F57000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
4D0000
unkown
page execute and read and write
B50000
direct allocation
page read and write
6006000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
46B0000
direct allocation
page read and write
5B66000
trusted library allocation
page read and write
606A000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
6D3E000
stack
page read and write
4A51000
heap
page read and write
6093000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
5AA4000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5AFA000
trusted library allocation
page read and write
46D7000
trusted library allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
5ACA000
trusted library allocation
page read and write
AA0000
heap
page read and write
25BB000
heap
page read and write
5AD5000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
4561000
heap
page read and write
B64000
heap
page read and write
5B00000
trusted library allocation
page read and write
60E3000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
608E000
trusted library allocation
page read and write
4561000
heap
page read and write
F70000
direct allocation
page read and write
53B000
unkown
page execute and write copy
6031000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5DB4000
trusted library allocation
page read and write
4680000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
2577000
heap
page read and write
5F51000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
8FA000
unkown
page execute and read and write
46CA000
trusted library allocation
page execute and read and write
A99000
unkown
page execute and read and write
599000
unkown
page execute and write copy
5F64000
trusted library allocation
page read and write
3F7E000
stack
page read and write
5ADE000
trusted library allocation
page read and write
8F0000
unkown
page read and write
5DA9000
trusted library allocation
page read and write
3B7F000
stack
page read and write
4910000
heap
page read and write
5F62000
trusted library allocation
page read and write
B64000
heap
page read and write
40BF000
stack
page read and write
5B00000
trusted library allocation
page read and write
609B000
trusted library allocation
page read and write
B64000
heap
page read and write
5F55000
trusted library allocation
page read and write
4F7D000
stack
page read and write
4A51000
heap
page read and write
935000
stack
page read and write
5AE0000
trusted library allocation
page read and write
60AF000
trusted library allocation
page read and write
492000
unkown
page execute and write copy
B98000
unkown
page execute and write copy
5AC7000
trusted library allocation
page read and write
5F62000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5B26000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
AEB000
unkown
page execute and write copy
B64000
heap
page read and write
2560000
direct allocation
page read and write
4CC000
unkown
page execute and read and write
4561000
heap
page read and write
5AE4000
trusted library allocation
page read and write
40FE000
stack
page read and write
1346000
heap
page read and write
5ADF000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
433E000
stack
page read and write
4A51000
heap
page read and write
520000
unkown
page execute and read and write
5F5D000
trusted library allocation
page read and write
609C000
trusted library allocation
page read and write
B64000
heap
page read and write
12F6000
heap
page read and write
133C000
heap
page read and write
5F5B000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
D3F000
stack
page read and write
5AC3000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
2CBE000
stack
page read and write
B64000
heap
page read and write
12ED000
heap
page read and write
5F58000
trusted library allocation
page read and write
9F4000
heap
page read and write
3CFE000
stack
page read and write
5DA8000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
27BF000
stack
page read and write
2B7E000
stack
page read and write
5ABE000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
6203000
trusted library allocation
page read and write
41FF000
stack
page read and write
4561000
heap
page read and write
50F000
unkown
page execute and read and write
B64000
heap
page read and write
5B14000
trusted library allocation
page read and write
B64000
heap
page read and write
3FBE000
stack
page read and write
5AE3000
trusted library allocation
page read and write
30A000
unkown
page write copy
AC0000
unkown
page execute and read and write
5AD6000
trusted library allocation
page read and write
12ED000
heap
page read and write
64A3000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
A20000
heap
page read and write
333E000
stack
page read and write
B64000
heap
page read and write
133E000
heap
page read and write
5AA5000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
60B3000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
4561000
heap
page read and write
6132000
trusted library allocation
page read and write
2B7F000
stack
page read and write
C1000
unkown
page execute and write copy
61CF000
trusted library allocation
page read and write
A7D000
unkown
page execute and read and write
5B18000
trusted library allocation
page read and write
4561000
heap
page read and write
A32000
heap
page read and write
60A6000
trusted library allocation
page read and write
2EFF000
stack
page read and write
32BF000
stack
page read and write
5F55000
trusted library allocation
page read and write
5F57000
trusted library allocation
page read and write
604B000
trusted library allocation
page read and write
4561000
heap
page read and write
5B09000
trusted library allocation
page read and write
5F61000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
4A21000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5ACE000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
5B36000
trusted library allocation
page read and write
4460000
heap
page read and write
F70000
direct allocation
page read and write
4693000
trusted library allocation
page execute and read and write
B64000
heap
page read and write
5AA2000
trusted library allocation
page read and write
6103000
trusted library allocation
page read and write
2A3E000
stack
page read and write
46B0000
direct allocation
page read and write
5DA9000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
612E000
trusted library allocation
page read and write
6068000
trusted library allocation
page read and write
4452000
heap
page read and write
6183000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
600A000
trusted library allocation
page read and write
A72000
unkown
page execute and read and write
