IOC Report
text.exe

FilesProcessesURLsDomainsIPsRegistryMemdumps1510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
text.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_text.exe_d434b8ad27a5cbffac08213d76e30cd9226c872_3f1c205d_7e1e3ef7-6435-46aa-b2e5-a4d6a8e22e97\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A91.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jan 22 14:56:06 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C16.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E59.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\jwl6p\268qq9hvs
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\jwl6p\47q16x
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\jwl6p\4wln7g
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\jwl6p\6ppppz
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\jwl6p\8q1nyc
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\jwl6p\8y58gl
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\jwl6p\c2no8y
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\jwl6p\je3ekx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\jwl6p\k6ppph4e3
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\jwl6p\l6pp8g
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\jwl6p\mycjw4
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\jwl6p\n7q1ng
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\jwl6p\yu37g4
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 70
ASCII text, with very long lines (821)
downloaded
Chrome Cache Entry: 71
ASCII text
downloaded
Chrome Cache Entry: 72
ASCII text, with very long lines (65531)
downloaded
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\text.exe
"C:\Users\user\Desktop\text.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2136,i,12195627036784806045,10550328990114428246,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\jwl6p" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7068 -s 3240

URLs

Name
IP
Malicious
https://tlfiyat.shop/
88.99.120.106
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/profiles/76561199819539662
https://google-ohttp-relay-join.fastly-edge.com/jq
unknown
https://google-ohttp-relay-join.fastly-edge.com/8s
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://tlfiyat.shop/G
unknown
https://google-ohttp-relay-join.fastly-edge.com/Iq
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://anglebug.com/7714
unknown
https://t.me/sc1phell
149.154.167.99
https://photos.google.com?referrer=CHROME_NTP
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://issuetracker.google.com/255411748
unknown
https://google-ohttp-relay-join.fastly-edge.com/lo
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://tlfiyat.shop/r
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://tlfiyat.shop/i
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://google-ohttp-relay-join.fastly-edge.com/$s
unknown
http://anglebug.com/4384
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://apis.google.com
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
http://anglebug.com/7760
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://tlfiyat.shop&
unknown
https://tlfiyat.shop
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://google-ohttp-relay-join.fastly-edge.com/hp
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
https://anglebug.com/7847
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
https://lens.google.com/v3/upload
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
216.58.206.68
http://anglebug.com/3832
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tlfiyat.shop
88.99.120.106
malicious
t.me
149.154.167.99
www.google.com
216.58.206.68

IPs

IP
Domain
Country
Malicious
88.99.120.106
tlfiyat.shop
Germany
malicious
192.168.2.4
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
149.154.167.99
t.me
United Kingdom
127.0.0.1
unknown
unknown
216.58.206.68
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
ProgramId
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
FileId
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
LowerCaseLongPath
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
LongPathHash
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
Name
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
OriginalFileName
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
Publisher
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
Version
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
BinFileVersion
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
BinaryType
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
ProductName
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
ProductVersion
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
LinkDate
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
BinProductVersion
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
AppxPackageFullName
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
AppxPackageRelativeId
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
Size
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
Language
malicious
\REGISTRY\A\{0481cf66-fce8-115e-b6d0-c5fdfdc6e5d3}\Root\InventoryApplicationFile\text.exe|a221a36fdb96e355
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4F0000
direct allocation
page execute and read and write
malicious
2130000
direct allocation
page read and write
malicious
5A0000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
3432000
heap
page read and write
1D254D38000
heap
page read and write
1D254D38000
heap
page read and write
4F08006F0000
trusted library allocation
page read and write
4F0800754000
trusted library allocation
page read and write
1D254D3C000
heap
page read and write
610000
heap
page read and write
62C800FC0000
trusted library allocation
page read and write
358D000
heap
page read and write
1D254D41000
heap
page read and write
62C800CEC000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
7D74002BC000
trusted library allocation
page read and write
5EC000
heap
page read and write
1D254D3B000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
62C80039C000
trusted library allocation
page read and write
62C801A94000
trusted library allocation
page read and write
62C800360000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
1D254D53000
heap
page read and write
30E4000
heap
page read and write
62C801B84000
