IOC Report
BVGvbpplT8.exe

loading gif

Files

File Path
Type
Category
Malicious
BVGvbpplT8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44WNAJWW05E0258PKFVID8DSXYO93MX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\O215CKAM4VJZ3EV7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\44WNAJWW05E0258PKFVID8DSXYO93MX.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BVGvbpplT8.exe
"C:\Users\user\Desktop\BVGvbpplT8.exe"
malicious
C:\Users\user\AppData\Local\Temp\44WNAJWW05E0258PKFVID8DSXYO93MX.exe
"C:\Users\user\AppData\Local\Temp\44WNAJWW05E0258PKFVID8DSXYO93MX.exe"
malicious
C:\Users\user\AppData\Local\Temp\O215CKAM4VJZ3EV7.exe
"C:\Users\user\AppData\Local\Temp\O215CKAM4VJZ3EV7.exe"
malicious

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.206/
185.215.113.206
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://185.215.113.16/off/def.exeZ
unknown
https://lev-tolstoi.com/p
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
aspecteirs.lat
https://steamcommunity.com/ice.
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
http://185.215.113.206/c4becf79229cb002.phpNE
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://lev-tolstoi.com/P
unknown
sustainskelet.lat
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://lev-tolstoi.com/e
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://185.215.113.206/c4becf79229cb002.php/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://www.ecosia.org/newtab/
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://lev-tolstoi.com/apigz2s
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
http://185.215.113.206/c4becf79229cb002.php2E
unknown
https://lev-tolstoi.com/api
104.21.66.86
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
http://185.215.113.16/off/def.exe
unknown
grannyejh.lat
http://185.215.113.206/aMX
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://lev-tolstoi.com/ms
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
http://185.215.113.206/c4becf79229cb002.phpn
unknown
https://lev-tolstoi.com/apil
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://necklacebudi.lat/api
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
crosshuaht.lat
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
unknown
https://store.steampowered.com/legal/
unknown
https://www.mozilla.or
unknown
http://185.215.113.16/steam/random.exeT
unknown
http://185.215.113.206/c4becf79229cb002.phpRE
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
unknown
https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
unknown
http://185.215.113.16/steam/random.exe
unknown
http://185.215.113.206/c4becf79229cb002.php
185.215.113.206
https://lev-tolstoi.com/api0
unknown
https://store.steampowered.com/
unknown
https://lev-tolstoi.com/J
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
lev-tolstoi.com
104.21.66.86
ax-0001.ax-msedge.net
150.171.28.10
fp2e7a.wpc.phicdn.net
192.229.221.95
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
necklacebudi.lat
unknown
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
104.21.66.86
lev-tolstoi.com
United States
104.102.49.254
steamcommunity.com
United States
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
D3E000
heap
page read and write
malicious
451000
unkown
page execute and read and write
malicious
4B80000
direct allocation
page read and write
malicious
5C0C000
trusted library allocation
page read and write
620000
unkown
page execute and read and write
5BE4000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
4B31000
heap
page read and write
45DE000
stack
page read and write
5C51000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
61C7000
trusted library allocation
page read and write
6076000
trusted library allocation
page read and write
27EF000
stack
page read and write
6265000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
332F000
stack
page read and write
9A4000
heap
page read and write
46F0000
trusted library allocation
page read and write
7F9000
stack
page read and write
6074000
trusted library allocation
page read and write
396F000
stack
page read and write
5C1B000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
46F1000
heap
page read and write
4FC0000
direct allocation
page read and write
9A4000
heap
page read and write
5C41000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
4B31000
heap
page read and write
611D000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
5C33000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
61D9000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
D41000
heap
page read and write
382F000
stack
page read and write
8B1000
unkown
page execute and write copy
5C2B000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
835000
unkown
page execute and read and write
611A000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
61A9000
trusted library allocation
page read and write
9A4000
heap
page read and write
84E000
heap
page read and write
493E000
stack
page read and write
2E1E000
stack
page read and write
5C2B000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
616F000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
45A000
unkown
page execute and read and write
5C1A000
trusted library allocation
page read and write
6EEE000
stack
page read and write
6074000
trusted library allocation
page read and write
5EDA000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
6078000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
48B0000
direct allocation
page execute and read and write
613F000
trusted library allocation
page read and write
5F2000
unkown
page execute and write copy
CBE000
heap
page read and write
9A4000
heap
page read and write
49C0000
heap
page read and write
4B31000
heap
page read and write
5C1B000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
46F1000
heap
page read and write
6077000
