IOC Report
SecuriteInfo.com.Trojan.PWS.Steam.36457.26808.16558.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.PWS.Steam.36457.26808.16558.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\360\360Safe\{17063755-E69A-41ad-B548-5A4EB6574E6F}.tf
data
dropped
C:\Program Files (x86)\360\360Safe\{EF88AA5B-3AA1-466c-98B7-FB3A03CDE56D}.tf
data
dropped
C:\Users\user\AppData\Local\Temp\{051B87EE-6ED6-4d2d-987B-51E827DD9B4E}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{2CFC86D2-B0FA-4e6e-98B3-DFB8DFD9FFA0}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{5B8C0D48-69CE-4729-9E6B-5FBACFFEC52C}.tmp\defaultskin.ui
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\{5B8C0D48-69CE-4729-9E6B-5FBACFFEC52C}.tmp\miniui.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (549), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{64B7E796-9F86-408b-9BE8-85DF5E630C37}.tmp\360SafeAssist.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{6DB16085-FD3D-42ad-BB1A-F0BFDECF0508}.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{6FD37900-E9BF-45df-85D3-FB776C2A71DA}.tmp
Microsoft Cabinet archive data, Windows 2000/XP setup, 967545 bytes, 1 file, at 0x2c +A "7z.dll", number 1, 57 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\{79304762-3434-49ff-84E1-FF1F273C851E}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{AA962B91-6711-4ed4-BEF7-C8BE525ACBE1}.tmp\360safe.setup
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AA962B91-6711-4ed4-BEF7-C8BE525ACBE1}.tmp\Plugin.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AA962B91-6711-4ed4-BEF7-C8BE525ACBE1}.tmp\Register.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AA962B91-6711-4ed4-BEF7-C8BE525ACBE1}.tmp\UninstallRootDirFileList.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AA962B91-6711-4ed4-BEF7-C8BE525ACBE1}.tmp\filelist.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\{BF53C6A3-C3C2-45ef-89A2-A714F4D6AEF2}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{C495A8A5-4524-4e25-94AD-AD309AF51F49}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{DBA7F686-6D1C-4a46-82CF-0AD83670E845}.tmp\MiniUI.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{E934DA3F-9812-46cb-9794-5DDE9C05D0D2}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{EE053F58-EF8C-43c4-A3D9-1E4B2965E691}.tmp\7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{F4D58348-6C21-4a08-8085-0D8F6BAB44B3}.tmp
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\{FCFF958A-AC44-4612-807B-C8AA21571E8A}.tmp\360Base.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FCFF958A-AC44-4612-807B-C8AA21571E8A}.tmp\CrashReport.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\{FCFF958A-AC44-4612-807B-C8AA21571E8A}.tmp\DumpUper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~xm2710.tmp
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\360Safe\360safe.setup.log
ASCII text, with CRLF, CR line terminators
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Steam.36457.26808.16558.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Steam.36457.26808.16558.exe"
malicious

URLs

Name
IP
Malicious
https://hao.360.com/?installer
unknown
http://down.360safe.com/setup.exe
unknown
https://hao.360.com/?src=lm&ls=%sStart
unknown
http://s.360.cn/safe/install.html?mid=%s&
unknown
http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exeG
unknown
http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe
unknown
http://inf.safe.360.cn/wsin/thinkhttp://inf.safe.360.cn/sein/thinkx
unknown
http://update.360safe.com/instcomp.htm?soft=509&status=%d&mid=%s&ver=%s&usetime=%d&zt=%d
unknown
http://www.360.cn4
unknown
http://safe.crash.browser.360.cndumpInfoSitecrashInfoSitehomeSiteNCSdomainNameshowtipdlgshowdlguseri
unknown
https://hao.360.com
unknown
http://www.360.cn/
unknown
http://www.360.cn;color=rgb(60
unknown
http://down.360safe.com/safesetup_2000.exechs
unknown
http://www.360.cn/jijiuxiang/360sd_download.html
unknown
http://down.360safe.com/360compkill64.ziphttp://www.360.cn/jijiuxiang/360sd_download.htmlDeleteUrlCa
unknown
http://down.360safe.com/360compkill64.zip
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
http://www.openssl.org/support/faq.html
unknown
https://hao.360.com/?installer/https://hao.360.comhttps://http://https://hao.360.com/%s
unknown
http://down.360safe.com/superkiller/superkillerexe_ce61817f687d599de13ee9deb1af83e2_5.1.0.1181.cab
