Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TJXpRilNkh.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TJXpRilNkh.exe_7798d0edf58a88474c55bd682fcb8233a8db919a_0fb3adf6_f232989f-0a90-4f63-b4c9-acad96803681\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TJXpRilNkh.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER443E.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Oct 31 18:59:24 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER46FE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER476D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5vhrkizl.hze.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cnr3mf5r.xku.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0zwcvow.gwj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gcn5cwp2.nl0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idz1z0tt.u4i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_igiwb250.hyz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_irloizci.3hx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kepp52vb.3u0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mknoxajp.kba.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nbrft2t1.pjc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w3jmfkpc.cyd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3rgcjxd.zqo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TJXpRilNkh.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 17:57:32
2024, mtime=Thu Oct 31 17:57:34 2024, atime=Thu Oct 31 17:57:34 2024, length=76800, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TJXpRilNkh.exe
|
"C:\Users\user\Desktop\TJXpRilNkh.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\TJXpRilNkh.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'TJXpRilNkh.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\TJXpRilNkh.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "TJXpRilNkh" /tr "C:\Users\user\AppData\Roaming\TJXpRilNkh.exe"
|
||
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
"C:\Users\user\AppData\Roaming\TJXpRilNkh.exe"
|
||
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
"C:\Users\user\AppData\Roaming\TJXpRilNkh.exe"
|
||
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
||
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5236 -s 2964
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
https://i.ibb.co
|
unknown
|
||
http://i.ibb.co
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://i.ibb.co/Dwrj41N/Image.png
|
169.197.85.95
|
||
http://upx.sf.net
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
i.ibb.co
|
169.197.85.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
169.197.85.95
|
i.ibb.co
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
TJXpRilNkh
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
ProgramId
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
FileId
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
LongPathHash
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
Name
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
OriginalFileName
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
Publisher
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
Version
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
BinFileVersion
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
BinaryType
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
ProductName
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
ProductVersion
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
LinkDate
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
BinProductVersion
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
AppxPackageFullName
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
Size
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
Language
|
||
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
|
Usn
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5F2000
|
unkown
|
page readonly
|
||
1AA1D000
|
stack
|
page read and write
|
||
7FF84913C000
|
trusted library allocation
|
page read and write
|
||
88D55AE000
|
stack
|
page read and write
|
||
7FF8490D8000
|
trusted library allocation
|
page read and write
|
||
7FF849099000
|
trusted library allocation
|
page read and write
|
||
2B86CFF000
|
stack
|
page read and write
|
||
193FBF40000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
236E382D000
|
trusted library allocation
|
page read and write
|
||
260FAC5C000
|
heap
|
page read and write
|
||
260FAC45000
|
heap
|
page read and write
|
||
236E05A0000
|
heap
|
page read and write
|
||
236FA46D000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
112F000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
236E05C0000
|
heap
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page read and write
|
||
1B4EF000
|
stack
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
260FA3B8000
|
heap
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
260FA9CD000
|
heap
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
BF52AB7000
|
stack
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
193F9DC0000
|
heap
|
page read and write
|
||
236E0592000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
236E3081000
|
trusted library allocation
|
page read and write
|
||
236FA5E7000
|
heap
|
page execute and read and write
|
||
2B86EBE000
|
stack
|
page read and write
|
||
260804CE000
|
trusted library allocation
|
page read and write
|
||
236E2F6B000
|
trusted library allocation
|