trusted library allocation
page read and write
4B31000
heap
page read and write
452000
unkown
page execute and write copy
8B9000
unkown
page execute and read and write
607C000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
2F5E000
stack
page read and write
607E000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5DC000
unkown
page execute and write copy
9A4000
heap
page read and write
5C39000
trusted library allocation
page read and write
2BEE000
stack
page read and write
5BF1000
trusted library allocation
page read and write
431F000
stack
page read and write
702F000
stack
page read and write
451000
unkown
page execute and write copy
2EB0000
direct allocation
page read and write
8CB000
unkown
page execute and write copy
607C000
trusted library allocation
page read and write
5E7000
unkown
page execute and write copy
6326000
trusted library allocation
page read and write
D83000
heap
page read and write
9A4000
heap
page read and write
459F000
stack
page read and write
46E0000
direct allocation
page read and write
5BFA000
trusted library allocation
page read and write
331E000
stack
page read and write
30AF000
stack
page read and write
607A000
trusted library allocation
page read and write
692000
unkown
page execute and write copy
5BFC000
trusted library allocation
page read and write
49BE000
stack
page read and write
5C2B000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
386D000
stack
page read and write
35EE000
stack
page read and write
6134000
trusted library allocation
page read and write
69C000
unkown
page execute and read and write
CF6000
heap
page read and write
31EF000
stack
page read and write
9A4000
heap
page read and write
5BEE000
trusted library allocation
page read and write
6174000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
612E000
trusted library allocation
page read and write
422F000
stack
page read and write
4FBE000
stack
page read and write
24E7000
heap
page read and write
400000
heap
page read and write
67A000
unkown
page execute and write copy
5C4A000
trusted library allocation
page read and write
5C05000
trusted library allocation
page read and write
282E000
stack
page read and write
5CD9000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
450000
unkown
page read and write
D10000
heap
page read and write
6075000
trusted library allocation
page read and write
524D000
stack
page read and write
614F000
trusted library allocation
page read and write
5C31000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
1215000
unkown
page execute and write copy
9A4000
heap
page read and write
698000
unkown
page execute and read and write
DC5000
heap
page read and write
688000
unkown
page execute and read and write
5C09000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
3D6E000
stack
page read and write
5C39000
trusted library allocation
page read and write
624C000
trusted library allocation
page read and write
62E000
unkown
page execute and write copy
5BDD000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
45D1000
heap
page read and write
6079000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
CD8000
heap
page read and write
9A4000
heap
page read and write
4B31000
heap
page read and write
D5B000
heap
page read and write
5C11000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
6DF000
unkown
page execute and write copy
6077000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
497C000
stack
page read and write
9A4000
heap
page read and write
4E3F000
stack
page read and write
6128000
trusted library allocation
page read and write
4B31000
heap
page read and write
5C22000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
9A4000
heap
page read and write
6078000
trusted library allocation
page read and write
633E000
trusted library allocation
page read and write
61A8000
trusted library allocation
page read and write
921000
unkown
page execute and read and write
6078000
trusted library allocation
page read and write
45D1000
heap
page read and write
5BE4000
trusted library allocation
page read and write
37DF000
stack
page read and write
409F000
stack
page read and write
62F2000
trusted library allocation
page read and write
456000
unkown
page write copy
5CD1000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
40DE000
stack
page read and write
69A000
unkown
page write copy
F11000
unkown
page execute and write copy
D96000
heap
page read and write
612C000
trusted library allocation
page read and write
858000
heap
page read and write
621C000
trusted library allocation
page read and write
61BA000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
6127000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
456000
unkown
page write copy
5BFC000
trusted library allocation
page read and write
5D1F000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5BD6000
trusted library allocation
page read and write
9A4000
heap
page read and write
CF4000
heap
page read and write
4D10000
direct allocation
page execute and read and write
89F000
unkown
page execute and read and write
5ED6000
trusted library allocation
page read and write
3BEF000
stack
page read and write
5D10000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
4CBF000
stack
page read and write
5BED000
trusted library allocation
page read and write
6082000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
6074000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
64B000
unkown
page execute and write copy
9A4000
heap
page read and write
3F5F000
stack
page read and write
84A000
unkown
page execute and write copy
5C48000
trusted library allocation
page read and write
86D000
heap
page read and write
892000
unkown
page execute and read and write
2AAE000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
5C5A000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
9A4000
heap
page read and write
5C1B000
trusted library allocation