trusted library allocation
page read and write
62C800A9C000
trusted library allocation
page read and write
30D1000
heap
page read and write
62C8018D4000
trusted library allocation
page read and write
4F0800714000
trusted library allocation
page read and write
47B7000
heap
page read and write
1D254D47000
heap
page read and write
428000
unkown
page readonly
62C8002A4000
trusted library allocation
page read and write
345B000
heap
page read and write
3195000
heap
page read and write
62C800354000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
190000
stack
page read and write
7D74002BC000
trusted library allocation
page read and write
1D254D2F000
heap
page read and write
1D254D3B000
heap
page read and write
62C801838000
trusted library allocation
page read and write
523000
heap
page execute and read and write
62C801B54000
trusted library allocation
page read and write
36F7000
heap
page read and write
37A2000
heap
page read and write
47CC000
heap
page read and write
1D254D38000
heap
page read and write
62C801734000
trusted library allocation
page read and write
428000
unkown
page readonly
1D255292000
heap
page read and write
7D74002C0000
trusted library allocation
page read and write
62C80174C000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C800FA4000
trusted library allocation
page read and write
62C8017C4000
trusted library allocation
page read and write
7D74002B0000
trusted library allocation
page read and write
62C8001AC000
trusted library allocation
page read and write
1D254D63000
heap
page read and write
62C801048000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
62C800220000
trusted library allocation
page read and write
3B9D000
heap
page read and write
1D254D5F000
heap
page read and write
358A000
heap
page read and write
38B0000
heap
page read and write
1D254D33000
heap
page read and write
1D254D41000
heap
page read and write
1D254D38000
heap
page read and write
33F0000
heap
page read and write
62C801790000
trusted library allocation
page read and write
62C801B14000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
62C8001B4000
trusted library allocation
page read and write
62C801700000
trusted library allocation
page read and write
4F08006CC000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C80164C000
trusted library allocation
page read and write
4F0800758000
trusted library allocation
page read and write
62C800C5C000
trusted library allocation
page read and write
34FE000
heap
page read and write
1D254D41000
heap
page read and write
1D254D2D000
heap
page read and write
1D254D46000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
419F000
heap
page read and write
7D74002A0000
trusted library allocation
page read and write
22C0000
heap
page read and write
42B000
unkown
page write copy
348F000
heap
page read and write
7D7400248000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
1D254D38000
heap
page read and write
62C801350000
trusted library allocation
page read and write
5F2000
heap
page read and write
47C1000
heap
page read and write
62C800C5C000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D3B000
heap
page read and write
2E1F000
stack
page read and write
62C8016AC000
trusted library allocation
page read and write
41EA000
heap
page read and write
1D254D43000
heap
page read and write
62C800C5C000
trusted library allocation
page read and write
62C8013BC000
trusted library allocation
page read and write
62C801888000
trusted library allocation
page read and write
62C801894000
trusted library allocation
page read and write
62C800F98000
trusted library allocation
page read and write
62C801058000
trusted library allocation
page read and write
1D254D4F000
heap
page read and write
2E71000
heap
page read and write
5A2000
heap
page read and write
1D254D47000
heap
page read and write
1D254D43000
heap
page read and write
62C801744000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
401000
unkown
page execute read
62C801A98000
trusted library allocation
page read and write
62C800F98000
trusted library allocation
page read and write
62C8002AC000
trusted library allocation
page read and write
5F4000
heap
page read and write
1D254D33000
heap
page read and write
62C8010A8000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D38000
heap
page read and write
1D254D38000
heap
page read and write
62C8017A8000
trusted library allocation
page read and write
62C801058000
trusted library allocation
page read and write
62C801C44000
trusted library allocation
page read and write
3438000
heap
page read and write
1D254D41000
heap
page read and write
1D254D3B000
heap
page read and write
62C80175C000
trusted library allocation
page read and write
3540000
heap
page read and write
1D254D41000
heap
page read and write
62C8001AC000
trusted library allocation
page read and write
62C800FA4000
trusted library allocation
page read and write
62C8017A0000
trusted library allocation
page read and write
2E71000
heap
page read and write
62C801698000
trusted library allocation
page read and write
62C80100C000
trusted library allocation
page read and write
3525000
heap
page read and write
1D254D3B000
heap
page read and write
3C65000
heap
page read and write
9B000
stack
page read and write
62C801350000
trusted library allocation
page read and write
4F0800624000
trusted library allocation
page read and write
4F080035C000
trusted library allocation
page read and write
62C8011C8000
trusted library allocation
page read and write
62C800314000
trusted library allocation
page read and write
30E2000
heap
page read and write
62C800C65000
trusted library allocation
page read and write
617000
heap
page read and write
1D254D3B000
heap
page read and write
62C8002AA000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D46000
heap
page read and write
62C8016E8000
trusted library allocation
page read and write
62C800320000
trusted library allocation
page read and write
62C800F74000
trusted library allocation
page read and write
2B7E000
stack
page read and write
46CC000
heap
page read and write
3454000
heap
page read and write
62C801AEC000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
4701000
heap
page read and write
62C8017C0000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
1D254D47000
heap
page read and write
62C8003B0000
trusted library allocation
page read and write
4F0800620000
trusted library allocation
page read and write