page read and write
|
||
19380F6C000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
236FA7EE000
|
heap
|
page read and write
|
||
2932000
|
trusted library allocation
|
page read and write
|
||
260813C8000
|
trusted library allocation
|
page read and write
|
||
236FA4DA000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1938186C000
|
trusted library allocation
|
page read and write
|
||
260902F4000
|
trusted library allocation
|
page read and write
|
||
193F9E96000
|
heap
|
page read and write
|
||
7FF849001000
|
trusted library allocation
|
page read and write
|
||
236E04BF000
|
heap
|
page read and write
|
||
193FC179000
|
heap
|
page read and write
|
||
88D5CF8000
|
stack
|
page read and write
|
||
1C72D000
|
stack
|
page read and write
|
||
7DF3FEE40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
193FC203000
|
heap
|
page read and write
|
||
2B86BFE000
|
stack
|
page read and write
|
||
193FC143000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
236F22FC000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1BEF0000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
260902EC000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
7FF84919D000
|
trusted library allocation
|
page read and write
|
||
193F9EF2000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
236E1FC1000
|
trusted library allocation
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
193804CD000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
2B87C8C000
|
stack
|
page read and write
|
||
236E1E60000
|
trusted library allocation
|
page read and write
|
||
236FA6F4000
|
heap
|
page read and write
|
||
193F9E72000
|
heap
|
page read and write
|
||
1B23D000
|
stack
|
page read and write
|
||
27FC000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
236FA540000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
BF529F8000
|
stack
|
page read and write
|
||
260FA9B1000
|
heap
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
19381E2A000
|
trusted library allocation
|
page read and write
|
||
236F1FF1000
|
trusted library allocation
|
page read and write
|
||
BF53A8C000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
1B670000
|
heap
|
page execute and read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
236F22AD000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
236F9FCD000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
193FC3F0000
|
heap
|
page read and write
|
||
26080088000
|
trusted library allocation
|
page read and write
|
||
BF53A8E000
|
stack
|
page read and write
|
||
1AC6D000
|
stack
|
page read and write
|
||
2B870BF000
|
stack
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
193FB944000
|
heap
|
page read and write
|
||
236E1F70000
|
heap
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
12CB8000
|
trusted library allocation
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
260F8900000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490A8000
|
trusted library allocation
|
page read and write
|
||
19381DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
26081E04000
|
trusted library allocation
|
page read and write
|
||
236FA410000
|
heap
|
page read and write
|
||
28B2000
|
trusted library allocation
|
page read and write
|
||
260F89E5000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
heap
|
page read and write
|
||
2B871BF000
|
stack
|
page read and write
|
||
88D59FF000
|
stack
|
page read and write
|
||
236E2F63000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
193FC115000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
1170000
|
heap
|
page read and write
|
||
26080BF9000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF848D61000
|
trusted library allocation
|
page read and write
|
||
12CB1000
|
trusted library allocation
|
page read and write
|
||
88D5C77000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
28BC000
|
trusted library allocation
|
page read and write
|
||
260FAC61000
|
heap
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
19390021000
|
trusted library allocation
|
page read and write
|
||
260F89DF000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
193811E0000
|
trusted library allocation
|
page read and write
|
||
88D5DFE000
|
stack
|
page read and write
|
||
1AE5F000
|
stack
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1B71E000
|
stack
|
page read and write
|
||
7FF848E66000
|
trusted library allocation
|
page execute and read and write
|
||
193F9E57000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1AF40000
|
heap
|
page execute and read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
1707C370000
|
heap
|
page read and write
|
||
1C41B000
|
heap
|
page read and write
|
||
193FC0BB000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
60C000
|
heap
|
page read and write
|
||
193FB930000
|
heap
|
page read and write
|
||
7FF84913A000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
19380F71000
|
trusted library allocation
|
page read and write
|
||
88D6A49000
|
stack
|
page read and write
|
||
1B1AF000
|
stack
|
page read and write
|
||
12853000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
236E28D9000
|
trusted library allocation
|
page read and write
|
||
1B49D000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
193FB97C000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
12B23000
|
trusted library allocation
|
page read and write
|
||
88D5B79000
|
stack
|
page read and write
|
||
260F8960000
|