page read and write
618E000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
355F000
stack
page read and write
D4E000
heap
page read and write
2BAF000
stack
page read and write
4B31000
heap
page read and write
5CD8000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
6282000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
9A4000
heap
page read and write
5C23000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
421E000
stack
page read and write
46F1000
heap
page read and write
6077000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
5BFF000
trusted library allocation
page read and write
5620000
remote allocation
page read and write
5BFC000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
40C000
stack
page read and write
9A4000
heap
page read and write
6078000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
28DE000
stack
page read and write
5BF8000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
85C000
unkown
page execute and read and write
6153000
trusted library allocation
page read and write
3A5F000
stack
page read and write
5C08000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
5BF3000
trusted library allocation
page read and write
6077000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
45D1000
heap
page read and write
607D000
trusted library allocation
page read and write
4B31000
heap
page read and write
613C000
trusted library allocation
page read and write
CF5000
stack
page read and write
5C3B000
trusted library allocation
page read and write
6076000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
CE3000
heap
page read and write
D5D000
heap
page read and write
7FA000
unkown
page execute and read and write
5C62000
trusted library allocation
page read and write
D4E000
heap
page read and write
9A4000
heap
page read and write
62E0000
trusted library allocation
page read and write
5D3000
unkown
page execute and write copy
61C8000
trusted library allocation
page read and write
9A4000
heap
page read and write
5CD1000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
9A4000
heap
page read and write
5ED6000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
9A4000
heap
page read and write
D2B000
heap
page read and write
61B5000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
D5D000
heap
page read and write
5BD2000
trusted library allocation
page read and write
6F6000
unkown
page execute and read and write
628C000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
45D1000
heap
page read and write
613D000
trusted library allocation
page read and write
6252000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
617A000
trusted library allocation
page read and write
D5C000
heap
page read and write
62BF000
trusted library allocation
page read and write
61CA000
trusted library allocation
page read and write
6292000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
45D1000
heap
page read and write
5C09000
trusted library allocation
page read and write
5C93000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
66A000
unkown
page execute and read and write
5BF6000
trusted library allocation
page read and write
5CD2000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
5BE4000
trusted library allocation
page read and write
450000
unkown
page readonly
6074000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
960000
heap
page read and write
45C0000
direct allocation
page read and write
4B31000
heap
page read and write
5BF8000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
CE3000
heap
page read and write
616F000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
6E7000
unkown
page execute and write copy
46E0000
direct allocation
page read and write
319F000
stack
page read and write
607B000
trusted library allocation
page read and write
9A4000
heap
page read and write
5C23000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
9A4000
heap
page read and write
5CD8000
trusted library allocation
page read and write
45D1000
heap
page read and write
61DB000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
613A000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
6076000
trusted library allocation
page read and write
617E000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
D4E000
heap
page read and write
45C0000
direct allocation
page read and write
5C39000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
695000
unkown
page execute and write copy
800000
heap
page read and write
5C2B000
trusted library allocation
page read and write
2E6E000
stack
page read and write
607F000
trusted library allocation
page read and write
45D0000
heap
page read and write
9A4000
heap
page read and write
694000
unkown
page execute and read and write
6079000
trusted library allocation
page read and write
3C2E000
stack
page read and write
5C2B000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
6078000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
8A9000
unkown
page execute and write copy
5BD2000
trusted library allocation
page read and write
6076000
trusted library allocation
page read and write
9A4000
heap
page read and write
5140000
direct allocation
page execute and read and write
5C2B000
trusted library allocation
page read and write
45D1000
heap
page read and write
4C30000
trusted library allocation
page read and write
4B31000
heap
page read and write
5C0A000
trusted library allocation
page read and write
3EAE000
stack
page read and write
48C0000
trusted library allocation
page execute and read and write
5BF0000
trusted library allocation
page read and write
88A000
unkown
page execute and write copy
607F000
trusted library allocation
page read and write
B7E000
stack
page read and write
24DE000
stack
page read and write
5C4A000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
624E000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