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef42bb01f668d936&mid2=d0976767e6a203af75488f9609371383094a7b7d29b3&w=0&b=48&o=6&dver=9.0&installtype=1&status=109&usetime=0&zt=10565
171.13.14.66
http://my.360safe.comuseridconfig
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://down.360safe.com/safesetup_2000.exe
unknown
http://bbs.360safe.com/thread-4985800-1-1.htmlQ
unknown
http://www.360safe.com/
unknown
https://bbs.360.cn/thread-16079507-1-1.htmlD
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef42bb01f668d936&mid2=d0976767e6a203af75488f9609371383094a7b7d29b3&w=0&b=48&o=6&dver=9.0&status=101&usetime=4013656&zt=2862
171.13.14.66
http://update.360safe.com/instcomp.htm?soft=509&status=%d&mid=%s&ver=%s&usetime=%d&zt=%d&instver=%sL
unknown
https://dl.360safe.com/instbeta.exe
unknown
http://bbs.360safe.com/thread-4985800-1-1.html
unknown
http://www.360.cnhttp://www.360safe.com
unknown
http://down.360safe.com/superkiller/superkillerexe_880765522ded7527821ce7448af08018_5.1.64.1181.cabh
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=%s&pid=%s&hips=%d&mid=%s&mid2=%s&w=%I64d&b=%I64d&o=%d
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef42bb01f668d936&mid2=d0976767e6a203af75488f9609371383094a7b7d29b3&w=0&b=48&o=6&dver=9.0&installtype=1&status=189&usetime=0&zt=23732
171.13.14.66
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef42bb01f668d936&mid2=d0976767e6a203af75488f9609371383094a7b7d29b3&w=0&b=48&o=6&dver=9.0&installtype=1&status=147&usetime=0&zt=23680
171.13.14.66
http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe360
unknown
https://dl.360safe.com/instbeta.exedk
unknown
http://my.360.cn
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef4
unknown
http://down.360safe.com/setupbeta.exe
unknown
http://sdl.360safe.com/dbghelp_dll.cabpkH-1C
unknown
http://www.360safe.com
unknown
http://ocsp.thawte.com0
unknown
http://my.360safe.com
unknown
http://down.360safe.com/setup.exexv
unknown
https://bbs.360.cn/thread-15735708-1-1.html;color=rgb(60
unknown
http://safe.crash.browser.360.cn
unknown
https://hao.360.com/?installerT
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef42bb01f668d936&mid2=d0976767e6a203af75488f9609371383094a7b7d29b3&w=0&b=48&o=6&dver=9.0&status=188&usetime=0&zt=3626
171.13.14.66
http://www.360.cn/privacy/v3/360anquanweishi.html
unknown
http://www.symauth.com/cps0(
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&status=%d&mid=%s&ver=%s&usetime=%d&zt=%d&pid=%sehttp://s.
unknown
https://hao.360.com/?safe
unknown
http://down.360safe.com/setup.exePathSOFTWARE
unknown
http://s.360.cn/safe/setupsperr.htm?mid=%s
unknown
https://bbs.360.cn/thread-16079507-1-1.html
unknown
https://hao.360.com/?src=lm&ls=%s
unknown
http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exeGO360
unknown
http://www.symauth.com/rpa00
unknown
http://inf.safe.360.cn/wsin/think
unknown
http://down.360safe.com/superkiller/superkillerexe_880765522ded7527821ce7448af08018_5.1.64.1181.cab
unknown
http://www.360.cn/xukexieyi.htmlT
unknown
https://hao.360.com/
unknown
http://s.360.cn/safe/instcomp.htm?soft=923&ver=13.0.0.2199&pid=h_home&hips=0&mid=59cd53708ed730f0ef42bb01f668d936&mid2=d0976767e6a203af75488f9609371383094a7b7d29b3&w=0&b=48&o=6&dver=9.0&installtype=1&status=136&usetime=0&zt=24803
171.13.14.66
http://www.360.cn
unknown
http://inf.safe.360.cn/wsin/think?ipartner=0&m2=d0976767e6a203af75488f9609371383094a7b7d29b3&mid=59cd53708ed730f0ef42bb01f668d936&rand=104759&timestamp=1711632600&ver=13.0.0.2199&sign=da0c9f29d00aa1f62d1472307f9415f2
180.163.237.185
http://inf.safe.360.cn/sein/think
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s.360.cn
171.13.14.66
inf.safe.360.cn
180.163.237.185

IPs

IP
Domain
Country
Malicious
180.163.237.185
inf.safe.360.cn
China
171.13.14.66
s.360.cn
China

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\360Safe\Liveup
mid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\360Safe\Liveup
m2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\360Clear
SetupKilled
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\360Safe
QIBegin
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\360Safe
QIBegin
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\360Safe\Liveup
mid
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4D13000
heap
page read and write
507E000
heap
page read and write
46D4000
heap
page read and write
4FEA000
heap
page read and write
475C000
heap
page read and write
6CC81000
unkown
page execute read