3544000
heap
page read and write
1D254D43000
heap
page read and write
4F0800320000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
62C800A30000
trusted library allocation
page read and write
42B000
unkown
page read and write
62C801718000
trusted library allocation
page read and write
62C800360000
trusted library allocation
page read and write
62C8019D8000
trusted library allocation
page read and write
62C801984000
trusted library allocation
page read and write
62C801C0C000
trusted library allocation
page read and write
62C800218000
trusted library allocation
page read and write
4EAC000
stack
page read and write
62C8001E8000
trusted library allocation
page read and write
1D254D62000
heap
page read and write
62C801308000
trusted library allocation
page read and write
1D254D30000
heap
page read and write
1D254D49000
heap
page read and write
3923000
heap
page read and write
62C801554000
trusted library allocation
page read and write
4F0800390000
trusted library allocation
page read and write
62C8015EC000
trusted library allocation
page read and write
62C801B0C000
trusted library allocation
page read and write
1D255294000
heap
page read and write
1D254D35000
heap
page read and write
1D254D33000
heap
page read and write
1D254D38000
heap
page read and write
7D74002C8000
trusted library allocation
page read and write
62C80020C000
trusted library allocation
page read and write
46E1000
heap
page read and write
1D254D43000
heap
page read and write
62C800D24000
trusted library allocation
page read and write
402A000
heap
page read and write
62C801984000
trusted library allocation
page read and write
1D254D6E000
heap
page read and write
62C801A5C000
trusted library allocation
page read and write
34DB000
heap
page read and write
1D254D38000
heap
page read and write
1D254D33000
heap
page read and write
1D254D43000
heap
page read and write
1D254D65000
heap
page read and write
1D254D33000
heap
page read and write
62C800D34000
trusted library allocation
page read and write
62C80034C000
trusted library allocation
page read and write
3579000
heap
page read and write
1D254D39000
heap
page read and write
1D254D38000
heap
page read and write
51E000
heap
page read and write
62C801AA4000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
62C801884000
trusted library allocation
page read and write
62C801A24000
trusted library allocation
page read and write
62C8015D4000
trusted library allocation
page read and write
1D254D4C000
heap
page read and write
62C800228000
trusted library allocation
page read and write
62C8001D0000
trusted library allocation
page read and write
62C801784000
trusted library allocation
page read and write
62C801778000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
62C8015F4000
trusted library allocation
page read and write
62C801618000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
343D000
heap
page read and write
1D254D6E000
heap
page read and write
62C801AD4000
trusted library allocation
page read and write
4000000
heap
page read and write
62C80141C000
trusted library allocation
page read and write
4F08006E0000
trusted library allocation
page read and write
1D254D7F000
heap
page read and write
1D254D3B000
heap
page read and write
1D254D46000
heap
page read and write
3330000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
2E70000
heap
page read and write
1D254D38000
heap
page read and write
62C800C65000
trusted library allocation
page read and write
4F080060C000
trusted library allocation
page read and write
4F08006B8000
trusted library allocation
page read and write
62C800A9C000
trusted library allocation
page read and write
1F0000
heap
page read and write
1D254D5F000
heap
page read and write
5E2000
heap
page read and write
4DAC000
unkown
page read and write
518000
heap
page read and write
4F0800788000
trusted library allocation
page read and write
62C801A78000
trusted library allocation
page read and write
1D254D47000
heap
page read and write
62C801308000
trusted library allocation
page read and write
318F000
heap
page read and write
1D254D3A000
heap
page read and write
62C80186C000
trusted library allocation
page read and write
62C80171C000
trusted library allocation
page read and write
62C800C60000
trusted library allocation
page read and write
30B0000
heap
page read and write
62C80039C000
trusted library allocation
page read and write
5E8000
heap
page read and write
1D254D33000
heap
page read and write
1D254D60000
heap
page read and write
62C8016A4000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D3B000
heap
page read and write
62C800A30000
trusted library allocation
page read and write
3464000
heap
page read and write
1D254D33000
heap
page read and write
350C000
heap
page read and write
1D254D53000
heap
page read and write
62C801ACC000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
62C800FC0000
trusted library allocation
page read and write
62C801A20000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
46B7000
heap
page read and write
4F080040C000
trusted library allocation
page read and write
62C801B4C000
trusted library allocation
page read and write
62C801A4C000
trusted library allocation
page read and write
62C8012A8000
trusted library allocation
page read and write
4F080033C000
trusted library allocation
page read and write
2CE0000
remote allocation
page read and write
62C801AC0000
trusted library allocation
page read and write
7D74002E4000
trusted library allocation
page read and write
62C8002F4000
trusted library allocation
page read and write
62C801058000
trusted library allocation
page read and write
352C000
heap
page read and write
62C800D3C000
trusted library allocation
page read and write
62C801A0C000
trusted library allocation
page read and write
62C801CAD000
trusted library allocation
page read and write
62C80039C000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C8018B8000
trusted library allocation
page read and write
1D254D28000
heap
page read and write
14C000
stack
page read and write
4F0800704000
trusted library allocation
page read and write
313A000
heap
page read and write
1D254D41000
heap
page read and write
3516000
heap
page read and write
62C8014A4000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
5E1000
heap
page read and write
62C801B9C000
trusted library allocation
page read and write
62C801630000
trusted library allocation
page read and write