5BFF000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
D61000
heap
page read and write
27DE000
stack
page read and write
5C08000
trusted library allocation
page read and write
6267000
trusted library allocation
page read and write
9A4000
heap
page read and write
6188000
trusted library allocation
page read and write
9A4000
heap
page read and write
5BDD000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
632C000
trusted library allocation
page read and write
3D2F000
stack
page read and write
4B31000
heap
page read and write
D27000
heap
page read and write
2EB0000
direct allocation
page read and write
6076000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
5C2B000
trusted library allocation
page read and write
4B31000
heap
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
5C1B000
trusted library allocation
page read and write
4B80000
direct allocation
page read and write
5BFC000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5C09000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
3AEE000
stack
page read and write
291E000
stack
page read and write
607A000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
DA9000
heap
page read and write
6136000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
6074000
trusted library allocation
page read and write
89B000
unkown
page execute and write copy
9A4000
heap
page read and write
9A4000
heap
page read and write
5BF8000
trusted library allocation
page read and write
9EE000
stack
page read and write
5C03000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
650000
unkown
page execute and read and write
4E6000
unkown
page execute and read and write
61C6000
trusted library allocation
page read and write
651000
unkown
page execute and write copy
8F6000
unkown
page execute and read and write
5C2B000
trusted library allocation
page read and write
655000
unkown
page execute and read and write
5C08000
trusted library allocation
page read and write
936000
unkown
page execute and write copy
45D1000
heap
page read and write
345E000
stack
page read and write
7FC000
unkown
page execute and write copy
9A0000
heap
page read and write
6077000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
67C000
unkown
page execute and write copy
6079000
trusted library allocation
page read and write
395E000
stack
page read and write
824000
unkown
page execute and read and write
5C28000
trusted library allocation
page read and write
61DF000
trusted library allocation
page read and write
B3F000
stack
page read and write
6081000
trusted library allocation
page read and write
4B31000
heap
page read and write
4D00000
direct allocation
page execute and read and write
5C29000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
2E2F000
stack
page read and write
5130000
direct allocation
page execute and read and write
6166000
trusted library allocation
page read and write
6077000
trusted library allocation
page read and write
4B31000
heap
page read and write
5BE9000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
6301000
trusted library allocation
page read and write
3B9F000
stack
page read and write
5C2B000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
937000
unkown
page execute and write copy
6F6000
unkown
page execute and write copy
2B9E000
stack
page read and write
607D000
trusted library allocation
page read and write
616B000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
5C1B000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
69C000
unkown
page execute and write copy
62BD000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
D5A000
heap
page read and write
292F000
stack
page read and write
5C62000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
879000
unkown
page execute and write copy
607C000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
4B31000
heap
page read and write
466000
unkown
page execute and write copy
6072000
trusted library allocation
page read and write
811000
unkown
page execute and write copy
5C2B000
trusted library allocation
page read and write
3AAF000
stack
page read and write
6080000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
CF6000
heap
page read and write
81D000
unkown
page execute and write copy
613C000
trusted library allocation
page read and write
9A4000
heap
page read and write
51FF000
stack
page read and write
61EA000
trusted library allocation
page read and write
683000
unkown
page execute and read and write
5C1A000
trusted library allocation
page read and write
64A000
unkown
page execute and read and write
5490000
heap
page read and write
45D1000
heap
page read and write
6F8000
unkown
page execute and write copy
2EB0000
direct allocation
page read and write
61C4000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
612B000
trusted library allocation
page read and write
4B31000
heap
page read and write
9A4000
heap
page read and write
6077000
trusted library allocation
page read and write
61FE000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
9A4000
heap
page read and write
5BF3000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
D40000
heap
page read and write
61BC000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
45A000
unkown
page execute and write copy
9A4000
heap
page read and write
4720000
direct allocation
page read and write
6148000
trusted library allocation
page read and write
DB3000
heap
page read and write
5C2B000
trusted library allocation
page read and write
3E6F000
stack
page read and write
5AF5000
trusted library allocation
page read and write
9A4000
heap
page read and write
62B9000
trusted library allocation
page read and write
9A4000
heap
page read and write
45D1000
heap
page read and write
5CD7000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
2FAE000
stack
page read and write
5D09000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