4FD0000
heap
page read and write
5048000
heap
page read and write
6CD71000
unkown
page execute read
46D8000
heap
page read and write
50B5000
heap
page read and write
6CC64000
unkown
page read and write
4290000
heap
page read and write
6CD4B000
unkown
page readonly
4CF2000
heap
page read and write
4D52000
heap
page read and write
4754000
heap
page read and write
4F70000
direct allocation
page read and write
4C9F000
heap
page read and write
1764000
heap
page read and write
46D7000
heap
page read and write
4C5B000
heap
page read and write
4CC3000
heap
page read and write
36F7000
heap
page read and write
46C9000
heap
page read and write
6E42D000
unkown
page read and write
3FB0000
heap
page read and write
4C03000
heap
page read and write
3320000
trusted library allocation
page read and write
6CF24000
unkown
page read and write
4CB3000
heap
page read and write
43A0000
direct allocation
page read and write
4C1C000
heap
page read and write
43A0000
heap
page read and write
43D4000
direct allocation
page read and write
3320000
trusted library allocation
page read and write
4C1B000
heap
page read and write
1762000
heap
page read and write
1762000
heap
page read and write
4C17000
heap
page read and write
4FBC000
heap
page read and write
3320000
trusted library allocation
page read and write
36FB000
heap
page read and write
1760000
heap
page read and write
475D000
heap
page read and write
476E000
heap
page read and write
4C18000
heap
page read and write
4C43000
heap
page read and write
33E1000
heap
page read and write
16D0000
heap
page read and write
4693000
heap
page read and write
4CE7000
heap
page read and write
3384000
heap
page read and write
3380000
heap
page read and write
3320000
trusted library allocation
page read and write
4FDC000
heap
page read and write
4C32000
heap
page read and write
46D8000
heap
page read and write
1744000
heap
page read and write
476E000
heap
page read and write
44A1000
heap
page read and write
4FED000
heap
page read and write
4798000
heap
page read and write
33D0000
heap
page read and write
1687000
heap
page read and write
439D000
stack
page read and write
46A0000
heap
page read and write
54B0000
heap
page read and write
46D6000
heap
page read and write
46D7000
heap
page read and write
4FF5000
heap
page read and write
4698000
heap
page read and write
1772000
heap
page read and write
4C19000
heap
page read and write
46D6000
heap
page read and write
4C15000
heap
page read and write
996000
unkown
page readonly
5C4C000
stack
page read and write
476E000
heap
page read and write
4F30000
direct allocation
page read and write
4200000
direct allocation
page execute and read and write
4D13000
heap
page read and write
3E7B000
heap
page read and write
4C16000
heap
page read and write
46D6000
heap
page read and write
33E0000
heap
page read and write
3320000
trusted library allocation
page read and write
43A0000
direct allocation
page read and write
4CD4000
heap
page read and write
33E1000
heap
page read and write
4C18000
heap
page read and write
33E1000
heap
page read and write
4C2A000
heap
page read and write
3320000
trusted library allocation
page read and write
33E1000
heap
page read and write
473D000
heap
page read and write
4DF8000
direct allocation
page read and write
475F000
heap
page read and write
474A000
heap
page read and write
1780000
heap
page read and write
45C0000
direct allocation
page read and write
46A3000
heap
page read and write
41FB000
stack
page read and write
4761000
heap
page read and write
33E1000
heap
page read and write
46D9000
heap
page read and write
8C1000
unkown
page execute read
175E000
heap
page read and write
1760000
heap
page read and write
6CC2F000
unkown
page readonly
4C26000
heap
page read and write
4E00000
direct allocation
page read and write
476E000
heap
page read and write
4693000
heap
page read and write
3320000
trusted library allocation
page read and write
475E000
heap
page read and write
1774000
heap
page read and write
33E1000
heap
page read and write
9D2000
unkown
page read and write
1687000
heap
page read and write
1790000
heap
page read and write
4C1B000
heap
page read and write
1580000
heap
page read and write
6CB80000
unkown
page readonly
3320000
trusted library allocation
page read and write
33E1000
heap
page read and write
33F0000
heap
page read and write
3E70000
direct allocation
page read and write
4C15000
heap
page read and write
3320000
trusted library allocation
page read and write