1D254D65000
heap
page read and write
62C800D70000
trusted library allocation
page read and write
62C800210000
trusted library allocation
page read and write
4F0800424000
trusted library allocation
page read and write
62C8001D4000
trusted library allocation
page read and write
3568000
heap
page read and write
62C801574000
trusted library allocation
page read and write
62C801074000
trusted library allocation
page read and write
5373000
heap
page read and write
4F08006D4000
trusted library allocation
page read and write
62C800F98000
trusted library allocation
page read and write
62C8017E4000
trusted library allocation
page read and write
62C800C98000
trusted library allocation
page read and write
62C8019E8000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C80204F000
trusted library allocation
page read and write
62C800D3C000
trusted library allocation
page read and write
62C80160C000
trusted library allocation
page read and write
62C8019A4000
trusted library allocation
page read and write
62C8013B0000
trusted library allocation
page read and write
62C800B84000
trusted library allocation
page read and write
2CE0000
remote allocation
page read and write
1D254D2D000
heap
page read and write
1D254D41000
heap
page read and write
62C801568000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
2B3C000
stack
page read and write
62C800A30000
trusted library allocation
page read and write
62C801544000
trusted library allocation
page read and write
62C8003B0000
trusted library allocation
page read and write
4F08006FC000
trusted library allocation
page read and write
1D254D47000
heap
page read and write
1D254D33000
heap
page read and write
40DF000
heap
page read and write
4F0800688000
trusted library allocation
page read and write
21BE000
stack
page read and write
62C80172C000
trusted library allocation
page read and write
1D254D46000
heap
page read and write
7D74002BC000
trusted library allocation
page read and write
62C801844000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
570000
heap
page read and write
62C801108000
trusted library allocation
page read and write
615000
heap
page read and write
4721000
heap
page read and write
62C800D24000
trusted library allocation
page read and write
62C800338000
trusted library allocation
page read and write
62C801984000
trusted library allocation
page read and write
4F08006E8000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C801048000
trusted library allocation
page read and write
1D254D3C000
heap
page read and write
62C80158C000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D41000
heap
page read and write
62C800D3C000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
62C801704000
trusted library allocation
page read and write
510000
heap
page read and write
1D254D3B000
heap
page read and write
62C801820000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
420000
unkown
page execute and read and write
62C80129C000
trusted library allocation
page read and write
62C800FA4000
trusted library allocation
page read and write
1D254D61000
heap
page read and write
28EE000
stack
page read and write
1D254D4A000
heap
page read and write
617000
heap
page read and write
62C800214000
trusted library allocation
page read and write
62C80170C000
trusted library allocation
page read and write
3878000
heap
page read and write
62C801058000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
62C8015A8000
trusted library allocation
page read and write
62C801868000
trusted library allocation
page read and write
62C801B38000
trusted library allocation
page read and write
62C801B3C000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
7D74002D8000
trusted library allocation
page read and write
4F0800330000
trusted library allocation
page read and write
592000
heap
page read and write
366B000
heap
page read and write
1D254D62000
heap
page read and write
62C800314000
trusted library allocation
page read and write
5E8000
heap
page read and write
30FB000
heap
page read and write
62C801428000
trusted library allocation
page read and write
62C801780000
trusted library allocation
page read and write
4F0800380000
trusted library allocation
page read and write
19F000
stack
page read and write
575000
heap
page read and write
62C8001F8000
trusted library allocation
page read and write
62C801BEC000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
3230000
heap
page read and write
34DE000
heap
page read and write
1D254D41000
heap
page read and write
2C7D000
stack
page read and write
62C8017D0000
trusted library allocation
page read and write
62C80000C000
trusted library allocation
page read and write
62C8017F8000
trusted library allocation
page read and write
62C801650000
trusted library allocation
page read and write
4796000
heap
page read and write
62C800EF0000
trusted library allocation
page read and write
62C800D34000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D3B000
heap
page read and write
1D2552D3000
heap
page read and write
550000
heap
page read and write
62C8019E4000
trusted library allocation
page read and write
7D74002BC000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D47000
heap
page read and write
1D254D3B000
heap
page read and write
1D254D60000
heap
page read and write
62C800E6C000
trusted library allocation
page read and write
4F0800684000
trusted library allocation
page read and write
62C801AE8000
trusted library allocation
page read and write
4F0800654000
trusted library allocation
page read and write
62C801570000
trusted library allocation
page read and write
62C800D3C000
trusted library allocation
page read and write
62C801558000
trusted library allocation
page read and write
35FF000
heap
page read and write
1D254D41000
heap
page read and write
30D9000
heap
page read and write
62C801A3C000
trusted library allocation
page read and write
62C8010B0000
trusted library allocation
page read and write
1D254D4E000
heap
page read and write
4F0800320000
trusted library allocation
page read and write
62C8002A4000
trusted library allocation
page read and write
62C80120C000
trusted library allocation
page read and write
18C000
stack
page read and write
4F08003EC000
trusted library allocation
page read and write
62C801758000
trusted library allocation
page read and write
62C801428000
trusted library allocation
page read and write
4F0800354000
trusted library allocation
page read and write