607F000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
35AF000
stack
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
62EC000
trusted library allocation
page read and write
6181000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
2A1F000
stack
page read and write
41DF000
stack
page read and write
6079000
trusted library allocation
page read and write
81D000
unkown
page execute and read and write
5DA8000
trusted library allocation
page read and write
372E000
stack
page read and write
9A4000
heap
page read and write
61CE000
trusted library allocation
page read and write
D81000
heap
page read and write
6074000
trusted library allocation
page read and write
915000
unkown
page execute and write copy
450000
unkown
page readonly
5ED8000
trusted library allocation
page read and write
61CA000
trusted library allocation
page read and write
40EF000
stack
page read and write
5C1B000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
827000
unkown
page execute and read and write
9A4000
heap
page read and write
5C2B000
trusted library allocation
page read and write
84C000
unkown
page execute and write copy
5BF1000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
6A2000
unkown
page execute and read and write
61B3000
trusted library allocation
page read and write
627C000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
D20000
heap
page read and write
62AD000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
62DC000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
610F000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
9A4000
heap
page read and write
D50000
heap
page read and write
2F1F000
stack
page read and write
36DE000
stack
page read and write
CC4000
heap
page read and write
5DB0000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
61DE000
trusted library allocation
page read and write
3E1E000
stack
page read and write
6A1000
unkown
page execute and write copy
5BF3000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
50BF000
stack
page read and write
34AE000
stack
page read and write
5BF8000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
9A4000
heap
page read and write
5BF8000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
9A4000
heap
page read and write
450000
unkown
page read and write
346F000
stack
page read and write
5C2F000
trusted library allocation
page read and write
9A4000
heap
page read and write
46E0000
direct allocation
page read and write
6DD000
unkown
page execute and write copy
4BBE000
stack
page read and write
6144000
trusted library allocation
page read and write
69A000
unkown
page write copy
5BEF000
trusted library allocation
page read and write
D5D000
heap
page read and write
607D000
trusted library allocation
page read and write
9A4000
heap
page read and write
2DDF000
stack
page read and write
6D6E000
stack
page read and write
607E000
trusted library allocation
page read and write
6C6D000
stack
page read and write
CF4000
heap
page read and write
929000
unkown
page execute and write copy
3BDE000
stack
page read and write
CFE000
stack
page read and write
CF7000
heap
page read and write
2EB0000
direct allocation
page read and write
435E000
stack
page read and write
9A4000
heap
page read and write
62EE000
trusted library allocation
page read and write
6142000
trusted library allocation
page read and write
4B31000
heap
page read and write
6197000
trusted library allocation
page read and write
2A5B000
stack
page read and write
5BE4000
trusted library allocation
page read and write
9A4000
heap
page read and write
615F000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
667000
unkown
page execute and write copy
4FC0000
direct allocation
page read and write
6344000
trusted library allocation
page read and write
617F000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
6072000
trusted library allocation
page read and write
9A4000
heap
page read and write
D61000
heap
page read and write
6145000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
341F000
stack
page read and write
5CDF000
trusted library allocation
page read and write
5C7B000
trusted library allocation
page read and write
9A4000
heap
page read and write
45E0000
heap
page read and write
9A4000
heap
page read and write
607D000
trusted library allocation
page read and write
487A000
trusted library allocation
page execute and read and write
5B7000
unkown
page execute and read and write
5BFC000
trusted library allocation
page read and write
607F000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
61A8000
trusted library allocation
page read and write
6328000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
2B5F000
stack
page read and write
672000
unkown
page execute and read and write
9A4000
heap
page read and write
465000
unkown
page execute and read and write
607D000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
25EF000
stack
page read and write
5C0A000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
6184000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
D30000
heap
page read and write
5C6C000
trusted library allocation
page read and write
46DF000
stack
page read and write
46E0000
direct allocation
page read and write
970000
heap
page read and write
5140000
direct allocation
page execute and read and write
4D0E000
stack
page read and write
2EB0000
direct allocation
page read and write
810000
unkown
page execute and read and write
D61000
heap
page read and write
548C000
stack
page read and write
6122000
trusted library allocation
page read and write
CE6000
heap
page read and write
5BF1000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
D5D000
heap
page read and write
6073000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
614F000
trusted library allocation
page read and write
4E7E000
stack
page read and write
D53000
heap
page read and write