trusted library section
|
page read and write
|
||
1938007F000
|
trusted library allocation
|
page read and write
|
||
1BD9B000
|
stack
|
page read and write
|
||
2B86FBA000
|
stack
|
page read and write
|
||
236FA5E0000
|
heap
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1B9FF000
|
stack
|
page read and write
|
||
88D6ACD000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
236E05C5000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2B87C0F000
|
stack
|
page read and write
|
||
BF53A0C000
|
stack
|
page read and write
|
||
7FF848F58000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
260FAA20000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
88D55EE000
|
stack
|
page read and write
|
||
BF52C3E000
|
stack
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1939006E000
|
trusted library allocation
|
page read and write
|
||
7FF8490A2000
|
trusted library allocation
|
page read and write
|
||
7FF848E69000
|
trusted library allocation
|
page execute and read and write
|
||
1B3AE000
|
stack
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
260FA3A5000
|
heap
|
page read and write
|
||
193FA040000
|
heap
|
page readonly
|
||
193902E7000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
2608186B000
|
trusted library allocation
|
page read and write
|
||
236E0594000
|
heap
|
page read and write
|
||
7FF8490D2000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
641000
|
heap
|
page read and write
|
||
193F9E5D000
|
heap
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
88D5BF7000
|
stack
|
page read and write
|
||
236E311E000
|
trusted library allocation
|
page read and write
|
||
236E3DA1000
|
trusted library allocation
|
page read and write
|
||
19380F68000
|
trusted library allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
193FB993000
|
heap
|
page read and write
|
||
19381069000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
236FA869000
|
heap
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
236E319A000
|
trusted library allocation
|
page read and write
|
||
BF5287E000
|
stack
|
page read and write
|
||
2B8713E000
|
stack
|
page read and write
|
||
19381E05000
|
trusted library allocation
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
260FAC54000
|
heap
|
page read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
236FA472000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1B4C1000
|
heap
|
page read and write
|
||
19380001000
|
trusted library allocation
|
page read and write
|
||
125A8000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
236E2BF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
88D58FE000
|
stack
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF849133000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
260FABC9000
|
heap
|
page read and write
|
||
236E3266000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
2B86E79000
|
stack
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
260810C4000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
260F8C50000
|
trusted library allocation
|
page read and write
|
||
1B14F000
|
stack
|
page read and write
|
||
7FF848EF2000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
260FAB82000
|
heap
|
page read and write
|
||
7FF8490A3000
|
trusted library allocation
|
page read and write
|
||
260F8C40000
|
heap
|
page readonly
|
||
236E3DE6000
|
trusted library allocation
|
page read and write
|
||
D11000
|
stack
|
page read and write
|
||
1B0AD000
|
stack
|
page read and write
|
||
1ABD4000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
1938109B000
|
trusted library allocation
|
page read and write
|
||
1BA8F000
|
stack
|
page read and write
|
||
236FA7BD000
|
heap
|
page read and write
|
||
193F9E10000
|
heap
|
page read and write
|
||
193FBA23000
|
heap
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
193FB9A3000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page execute and read and write
|
||
260FA96A000
|
heap
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
193FBA30000
|
heap
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
1C1EE000
|
stack
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
1938130D000
|
trusted library allocation
|
page read and write
|
||
193F9DA0000
|
heap
|
page read and write
|
||
2B86A73000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
28C4000
|
trusted library allocation
|
page read and write
|
||
7FF8491CD000
|
trusted library allocation
|
page read and write
|
||
88D5523000
|
stack
|
page read and write
|
||
236E37EC000
|
trusted library allocation
|
page read and write
|
||
26081033000
|
trusted library allocation
|
page read and write
|
||
1707C350000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
193FB9D6000
|
heap
|
page read and write
|
||
1B6F0000
|
heap
|
page read and write
|
||
236F22AB000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
19380F79000
|
trusted library allocation
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
591000
|
stack
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
97E000
|
heap
|
page read and write
|
||
28B4000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
1B420000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
260811DD000
|
trusted library allocation
|
page read and write
|
||
260FAD80000
|
heap
|
page read and write
|
||
606000
|
unkown
|
page readonly
|
||
19390001000
|
trusted library allocation
|
page read and write
|
||
25AC000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