62C800224000
trusted library allocation
page read and write
62C801640000
trusted library allocation
page read and write
62C80183C000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
62C800360000
trusted library allocation
page read and write
410A000
heap
page read and write
1D254D4E000
heap
page read and write
1D254D3B000
heap
page read and write
1D254D47000
heap
page read and write
22CC000
heap
page read and write
1D254D30000
heap
page read and write
1D254D38000
heap
page read and write
62C801858000
trusted library allocation
page read and write
4F0800330000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
62C801670000
trusted library allocation
page read and write
37ED000
heap
page read and write
62C800D3C000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D41000
heap
page read and write
3AF6000
heap
page read and write
1D254D41000
heap
page read and write
22BF000
stack
page read and write
62C801AD8000
trusted library allocation
page read and write
62C801890000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
5FF000
heap
page read and write
35F7000
heap
page read and write
62C801830000
trusted library allocation
page read and write
62C8017D4000
trusted library allocation
page read and write
62C8002A4000
trusted library allocation
page read and write
5E6000
heap
page read and write
1D254D41000
heap
page read and write
5E3000
heap
page read and write
62C800230000
trusted library allocation
page read and write
62C80140C000
trusted library allocation
page read and write
4115000
heap
page read and write
62C801628000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C801680000
trusted library allocation
page read and write
62C8019C4000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C8001D8000
trusted library allocation
page read and write
62C800360000
trusted library allocation
page read and write
4F0800630000
trusted library allocation
page read and write
35F0000
heap
page read and write
288F000
stack
page read and write
62C801708000
trusted library allocation
page read and write
1D254D60000
heap
page read and write
3B2D000
heap
page read and write
62C80132C000
trusted library allocation
page read and write
62C8002B4000
trusted library allocation
page read and write
610000
heap
page read and write
62C80049C000
trusted library allocation
page read and write
62C800354000
trusted library allocation
page read and write
4F0800368000
trusted library allocation
page read and write
4F0800668000
trusted library allocation
page read and write
2E71000
heap
page read and write
34D4000
heap
page read and write
62C8016C4000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
62C801A68000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
1D254D7F000
heap
page read and write
3495000
heap
page read and write
62C801548000
trusted library allocation
page read and write
62C801880000
trusted library allocation
page read and write
62C80039C000
trusted library allocation
page read and write
1D254D60000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
188000
stack
page read and write
3145000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
62C8015D8000
trusted library allocation
page read and write
62C8013EC000
trusted library allocation
page read and write
1D254D46000
heap
page read and write
535000
heap
page read and write
62C800A9C000
trusted library allocation
page read and write
62C8013C4000
trusted library allocation
page read and write
62C801E04000
trusted library allocation
page read and write
62C800EF0000
trusted library allocation
page read and write
62C800D24000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D41000
heap
page read and write
1D254D2D000
heap
page read and write
1D254D39000
heap
page read and write
1D254D47000
heap
page read and write
366E000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
62C801754000
trusted library allocation
page read and write
62C801854000
trusted library allocation
page read and write
62C8019C8000
trusted library allocation
page read and write
1D254D47000
heap
page read and write
1D254D41000
heap
page read and write
62C801644000
trusted library allocation
page read and write
62C8016C0000
trusted library allocation
page read and write
62C801B98000
trusted library allocation
page read and write
62C801840000
trusted library allocation
page read and write
344A000
heap
page read and write
351F000
heap
page read and write
62C8002A4000
trusted library allocation
page read and write
62C801388000
trusted library allocation
page read and write
62C801AC4000
trusted library allocation
page read and write
4F0800320000
trusted library allocation
page read and write
4F08006B0000
trusted library allocation
page read and write
1D254D3C000
heap
page read and write
1D254D33000
heap
page read and write
1D254D3C000
heap
page read and write
4F080033C000
trusted library allocation
page read and write
62C80162C000
trusted library allocation
page read and write
62C801850000
trusted library allocation
page read and write
62C8019A8000
trusted library allocation
page read and write
62C801A7C000
trusted library allocation
page read and write
62C800F4C000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D38000
heap
page read and write
62C801AE4000
trusted library allocation
page read and write
62C800A30000
trusted library allocation
page read and write
62C8001B4000
trusted library allocation
page read and write
62C801024000
trusted library allocation
page read and write
422000
unkown
page execute read
3738000
heap
page read and write
62C8002AA000
trusted library allocation
page read and write
30F4000
heap
page read and write
1D254D38000
heap
page read and write
46F7000
heap
page read and write
62C801A8C000
trusted library allocation
page read and write
62C8013D4000
trusted library allocation
page read and write
62C801A1C000
trusted library allocation
page read and write
62C8013DC000
trusted library allocation
page read and write
62C800C60000
trusted library allocation
page read and write
62C801A88000
trusted library allocation
page read and write
62C801A60000
trusted library allocation
page read and write
1D254D4A000
heap
page read and write
62C801714000
trusted library allocation
page read and write
62C801B40000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
35B0000
heap
page read and write
354B000
heap
page read and write
1D254D48000
heap
page read and write
840000
heap