4CC3000
heap
page read and write
33E1000
heap
page read and write
4C32000
heap
page read and write
46D9000
heap
page read and write
46D3000
heap
page read and write
172A000
heap
page read and write
16DA000
heap
page read and write
4CF4000
heap
page read and write
33E1000
heap
page read and write
44B0000
heap
page read and write
17B0000
heap
page read and write
4C1B000
heap
page read and write
4C58000
heap
page read and write
4C1B000
heap
page read and write
3F50000
trusted library allocation
page read and write
1660000
heap
page read and write
33D6000
heap
page read and write
4C67000
heap
page read and write
503D000
heap
page read and write
503D000
heap
page read and write
1686000
heap
page read and write
9CC000
unkown
page write copy
3B3C000
stack
page read and write
478E000
heap
page read and write
1687000
heap
page read and write
4776000
heap
page read and write
46DE000
heap
page read and write
4D0A000
heap
page read and write
4698000
heap
page read and write
46DE000
heap
page read and write
44B0000
heap
page read and write
4F8D000
direct allocation
page read and write
44B0000
heap
page read and write
43A0000
direct allocation
page read and write
503D000
heap
page read and write
4C16000
heap
page read and write
9CC000
unkown
page read and write
1687000
heap
page read and write
4748000
heap
page read and write
46DE000
heap
page read and write
59B0000
heap
page read and write
36F0000
heap
page read and write
33E1000
heap
page read and write
479E000
heap
page read and write
36FB000
heap
page read and write
4D1C000
heap
page read and write
5007000
heap
page read and write
4FC0000
heap
page read and write
47D9000
heap
page read and write
48E7000
heap
page read and write
4C26000
heap
page read and write
1780000
heap
page read and write
17A7000
heap
page read and write
4FB6000
heap
page read and write
4CF1000
heap
page read and write
501C000
heap
page read and write
476E000
heap
page read and write
1762000
heap
page read and write
6CD70000
unkown
page readonly
73B0000
trusted library allocation
page read and write
4CA2000
heap
page read and write
4FE7000
heap
page read and write
9E0000
unkown
page readonly
33E1000
heap
page read and write
4C1B000
heap
page read and write
479B000
heap
page read and write
44B0000
heap
page read and write
1687000
heap
page read and write
4736000
heap
page read and write
4FF0000
heap
page read and write
4FFE000
heap
page read and write
36FE000
heap
page read and write
46DB000
heap
page read and write
4C56000
heap
page read and write
478B000
heap
page read and write
4D50000
heap
page read and write
4698000
heap
page read and write
1780000
heap
page read and write
4FF2000
heap
page read and write
4D12000
heap
page read and write
1772000
heap
page read and write
46D9000
heap
page read and write
4CE7000
heap
page read and write
4C8E000
heap
page read and write
476F000
heap
page read and write
4C17000
heap
page read and write
33E1000
heap
page read and write
46D4000
heap
page read and write
1680000
heap
page read and write
1780000
heap
page read and write
46DB000
heap
page read and write
36FB000
heap
page read and write
1743000
heap
page read and write
46D7000
heap
page read and write
4C2B000
heap
page read and write
4C40000
heap
page read and write
1790000
heap
page read and write
4C4F000
heap
page read and write
1764000
heap
page read and write
33E1000
heap
page read and write
4D07000
heap
page read and write
4CC6000
heap
page read and write
4C01000
heap
page read and write
476E000
heap
page read and write
33E1000
heap
page read and write
33E1000
heap
page read and write
44B0000
heap
page read and write
54C0000
heap
page read and write
4762000
heap
page read and write
52B1000
heap
page read and write
4CCF000
heap
page read and write
4D1E000
heap
page read and write
475E000
heap
page read and write
50B0000
heap
page read and write
46D7000
heap
page read and write
1790000
heap
page read and write
476E000
heap
page read and write
4750000
heap
page read and write
1790000
heap
page read and write
4C69000
heap
page read and write
36FC000
heap
page read and write
4CF5000
heap
page read and write
368E000
stack
page read and write
4FF5000
heap
page read and write
1780000
heap
page read and write
1786000
heap
page read and write
477E000
heap
page read and write
4771000
heap
page read and write
17A7000
heap
page read and write
33E1000
heap
page read and write
1687000
heap
page read and write
46D6000
heap
page read and write
4C2C000