236FA5F0000
|
heap
|
page read and write
|
||
236FA87C000
|
heap
|
page read and write
|
||
19390305000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
236E052A000
|
heap
|
page read and write
|
||
19381129000
|
trusted library allocation
|
page read and write
|
||
1C3EE000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF849166000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1C418000
|
heap
|
page read and write
|
||
26081098000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
193FB870000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
193FC105000
|
heap
|
page read and write
|
||
236E3915000
|
trusted library allocation
|
page read and write
|
||
1A850000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
236E2FF1000
|
trusted library allocation
|
page read and write
|
||
D43000
|
trusted library allocation
|
page read and write
|
||
1B24E000
|
stack
|
page read and write
|
||
1707C3AE000
|
heap
|
page read and write
|
||
BF5297D000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
193FA030000
|
trusted library allocation
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
260FABF7000
|
heap
|
page read and write
|
||
88D6B4E000
|
stack
|
page read and write
|
||
236FA449000
|
heap
|
page read and write
|
||
7FF470840000
|
trusted library allocation
|
page execute and read and write
|
||
260F8800000
|
heap
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
7FF848D9B000
|
trusted library allocation
|
page execute and read and write
|
||
1ADDD000
|
stack
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
236E0350000
|
heap
|
page read and write
|
||
26081953000
|
trusted library allocation
|
page read and write
|
||
2D92000
|
trusted library allocation
|
page read and write
|
||
236FA70C000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
19380229000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
BF5380E000
|
stack
|
page read and write
|
||
193F9D90000
|
heap
|
page read and write
|
||
26081216000
|
trusted library allocation
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
236F234C000
|
trusted library allocation
|
page read and write
|
||
260FAD00000
|
trusted library allocation
|
page read and write
|
||
236FA784000
|
heap
|
page read and write
|
||
193F9E17000
|
heap
|
page read and write
|
||
7FF8490A5000
|
trusted library allocation
|
page read and write
|
||
236E04E7000
|
heap
|
page read and write
|
||
2608022A000
|
trusted library allocation
|
page read and write
|
||
236E2EB9000
|
trusted library allocation
|
page read and write
|
||
19380F8A000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
236F202D000
|
trusted library allocation
|
page read and write
|
||
260FA9F0000
|
heap
|
page execute and read and write
|
||
12858000
|
trusted library allocation
|
page read and write
|
||
26090031000
|
trusted library allocation
|
page read and write
|
||
236E2FC5000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
193FC14D000
|
heap
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
260F89FD000
|
heap
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
236E04C4000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF849099000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
2B86D77000
|
stack
|
page read and write
|
||
236E0620000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
19380A53000
|
trusted library allocation
|
page read and write
|
||
1C2ED000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
260812AB000
|
trusted library allocation
|
page read and write
|
||
260FA2C0000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
236E3055000
|
trusted library allocation
|
page read and write
|
||
236E0450000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
193FC11D000
|
heap
|
page read and write
|
||
2609006E000
|
trusted library allocation
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
1C76E000
|
stack
|
page read and write
|
||
193FC040000
|
heap
|
page execute and read and write
|
||
167ABEF000
|
stack
|
page read and write
|
||
19380F86000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
193FA070000
|
heap
|
page read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
260FA5A0000
|
heap
|
page execute and read and write
|
||
E50000
|
heap
|
page read and write
|
||
2608130D000
|
trusted library allocation
|
page read and write
|
||
26081786000
|
trusted library allocation
|
page read and write
|
||
236E32FB000
|
trusted library allocation
|
page read and write
|
||
C2F000
|
stack
|
page read and write
|
||
26081127000
|
trusted library allocation
|
page read and write
|
||
260FAC1E000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page execute and read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
260902E7000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2B87E0C000
|
stack
|
page read and write
|
||
1B4C6000
|
heap
|
page read and write
|
||
7FF8491C6000
|
trusted library allocation
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
193FA010000
|
trusted library allocation
|
page read and write
|
||
260F8980000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F21000
|
trusted library allocation
|
page read and write
|
||
BF523C3000
|
stack
|
page read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
741000
|
stack
|
page read and write
|
||
193FC119000
|
heap
|
page read and write
|
||
193FC21A000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
26090021000
|
trusted library allocation