page read and write
7D74002C0000
trusted library allocation
page read and write
4F0800320000
trusted library allocation
page read and write
312D000
heap
page read and write
62C800FCC000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
1D254D38000
heap
page read and write
62C800F74000
trusted library allocation
page read and write
62C8001EC000
trusted library allocation
page read and write
1D254D31000
heap
page read and write
1D254D43000
heap
page read and write
1D254D41000
heap
page read and write
1D254D5F000
heap
page read and write
62C8002A4000
trusted library allocation
page read and write
62C801648000
trusted library allocation
page read and write
498000
unkown
page readonly
62C800F98000
trusted library allocation
page read and write
62C801AD0000
trusted library allocation
page read and write
62C8019F8000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C8001F0000
trusted library allocation
page read and write
62C801B28000
trusted library allocation
page read and write
3187000
heap
page read and write
1D254D41000
heap
page read and write
4F0800658000
trusted library allocation
page read and write
54E000
stack
page read and write
62C8002C4000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
2FAE000
stack
page read and write
7D74002C0000
trusted library allocation
page read and write
3161000
heap
page read and write
1D254D33000
heap
page read and write
3514000
heap
page read and write
4F08002FC000
trusted library allocation
page read and write
4F08006D0000
trusted library allocation
page read and write
62C80039C000
trusted library allocation
page read and write
1D2591CB000
heap
page read and write
7D74002A0000
trusted library allocation
page read and write
1D254D39000
heap
page read and write
62C8001F4000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
1D254D3B000
heap
page read and write
62C800354000
trusted library allocation
page read and write
3157000
heap
page read and write
62C801024000
trusted library allocation
page read and write
59D000
heap
page read and write
62C8001E0000
trusted library allocation
page read and write
62C801870000
trusted library allocation
page read and write
62C801694000
trusted library allocation
page read and write
62C80180C000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C801AA0000
trusted library allocation
page read and write
36F0000
heap
page read and write
62C801728000
trusted library allocation
page read and write
62C800DE0000
trusted library allocation
page read and write
62C8010B0000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D3B000
heap
page read and write
34B4000
heap
page read and write
1D254D46000
heap
page read and write
1D254D38000
heap
page read and write
2D1E000
stack
page read and write
62C80156C000
trusted library allocation
page read and write
62C801438000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
354D000
heap
page read and write
30AE000
stack
page read and write
4F0800698000
trusted library allocation
page read and write
3564000
heap
page read and write
351D000
heap
page read and write
3595000
heap
page read and write
4F0800664000
trusted library allocation
page read and write
62C8017F4000
trusted library allocation
page read and write
32F0000
heap
page read and write
62C8001DC000
trusted library allocation
page read and write
4F0800644000
trusted library allocation
page read and write
62C801864000
trusted library allocation
page read and write
3570000
heap
page read and write
1D254D43000
heap
page read and write
4C0000
heap
page read and write
62C800D34000
trusted library allocation
page read and write
62C800B44000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
1D254D41000
heap
page read and write
617000
heap
page read and write
62C80132C000
trusted library allocation
page read and write
278E000
stack
page read and write
50E000
stack
page read and write
5F4000
heap
page read and write
62C80132C000
trusted library allocation
page read and write
7D74002C0000
trusted library allocation
page read and write
3542000
heap
page read and write
3470000
heap
page read and write
31AE000
heap
page read and write
30D3000
heap
page read and write
5E1000
heap
page read and write
62C801A40000
trusted library allocation
page read and write
62C8002A4000
trusted library allocation
page read and write
1D254D46000
heap
page read and write
5E9000
heap
page read and write
62C8016FC000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C800314000
trusted library allocation
page read and write
4F0800700000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D46000
heap
page read and write
1D254D41000
heap
page read and write
4F0800408000
trusted library allocation
page read and write
62C801B74000
trusted library allocation
page read and write
62C8017BC000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
1D254D33000
heap
page read and write
1D254D41000
heap
page read and write
4F0800614000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
1D254D2E000
heap
page read and write
617000
heap
page read and write
7D74002B0000
trusted library allocation
page read and write
1D255242000
heap
page read and write
1D254D39000
heap
page read and write
1D2552B8000
heap
page read and write
1D254D41000
heap
page read and write
316B000
heap
page read and write
323A000
heap
page read and write
62C801C68000
trusted library allocation
page read and write
367D000
heap
page read and write
62C8002F7000
trusted library allocation
page read and write
62C801AC8000
trusted library allocation
page read and write
62C801AF4000
trusted library allocation
page read and write
98F000
stack
page read and write
5EB000
heap
page read and write
1D254D43000
heap
page read and write
1D254D35000
heap
page read and write
1D254D41000
heap
page read and write
1D254D38000
heap
page read and write
34B6000
heap
page read and write
62C8001C8000
trusted library allocation
page read and write
1D254D60000
heap
page read and write
264E000
stack
page read and write
406A000
heap
page read and write
404A000
heap
page read and write
62C8015BC000
trusted library allocation
page read and write
1D254D5B000
heap
page read and write
82F000
stack
page read and write
1D254D43000
heap
page read and write
62C801B74000
trusted library allocation
page read and write
62C8002A8000
trusted library allocation
page read and write
1D255286000
heap
page read and write
1D254D33000
heap
page read and write
62C801A64000