5BEC000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
FFF000
stack
page read and write
6081000
trusted library allocation
page read and write
4B31000
heap
page read and write
CF0000
heap
page read and write
5BE9000
trusted library allocation
page read and write
9A4000
heap
page read and write
5C42000
trusted library allocation
page read and write
68E4000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
F62000
unkown
page write copy
2A6F000
stack
page read and write
2EB0000
direct allocation
page read and write
60F000
unkown
page execute and write copy
9A4000
heap
page read and write
5C1B000
trusted library allocation
page read and write
607F000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
45D1000
heap
page read and write
66B000
unkown
page execute and write copy
5BE5000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
9A4000
heap
page read and write
5C2B000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
322E000
stack
page read and write
6077000
trusted library allocation
page read and write
5620000
remote allocation
page read and write
61F0000
trusted library allocation
page read and write
9A4000
heap
page read and write
6073000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
88E000
unkown
page execute and write copy
6077000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
9A4000
heap
page read and write
D5F000
heap
page read and write
6079000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
534F000
trusted library allocation
page read and write
5D2000
unkown
page execute and read and write
6121000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
627E000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
485E000
stack
page read and write
6113000
trusted library allocation
page read and write
616A000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
6143000
trusted library allocation
page read and write
5BEC000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
5BF3000
trusted library allocation
page read and write
9A4000
heap
page read and write
2EB0000
direct allocation
page read and write
445F000
stack
page read and write
5C1B000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
9A4000
heap
page read and write
5BFC000
trusted library allocation
page read and write
3CDF000
stack
page read and write
61BE000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
6DEE000
stack
page read and write
61CC000
trusted library allocation
page read and write
8D9000
unkown
page execute and write copy
3FEE000
stack
page read and write
26EF000
stack
page read and write
611F000
trusted library allocation
page read and write
61A3000
trusted library allocation
page read and write
6F2E000
stack
page read and write
4880000
heap
page read and write
3D1E000
stack
page read and write
6178000
trusted library allocation
page read and write
48E0000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
CE6000
heap
page read and write
2EB0000
direct allocation
page read and write
5140000
direct allocation
page execute and read and write
5C6A000
trusted library allocation
page read and write
6168000
trusted library allocation
page read and write
4B80000
direct allocation
page read and write
6077000
trusted library allocation
page read and write
249C000
stack
page read and write
3F9E000
stack
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
5C2B000
trusted library allocation
page read and write
9A4000
heap
page read and write
5C31000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
6076000
trusted library allocation
page read and write
618A000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
813000
unkown
page execute and read and write
9A4000
heap
page read and write
607B000
trusted library allocation
page read and write
D61000
heap
page read and write
5BF1000
trusted library allocation
page read and write
3FAF000
stack
page read and write
5C05000
trusted library allocation
page read and write
61AF000
trusted library allocation
page read and write
635000
unkown
page execute and read and write
6078000
trusted library allocation
page read and write
61C5000
trusted library allocation
page read and write
62FF000
trusted library allocation
page read and write
31DE000
stack
page read and write
9A4000
heap
page read and write
6076000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
D4A000
heap
page read and write
46E0000
direct allocation
page read and write
6182000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
6169000
trusted library allocation
page read and write
6072000
trusted library allocation
page read and write
862000
heap
page read and write
45C0000
direct allocation
page read and write
45D1000
heap
page read and write
61CE000
trusted library allocation
page read and write
412E000
stack
page read and write
830000
unkown
page execute and write copy
245E000
stack
page read and write
391F000
stack
page read and write
6126000
trusted library allocation
page read and write
D4A000
heap
page read and write
5002000
direct allocation
page read and write
633000
unkown
page execute and write copy
18C000
stack
page read and write
5C9B000
trusted library allocation
page read and write
4FC0000
direct allocation
page read and write
5C42000
trusted library allocation
page read and write
61CB000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5BA000
unkown
page execute and write copy
6078000
trusted library allocation
page read and write
84B000
unkown
page execute and read and write
62B7000
trusted library allocation
page read and write
5620000
remote allocation
page read and write
94E000
stack
page read and write
CE6000
heap
page read and write
9A4000
heap
page read and write
61C8000
trusted library allocation
page read and write
9A4000
heap
page read and write
607B000
trusted library allocation
page read and write
8CE000
unkown
page execute and read and write
61B7000
trusted library allocation