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page read and write
|
||
971000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1BE98000
|
stack
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
260F8A24000
|
heap
|
page read and write
|
||
7FF848EF2000
|
trusted library allocation
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
236FA46B000
|
heap
|
page read and write
|
||
236E0680000
|
heap
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
19380F7D000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
236FA83B000
|
heap
|
page read and write
|
||
236FA78D000
|
heap
|
page read and write
|
||
127F8000
|
trusted library allocation
|
page read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
236E248F000
|
trusted library allocation
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
7DF3FEE30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
236E2047000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page execute and read and write
|
||
88D5EFB000
|
stack
|
page read and write
|
||
260902EE000
|
trusted library allocation
|
page read and write
|
||
193FB920000
|
heap
|
page execute and read and write
|
||
19380F75000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
7FF8490C4000
|
trusted library allocation
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
193FC225000
|
heap
|
page read and write
|
||
7FF8490A8000
|
trusted library allocation
|
page read and write
|
||
26090001000
|
trusted library allocation
|
page read and write
|
||
193F9E51000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
88D5AFE000
|
stack
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
19381065000
|
trusted library allocation
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
236E1F90000
|
heap
|
page execute and read and write
|
||
66C000
|
heap
|
page read and write
|
||
26081E29000
|
trusted library allocation
|
page read and write
|
||
236E04E9000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
88D694D000
|
stack
|
page read and write
|
||
193FB840000
|
trusted library allocation
|
page read and write
|
||
BF528F9000
|
stack
|
page read and write
|
||
12851000
|
trusted library allocation
|
page read and write
|
||
193FA075000
|
heap
|
page read and write
|
||
260FA550000
|
heap
|
page execute and read and write
|
||
1938138B000
|
trusted library allocation
|
page read and write
|
||
236E04DD000
|
heap
|
page read and write
|
||
B3F000
|
heap
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
236E2E4F000
|
trusted library allocation
|
page read and write
|
||
236E04E3000
|
heap
|
page read and write
|
||
193FB99D000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
918000
|
heap
|
page read and write
|
||
19380D17000
|
trusted library allocation
|
page read and write
|
||
26081891000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
236E04DF000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
BF5267D000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
12B21000
|
trusted library allocation
|
page read and write
|
||
260FA3A0000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
193FC020000
|
heap
|
page execute and read and write
|
||
2D83000
|
trusted library allocation
|
page read and write
|
||
236F22A7000
|
trusted library allocation
|
page read and write
|
||
193FC090000
|
heap
|
page read and write
|
||
19390031000
|
trusted library allocation
|
page read and write
|
||
236FA503000
|
heap
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
193F9E36000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
26080001000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
193FB9A5000
|
heap
|
page read and write
|
||
91F000
|
heap
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
260F89E7000
|
heap
|
page read and write
|
||
1C86D000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
236FA6F8000
|
heap
|
page read and write
|
||
1B04E000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FF8491CF000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
BF526FE000
|
stack
|
page read and write
|
||
26080D74000
|
trusted library allocation
|
page read and write
|
||
7DF4C18C0000
|
trusted library allocation
|
page execute and read and write
|
||
236F22B5000
|
trusted library allocation
|
page read and write
|
||
193FA090000
|
heap
|
page read and write
|
||
236FA6F0000
|
heap
|
page read and write
|
||
26081340000
|
trusted library allocation
|
page read and write
|
||
236FA452000
|
heap
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
1C3F0000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
236FAA80000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
1B313000
|
heap
|
page read and write
|
||
236FA7DC000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1707C270000
|
heap
|
page read and write
|
||
7DF4C9EE0000
|
trusted library allocation
|
page execute and read and write
|
||
19381954000
|
trusted library allocation
|
page read and write
|
||
260FA350000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
26090306000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
193F9FE0000
|
heap
|
page read and write
|
||
1B453000
|
heap
|
page read and write
|
||
1BC8D000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
236E05E0000
|
trusted library allocation
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
2B87D89000
|
stack
|
page read and write
|
||
236E2D42000
|
trusted library allocation
|
page read and write
|
||
BF5398E000
|
stack