602D000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
6E9E000
stack
page read and write
B64000
heap
page read and write
5DAF000
trusted library allocation
page read and write
5F61000
trusted library allocation
page read and write
48D000
unkown
page execute and write copy
54B000
unkown
page execute and read and write
4BC000
unkown
page execute and write copy
5AB1000
trusted library allocation
page read and write
B1B000
unkown
page execute and read and write
12E2000
heap
page read and write
F70000
direct allocation
page read and write
1333000
heap
page read and write
12E2000
heap
page read and write
37FE000
stack
page read and write
B96000
unkown
page execute and read and write
1340000
heap
page read and write
6005000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
4CEE000
stack
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
AEA000
unkown
page execute and read and write
5B00000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
AF0000
unkown
page execute and read and write
5AF4000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
585000
unkown
page execute and write copy
6082000
trusted library allocation
page read and write
61AB000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
B64000
heap
page read and write
5F52000
trusted library allocation
page read and write
53E000
unkown
page execute and read and write
B64000
heap
page read and write
B38000
unkown
page execute and read and write
B64000
heap
page read and write
60FD000
trusted library allocation
page read and write
12F9000
heap
page read and write
1340000
heap
page read and write
507D000
stack
page read and write
50BD000
stack
page read and write
B64000
heap
page read and write
5AB9000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
4A51000
heap
page read and write
612C000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
2560000
direct allocation
page read and write
B64000
heap
page read and write
606C000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
12ED000
heap
page read and write
472C000
stack
page read and write
6141000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
604F000
trusted library allocation
page read and write
482F000
stack
page read and write
5ABE000
trusted library allocation
page read and write
601F000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
4441000
heap
page read and write
6099000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
B64000
heap
page read and write
590000
unkown
page execute and write copy
5AEC000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
30C000
unkown
page execute and write copy
46C0000
direct allocation
page execute and read and write
46D0000
trusted library allocation
page read and write
A57000
unkown
page execute and read and write
B64000
heap
page read and write
5F5A000
trusted library allocation
page read and write
12FA000
heap
page read and write
5A7000
unkown
page execute and write copy
5AB0000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
4441000
heap
page read and write
317F000
stack
page read and write
5AC4000
trusted library allocation
page read and write
393F000
stack
page read and write
605D000
trusted library allocation
page read and write
2540000
direct allocation
page read and write
5B1E000
trusted library allocation
page read and write
14E000
unkown
page execute and read and write
B64000
heap
page read and write
5AE9000
trusted library allocation
page read and write
B64000
heap
page read and write
ACE000
unkown
page execute and write copy
253F000
stack
page read and write
5020000
direct allocation
page execute and read and write
481000
unkown
page execute and write copy
B64000
heap
page read and write
4460000
heap
page read and write
6057000
trusted library allocation
page read and write
5BFD000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
B64000
heap
page read and write
B64000
heap
page read and write
12ED000
heap
page read and write
B64000
heap
page read and write
6090000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
27FE000
stack
page read and write
B64000
heap
page read and write
6021000
trusted library allocation
page read and write
2CFE000
stack
page read and write
615D000
trusted library allocation
page read and write
133B000
heap
page read and write
6096000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
4694000
trusted library allocation
page read and write
190000
heap
page read and write
5B34000
trusted library allocation
page read and write
26BE000
stack
page read and write
5F5F000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
6024000
trusted library allocation
page read and write
2560000
direct allocation
page read and write
4A51000
heap
page read and write
5F59000
trusted library allocation
page read and write
B64000
heap
page read and write
5B00000
trusted library allocation
page read and write
A89000
unkown
page execute and read and write
5C2F000
trusted library allocation
page read and write
B64000
heap
page read and write
30BE000
stack
page read and write
613F000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
357E000
stack
page read and write
5F56000
trusted library allocation
page read and write
B64000
heap
page read and write
5AE0000
trusted library allocation
page read and write
3F7F000
stack
page read and write
4ED0000
direct allocation
page read and write
5A6000
unkown
page execute and read and write
5ACA000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
B64000
heap
page read and write
5F53000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
B64000
heap
page read and write
7AC000
heap
page read and write
B64000
heap
page read and write
5AE7000
trusted library allocation
page read and write
1346000
heap
page read and write
42FF000
stack
page read and write
5AFF000
trusted library allocation
page read and write
65BD000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
130A000
heap
page read and write
5ABB000
trusted library allocation
page read and write
4A51000
heap
page read and write
5AC7000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
614F000
trusted library allocation
page read and write
B64000
heap
page read and write
180000
heap
page read and write
2C7F000
stack
page read and write
B35000
unkown
page execute and write copy
4A51000
heap
page read and write
5AB8000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
B60000
heap
page read and write
5A21000
trusted library allocation
page read and write
B64000
heap
page read and write
4561000
heap
page read and write
8F6000
unkown
page write copy
5AF0000
trusted library allocation
page read and write
A92000
unkown
page execute and write copy
6070000
trusted library allocation
page read and write
There are 1261 hidden memdumps, click here to show them.