trusted library allocation
page read and write
62C801C50000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D255261000
heap
page read and write
1D2591B8000
heap
page read and write
1D254D33000
heap
page read and write
62C800C7C000
trusted library allocation
page read and write
4F080039C000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
7D74002A0000
trusted library allocation
page read and write
62C800340000
trusted library allocation
page read and write
62C801624000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
62C801B18000
trusted library allocation
page read and write
2170000
heap
page read and write
412A000
heap
page read and write
1D254D46000
heap
page read and write
29EF000
stack
page read and write
62C800C65000
trusted library allocation
page read and write
62C8016A8000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
2CE0000
remote allocation
page read and write
4008000
heap
page read and write
3181000
heap
page read and write
3742000
heap
page read and write
5DF000
heap
page read and write
400000
unkown
page readonly
62C800FC0000
trusted library allocation
page read and write
62C80188C000
trusted library allocation
page read and write
618000
heap
page read and write
4015000
heap
page read and write
1D254D38000
heap
page read and write
7D74002BC000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
4F0800734000
trusted library allocation
page read and write
35C5000
heap
page read and write
62C801CAD000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
1D254D3B000
heap
page read and write
62C800A30000
trusted library allocation
page read and write
4075000
heap
page read and write
1D254D43000
heap
page read and write
62C801810000
trusted library allocation
page read and write
5FF000
heap
page read and write
3BC5000
heap
page read and write
3123000
heap
page read and write
62C801834000
trusted library allocation
page read and write
62C801998000
trusted library allocation
page read and write
4F0800760000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D7F000
heap
page read and write
62C800A9C000
trusted library allocation
page read and write
62C800D24000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
1D254D43000
heap
page read and write
62C8016F8000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
62C8017F0000
trusted library allocation
page read and write
7D74002BC000
trusted library allocation
page read and write
3506000
heap
page read and write
1D254D46000
heap
page read and write
1D254D60000
heap
page read and write
1D254D41000
heap
page read and write
62C8012DC000
trusted library allocation
page read and write
62C801748000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
4F0800418000
trusted library allocation
page read and write
4857000
heap
page read and write
3802000
heap
page read and write
1D254D38000
heap
page read and write
47E1000
heap
page read and write
46BF000
heap
page read and write
1D254D33000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
310B000
heap
page read and write
62C8016E4000
trusted library allocation
page read and write
62C801350000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C80165C000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
62C800B84000
trusted library allocation
page read and write
62C801B80000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
4F080069C000
trusted library allocation
page read and write
62C801AF8000
trusted library allocation
page read and write
3142000
heap
page read and write
1D254D3B000
heap
page read and write
62C800C5C000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C8016BC000
trusted library allocation
page read and write
62C800D3C000
trusted library allocation
page read and write
3111000
heap
page read and write
5E5000
heap
page read and write
1D254D38000
heap
page read and write
62C8002A4000
trusted library allocation
page read and write
5BE000
stack
page read and write
1D254D6E000
heap
page read and write
3818000
heap
page read and write
3137000
heap
page read and write
62C8015B8000
trusted library allocation
page read and write
62C8002A4000
trusted library allocation
page read and write
62C801730000
trusted library allocation
page read and write
3476000
heap
page read and write
1D254D43000
heap
page read and write
37F8000
heap
page read and write
62C80177C000
trusted library allocation
page read and write
3581000
heap
page read and write
62C801578000
trusted library allocation
page read and write
274F000
stack
page read and write
62C80032C000
trusted library allocation
page read and write
1D254D7F000
heap
page read and write
62C801750000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
4D0000
heap
page read and write
1D254D3B000
heap
page read and write
5A4000
heap
page read and write
62C801024000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
3798000
heap
page read and write
7D74002C0000
trusted library allocation
page read and write
18A000
stack
page read and write
3BD5000
heap
page read and write
62C8015B4000
trusted library allocation
page read and write
3B4D000
heap
page read and write
1D254D46000
heap
page read and write
62C800D24000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C801690000
trusted library allocation
page read and write
62C8002A4000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C801390000
trusted library allocation
page read and write
1D254D47000
heap
page read and write
3487000
heap
page read and write
1D254D64000
heap
page read and write
4F0800730000
trusted library allocation
page read and write
62C80021C000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
62C801BEC000
trusted library allocation
page read and write
4F08006B4000
trusted library allocation
page read and write
62C801B94000
trusted library allocation
page read and write
62C8016D8000
trusted library allocation
page read and write
62C800FC0000
trusted library allocation
page read and write
62C800E68000
trusted library allocation
page read and write
62C800D24000
trusted library allocation
page read and write
62C801AE4000
trusted library allocation
page read and write
1D254D28000
heap
page read and write
1D254D33000
heap
page read and write
72E000
stack
page read and write
62C801458000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
62C8013F4000
trusted library allocation
page read and write
498000
unkown
page readonly
3B15000
heap
page read and write
3103000
heap