page read and write
D4E000
heap
page read and write
D4E000
heap
page read and write
4704000
trusted library allocation
page read and write
87E000
unkown
page execute and read and write
810000
heap
page read and write
607A000
trusted library allocation
page read and write
9A4000
heap
page read and write
DA6000
heap
page read and write
5BFC000
trusted library allocation
page read and write
9A4000
heap
page read and write
5BF3000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
929000
unkown
page execute and write copy
5AD4000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
9A4000
heap
page read and write
1F0000
heap
page read and write
5C27000
trusted library allocation
page read and write
470D000
trusted library allocation
page execute and read and write
6077000
trusted library allocation
page read and write
9A4000
heap
page read and write
61D4000
trusted library allocation
page read and write
632000
unkown
page execute and read and write
61AF000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
616E000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
4B31000
heap
page read and write
5C3B000
trusted library allocation
page read and write
6072000
trusted library allocation
page read and write
46F0000
heap
page read and write
5C08000
trusted library allocation
page read and write
24E0000
heap
page read and write
6075000
trusted library allocation
page read and write
617A000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
61A5000
trusted library allocation
page read and write
6143000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
D42000
heap
page read and write
D4D000
heap
page read and write
4714000
trusted library allocation
page read and write
6122000
trusted library allocation
page read and write
D50000
heap
page read and write
489B000
trusted library allocation
page execute and read and write
5D09000
trusted library allocation
page read and write
9A4000
heap
page read and write
449E000
stack
page read and write
62C3000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
614D000
trusted library allocation
page read and write
61B5000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
9A4000
heap
page read and write
6193000
trusted library allocation
page read and write
36EF000
stack
page read and write
2EB0000
direct allocation
page read and write
5C1A000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
607E000
trusted library allocation
page read and write
9A4000
heap
page read and write
45D1000
heap
page read and write
6118000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
616C000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
607B000
trusted library allocation
page read and write
D53000
heap
page read and write
5BF5000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
30EE000
stack
page read and write
641000
unkown
page execute and write copy
607B000
trusted library allocation
page read and write
9A4000
heap
page read and write
369F000
stack
page read and write
9A4000
heap
page read and write
85D000
unkown
page execute and write copy
5C47000
trusted library allocation
page read and write
9A4000
heap
page read and write
607B000
trusted library allocation
page read and write
359E000
stack
page read and write
9A4000
heap
page read and write
5C1E000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
D4E000
heap
page read and write
5BEC000
trusted library allocation
page read and write
48F0000
heap
page execute and read and write
CF6000
heap
page read and write
5C24000
trusted library allocation
page read and write
6DE000
unkown
page execute and read and write
46E0000
direct allocation
page read and write
5CF1000
trusted library allocation
page read and write
8DB000
unkown
page execute and read and write
6074000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
81E000
heap
page read and write
6130000
trusted library allocation
page read and write
9A4000
heap
page read and write
922000
unkown
page execute and write copy
5C0A000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
464000
unkown
page execute and write copy
5BF7000
trusted library allocation
page read and write
9A4000
heap
page read and write
45C0000
direct allocation
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
45C0000
direct allocation
page read and write
5C2B000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
6340000
trusted library allocation
page read and write
4F7F000
stack
page read and write
61C0000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
5EDB000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
63DC000
trusted library allocation
page read and write
381E000
stack
page read and write
6168000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
67B000
unkown
page execute and read and write
5C6A000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
6126000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
45D1000
heap
page read and write
5C08000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
4B31000
heap
page read and write
6161000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
3E5E000
stack
page read and write
611E000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
45A0000
heap
page read and write
5BDA000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
C7E000
stack
page read and write
46F1000
heap
page read and write
607A000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
9A4000
heap
page read and write
607B000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
D5E000
heap
page read and write
5C22000
trusted library allocation
page read and write
6E7000
unkown
page execute and write copy
F10000
unkown
page readonly
534D000
stack
page read and write
2CEF000
stack
page read and write
5C03000
trusted library allocation
page read and write
966000
heap
page read and write
5EDC000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
296E000