heap
page read and write
4C79000
heap
page read and write
4C26000
heap
page read and write
476E000
heap
page read and write
4C1D000
heap
page read and write
46D6000
heap
page read and write
1687000
heap
page read and write
59B2000
heap
page read and write
4698000
heap
page read and write
4CF8000
heap
page read and write
8C0000
unkown
page readonly
36EC000
stack
page read and write
4C14000
heap
page read and write
4CF0000
heap
page read and write
4DB0000
direct allocation
page read and write
4C88000
heap
page read and write
6CEDB000
unkown
page readonly
4C1E000
heap
page read and write
1687000
heap
page read and write
475D000
heap
page read and write
1776000
heap
page read and write
1687000
heap
page read and write
4E00000
direct allocation
page read and write
4C32000
heap
page read and write
33E1000
heap
page read and write
4CF1000
heap
page read and write
4FD1000
heap
page read and write
1774000
heap
page read and write
46D6000
heap
page read and write
4C14000
heap
page read and write
4693000
heap
page read and write
178B000
heap
page read and write
4C62000
heap
page read and write
4763000
heap
page read and write
1687000
heap
page read and write
33E1000
heap
page read and write
6E432000
unkown
page readonly
1687000
heap
page read and write
4C18000
heap
page read and write
9D4000
unkown
page write copy
46DC000
heap
page read and write
3300000
heap
page read and write
476E000
heap
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
335C000
stack
page read and write
4284000
direct allocation
page read and write
4FF0000
heap
page read and write
4FB1000
heap
page read and write
46D4000
heap
page read and write
4FBA000
heap
page read and write
476E000
heap
page read and write
351E000
stack
page read and write
46D3000
heap
page read and write
4D13000
heap
page read and write
6E410000
unkown
page readonly
33E1000
heap
page read and write
50B0000
direct allocation
page read and write
3320000
trusted library allocation
page read and write
4C32000
heap
page read and write
1790000
heap
page read and write
4763000
heap
page read and write
1783000
heap
page read and write
4D1C000
heap
page read and write
4D07000
heap
page read and write
1760000
heap
page read and write
4FE0000
heap
page read and write
475F000
heap
page read and write
1762000
heap
page read and write
44A0000
heap
page read and write
4E30000
direct allocation
page read and write
4C28000
heap
page read and write
4693000
heap
page read and write
33CB000
stack
page read and write
504C000
heap
page read and write
6E411000
unkown
page execute read
4693000
heap
page read and write
173D000
heap
page read and write
4C19000
heap
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
473E000
heap
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
1687000
heap
page read and write
4C55000
heap
page read and write
36FB000
heap
page read and write
4766000
heap
page read and write
52B0000
heap
page read and write
33E1000
heap
page read and write
4C18000
heap
page read and write
4D1C000
heap
page read and write
996000
unkown
page readonly
4CCD000
heap
page read and write
4C12000
heap
page read and write
1436000
stack
page read and write
16DE000
heap
page read and write
1687000
heap
page read and write
36FE000
heap
page read and write
475F000
heap
page read and write
33E1000
heap
page read and write
3C3F000
stack
page read and write
4CF1000
heap
page read and write
4250000
direct allocation
page read and write
4C6C000
heap
page read and write
9D5000
unkown
page read and write
46DC000
heap
page read and write
476E000
heap
page read and write
36FE000
heap
page read and write
478B000
heap
page read and write
474D000
heap
page read and write
1687000
heap
page read and write
33E1000
heap
page read and write
33DE000
heap
page read and write
4C26000
heap
page read and write
46D6000
heap
page read and write
6CC63000
unkown
page write copy
52D0000
heap
page read and write
1776000
heap
page read and write
33E1000
heap
page read and write
476E000
heap
page read and write
1687000
heap
page read and write
3F50000
trusted library allocation
page read and write
4777000
heap
page read and write
4C81000
heap
page read and write
1687000
heap
page read and write
4CD5000
heap
page read and write
4798000
heap
page read and write
4EFE000
stack
page read and write
43A0000
direct allocation
page read and write
4C88000
heap
page read and write
6E428000
unkown
page readonly
5B4B000
stack
page read and write
3F0E000
stack