page read and write
5FF000
heap
page read and write
1D254D31000
heap
page read and write
411F000
heap
page read and write
4F0800750000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
1D254D38000
heap
page read and write
62C801C18000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
1D254D33000
heap
page read and write
31B0000
trusted library allocation
page read and write
1D25526B000
heap
page read and write
378D000
heap
page read and write
22CE000
heap
page read and write
1D254D43000
heap
page read and write
5E3000
heap
page read and write
2A3C000
stack
page read and write
472C000
heap
page read and write
62C80034C000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
5F7000
heap
page read and write
62C800F4C000
trusted library allocation
page read and write
62C801B50000
trusted library allocation
page read and write
62C801074000
trusted library allocation
page read and write
347E000
heap
page read and write
3539000
heap
page read and write
62C801544000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
1D254D43000
heap
page read and write
4F0800640000
trusted library allocation
page read and write
61B400234000
direct allocation
page read and write
1D254D2B000
heap
page read and write
62C8011C8000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
4F0800310000
trusted library allocation
page read and write
62C800C65000
trusted library allocation
page read and write
4F08006E4000
trusted library allocation
page read and write
62C801B10000
trusted library allocation
page read and write
62C80136C000
trusted library allocation
page read and write
1D254D47000
heap
page read and write
3444000
heap
page read and write
1D254D41000
heap
page read and write
62C801710000
trusted library allocation
page read and write
A60000
heap
page read and write
1D254D41000
heap
page read and write
3178000
heap
page read and write
62C800D24000
trusted library allocation
page read and write
1D254D38000
heap
page read and write
62C801588000
trusted library allocation
page read and write
62C80159C000
trusted library allocation
page read and write
62C8015F0000
trusted library allocation
page read and write
48A1000
heap
page read and write
4F0800610000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
62C801B08000
trusted library allocation
page read and write
5A1000
heap
page read and write
62C801B64000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
1D254D3B000
heap
page read and write
62C8016CC000
trusted library allocation
page read and write
346C000
heap
page read and write
62C80140C000
trusted library allocation
page read and write
62C801A10000
trusted library allocation
page read and write
1D254D41000
heap
page read and write
62C8016C8000
trusted library allocation
page read and write
1D254D47000
heap
page read and write
2E60000
heap
page read and write
18C000
stack
page read and write
62C800A30000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
3106000
heap
page read and write
3189000
heap
page read and write
1D254D43000
heap
page read and write
62C800354000
trusted library allocation
page read and write
62C8002A8000
trusted library allocation
page read and write
3AFC000
heap
page read and write
62C8017A4000
trusted library allocation
page read and write
2E71000
heap
page read and write
4F080075C000
trusted library allocation
page read and write
38B8000
heap
page read and write
1D254D38000
heap
page read and write
1D254D46000
heap
page read and write
1D254D43000
heap
page read and write
4F080080C000
trusted library allocation
page read and write
34AD000
heap
page read and write
62C80168C000
trusted library allocation
page read and write
62C800D24000
trusted library allocation
page read and write
88E000
stack
page read and write
1D254D41000
heap
page read and write
355B000
heap
page read and write
62C801A9C000
trusted library allocation
page read and write
5F3000
heap
page read and write
1D254D46000
heap
page read and write
62C800FC0000
trusted library allocation
page read and write
3554000
heap
page read and write
62C801A34000
trusted library allocation
page read and write
1D254D2D000
heap
page read and write
62C8001E4000
trusted library allocation
page read and write
30DE000
heap
page read and write
62C8015C0000
trusted library allocation
page read and write
313F000
heap
page read and write
1D254D38000
heap
page read and write
62C801160000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
62C800F74000
trusted library allocation
page read and write
62C801C64000
trusted library allocation
page read and write
1D254D43000
heap
page read and write
3BCD000
heap
page read and write
47D7000
heap
page read and write
62C800D3C000
trusted library allocation
page read and write
62C800D3C000
trusted library allocation
page read and write
2130000
heap
page read and write
1D254D43000
heap
page read and write
1D254D4A000
heap
page read and write
4F0800678000
trusted library allocation
page read and write
372F000
heap
page read and write
62C8012C4000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
354F000
heap
page read and write
5FF000
stack
page read and write
1D254D33000
heap
page read and write
3504000
heap
page read and write
1D254D41000
heap
page read and write
62C80022C000
trusted library allocation
page read and write
1D254D3B000
heap
page read and write
62C8015E8000
trusted library allocation
page read and write
3533000
heap
page read and write
46D7000
heap
page read and write
1D254D80000
heap
page read and write
4F0800694000
trusted library allocation
page read and write
35E7000
heap
page read and write
62C801A38000
trusted library allocation
page read and write
62C801AF0000
trusted library allocation
page read and write
1D254D36000
heap
page read and write
62C800D24000
trusted library allocation
page read and write
4F0800248000
trusted library allocation
page read and write
5E2000
heap
page read and write
1D254D43000
heap
page read and write
1D254D7F000
heap
page read and write
62C8018A4000
trusted library allocation
page read and write
4F0800354000
trusted library allocation
page read and write
412000
unkown
page execute read
310E000
heap
page read and write
4F08006C8000
trusted library allocation
page read and write
1D254D33000
heap
page read and write
62C800F74000
trusted library allocation
page read and write
62C800CD0000
trusted library allocation
page read and write
There are 1029 hidden memdumps, click here to show them.