stack
page read and write
2F6F000
stack
page read and write
D5F000
heap
page read and write
45D1000
heap
page read and write
607E000
trusted library allocation
page read and write
618F000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
4870000
direct allocation
page execute and read and write
607D000
trusted library allocation
page read and write
626B000
trusted library allocation
page read and write
475C000
stack
page read and write
61EA000
trusted library allocation
page read and write
6073000
trusted library allocation
page read and write
5E9000
unkown
page execute and read and write
88D000
unkown
page execute and read and write
39AE000
stack
page read and write
6DA0000
heap
page execute and read and write
920000
unkown
page execute and write copy
32DF000
stack
page read and write
5BE4000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
45D1000
heap
page read and write
822000
unkown
page execute and write copy
4FF000
unkown
page execute and read and write
607E000
trusted library allocation
page read and write
8B0000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
6185000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
D50000
heap
page read and write
4B31000
heap
page read and write
6075000
trusted library allocation
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
826000
unkown
page execute and write copy
5BF1000
trusted library allocation
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
2D2E000
stack
page read and write
5C15000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
50FE000
stack
page read and write
615B000
trusted library allocation
page read and write
960000
heap
page read and write
850000
heap
page read and write
45D1000
heap
page read and write
6F8000
unkown
page execute and write copy
45D1000
heap
page read and write
5BD7000
trusted library allocation
page read and write
5C06000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
2C9F000
stack
page read and write
2CDE000
stack
page read and write
D3A000
heap
page read and write
538D000
stack
page read and write
6176000
trusted library allocation
page read and write
6123000
trusted library allocation
page read and write
920000
unkown
page execute and write copy
61EC000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
607B000
trusted library allocation
page read and write
860000
unkown
page execute and read and write
6075000
trusted library allocation
page read and write
9A4000
heap
page read and write
D58000
heap
page read and write
5C1B000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
6191000
trusted library allocation
page read and write
D4E000
heap
page read and write
5BF3000
trusted library allocation
page read and write
CF7000
heap
page read and write
5C1B000
trusted library allocation
page read and write
9A4000
heap
page read and write
615D000
trusted library allocation
page read and write
4AD1000
trusted library allocation
page read and write
9A4000
heap
page read and write
61FC000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
62AF000
trusted library allocation
page read and write
4DE000
unkown
page execute and read and write
5BF5000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
4720000
direct allocation
page read and write
610D000
trusted library allocation
page read and write
6074000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
5C1B000
trusted library allocation
page read and write
912000
unkown
page execute and write copy
9A4000
heap
page read and write
336E000
stack
page read and write
936000
unkown
page execute and read and write
5BEC000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
9A4000
heap
page read and write
607F000
trusted library allocation
page read and write
9A4000
heap
page read and write
452000
unkown
page execute and read and write
9A4000
heap
page read and write
6A8000
unkown
page execute and write copy
607A000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
4ACE000
stack
page read and write
81A000
heap
page read and write
5DD000
unkown
page execute and read and write
5C62000
trusted library allocation
page read and write
4703000
trusted library allocation
page execute and read and write
9A4000
heap
page read and write
6222000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
6305000
trusted library allocation
page read and write
9A4000
heap
page read and write
6175000
trusted library allocation
page read and write
3A9E000
stack
page read and write
5BEA000
trusted library allocation
page read and write
D61000
heap
page read and write
607F000
trusted library allocation
page read and write
6072000
trusted library allocation
page read and write
6127000
trusted library allocation
page read and write
309E000
stack
page read and write
614B000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
45D1000
heap
page read and write
6123000
trusted library allocation
page read and write
6188000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
5F9000
unkown
page execute and read and write
5C18000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
5D4000
unkown
page execute and read and write
6077000
trusted library allocation
page read and write
4897000
trusted library allocation
page execute and read and write
5C2B000
trusted library allocation
page read and write
9A4000
heap
page read and write
61D0000
trusted library allocation
page read and write
45D1000
heap
page read and write
45C0000
direct allocation
page read and write
5C2B000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
607D000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
61CC000
trusted library allocation
page read and write
6074000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
305F000
stack
page read and write
9A4000
heap
page read and write
6140000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
There are 1253 hidden memdumps, click here to show them.