page read and write
4FF2000
heap
page read and write
4A90000
heap
page read and write
4C1D000
heap
page read and write
4EB0000
direct allocation
page read and write
478D000
heap
page read and write
44A1000
heap
page read and write
4C28000
heap
page read and write
9E0000
unkown
page readonly
8C0000
unkown
page readonly
36FB000
heap
page read and write
4D50000
heap
page read and write
4FB0000
heap
page read and write
1687000
heap
page read and write
3320000
trusted library allocation
page read and write
3540000
heap
page read and write
4C1B000
heap
page read and write
4C16000
heap
page read and write
178E000
heap
page read and write
33E1000
heap
page read and write
4693000
heap
page read and write
6CC80000
unkown
page readonly
4CE6000
heap
page read and write
4751000
heap
page read and write
4FB1000
heap
page read and write
46DC000
heap
page read and write
17C0000
heap
page read and write
46D9000
heap
page read and write
3FA0000
heap
page read and write
4250000
direct allocation
page read and write
4693000
heap
page read and write
46DE000
heap
page read and write
6CF21000
unkown
page write copy
5030000
heap
page read and write
1687000
heap
page read and write
6CF20000
unkown
page read and write
1780000
heap
page read and write
1687000
heap
page read and write
4C13000
heap
page read and write
4698000
heap
page read and write
3EC0000
heap
page read and write
36FE000
heap
page read and write
4690000
heap
page read and write
3320000
trusted library allocation
page read and write
4698000
heap
page read and write
52C0000
heap
page read and write
1780000
heap
page read and write
50D0000
heap
page read and write
1687000
heap
page read and write
6CC62000
unkown
page read and write
1687000
heap
page read and write
476E000
heap
page read and write
479B000
heap
page read and write
475F000
heap
page read and write
1687000
heap
page read and write
4C32000
heap
page read and write
478E000
heap
page read and write
4C1A000
heap
page read and write
3320000
trusted library allocation
page read and write
52B1000
heap
page read and write
1535000
stack
page read and write
4CF5000
heap
page read and write
4C34000
heap
page read and write
1687000
heap
page read and write
3320000
trusted library allocation
page read and write
4FF0000
heap
page read and write
6CC68000
unkown
page readonly
1687000
heap
page read and write
8C1000
unkown
page execute read
4C13000
heap
page read and write
1752000
heap
page read and write
46D6000
heap
page read and write
1790000
heap
page read and write
4C39000
heap
page read and write
45B8000
heap
page read and write
3320000
trusted library allocation
page read and write
46D9000
heap
page read and write
3E3C000
stack
page read and write
4CB3000
heap
page read and write
5178000
direct allocation
page read and write
46D4000
heap
page read and write
4C56000
heap
page read and write
4C4E000
heap
page read and write
4698000
heap
page read and write
33E1000
heap
page read and write
33E1000
heap
page read and write
501F000
heap
page read and write
44BA000
heap
page read and write
476E000
heap
page read and write
1687000
heap
page read and write
5030000
heap
page read and write
1790000
heap
page read and write
3320000
trusted library allocation
page read and write
6CD1C000
unkown
page readonly
4C1B000
heap
page read and write
4FF0000
heap
page read and write
4698000
heap
page read and write
4C18000
heap
page read and write
17C0000
heap
page read and write
1764000
heap
page read and write
4777000
heap
page read and write
44B0000
heap
page read and write
4C26000
heap
page read and write
5009000
heap
page read and write
3320000
trusted library allocation
page read and write
6CB81000
unkown
page execute read
3D3F000
stack
page read and write
45C0000
heap
page read and write
44B0000
heap
page read and write
4CAB000
heap
page read and write
364C000
stack
page read and write
4C8E000
heap
page read and write
9CD000
unkown
page write copy
44B2000
heap
page read and write
4C00000
heap
page read and write
4C68000
heap
page read and write
3320000
trusted library allocation
page read and write
6CF2E000
unkown
page readonly
6CD42000
unkown
page read and write
4D1D000
heap
page read and write
4D13000
heap
page read and write
4CA2000
heap
page read and write
4698000
heap
page read and write
4693000
heap
page read and write
4C1B000
heap
page read and write
4C66000
heap
page read and write
4C1D000
heap
page read and write
There are 513 hidden memdumps, click here to show them.