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
2B86B7E000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
167AAE9000
|
stack
|
page read and write
|
||
19380C00000
|
trusted library allocation
|
page read and write
|
||
236E04A8000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
BF527F9000
|
stack
|
page read and write
|
||
193FC111000
|
heap
|
page read and write
|
||
1B310000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
260F8A29000
|
heap
|
page read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
236FA61A000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
260F8970000
|
trusted library section
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7FF8491C8000
|
trusted library allocation
|
page read and write
|
||
193812AC000
|
trusted library allocation
|
page read and write
|
||
236E0600000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page execute and read and write
|
||
91A000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
236FA6FC000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page execute and read and write
|
||
8FB000
|
heap
|
page read and write
|
||
28C6000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
236E1FB0000
|
heap
|
page read and write
|
||
88D5A77000
|
stack
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
7DF4C9EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849025000
|
trusted library allocation
|
page read and write
|
||
236E3748000
|
trusted library allocation
|
page read and write
|
||
26080A53000
|
trusted library allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
BE3000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
236FA426000
|
heap
|
page read and write
|
||
236E3383000
|
trusted library allocation
|
page read and write
|
||
236E2F69000
|
trusted library allocation
|
page read and write
|
||
7FF848EF1000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
236FA86D000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
260F8C70000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
127F1000
|
trusted library allocation
|
page read and write
|
||
260F89A0000
|
heap
|
page read and write
|
||
2B87D0E000
|
stack
|
page read and write
|
||
7FF8490C9000
|
trusted library allocation
|
page read and write
|
||
88D68CE000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
193902EB000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
193FC026000
|
heap
|
page execute and read and write
|
||
1B0AF000
|
stack
|
page read and write
|
||
26081DDF000
|
trusted library allocation
|
page read and write
|
||
88D5979000
|
stack
|
page read and write
|
||
260FA8F0000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2B87039000
|
stack
|
page read and write
|
||
B26000
|
heap
|
page read and write
|
||
1707C660000
|
heap
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
236E30E3000
|
trusted library allocation
|
page read and write
|
||
BF52E3B000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
19381E25000
|
trusted library allocation
|
page read and write
|
||
1BEA0000
|
heap
|
page read and write
|
||
7FF849197000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
2B86F36000
|
stack
|
page read and write
|
||
236E3854000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
236E21EC000
|
trusted library allocation
|
page read and write
|
||
236E3DEB000
|
trusted library allocation
|
page read and write
|
||
BF5388C000
|
stack
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
127F3000
|
trusted library allocation
|
page read and write
|
||
260FA93D000
|
heap
|
page read and write
|
||
12B28000
|
trusted library allocation
|
page read and write
|
||
26081007000
|
trusted library allocation
|
page read and write
|
||
2B86AFE000
|
stack
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
193FC10D000
|
heap
|
page read and write
|
||
236E0430000
|
heap
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
260FAC1C000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF8490DC000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
260FA9E9000
|
heap
|
page read and write
|
||
236F22C5000
|
trusted library allocation
|
page read and write
|
||
260F8C75000
|
heap
|
page read and write
|
||
193FC0EC000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
7DF4C9ED0000
|
trusted library allocation
|
page execute and read and write
|
||
236E04A0000
|
heap
|
page read and write
|
||
88D5E7E000
|
stack
|
page read and write
|
||
193813C9000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
260F88E0000
|
heap
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
A9F000
|
stack
|
page read and write
|
||
7FF848F72000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
7FF8490AA000
|
trusted library allocation
|
page read and write
|
||
26080C01000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
905000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
88D587F000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
236E3DC7000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
2E06000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
260F8A98000
|
heap
|
page read and write
|
||
1C0E9000
|
stack
|
page read and write
|
||
19381038000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
193F9E6F000
|
heap
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
1938194E000
|
trusted library allocation
|
page read and write
|
||
193FA095000
|
heap
|
page read and write
|
||
236FA41D000
|
heap
|
page read and write
|
||
236E0525000
|
heap
|
page read and write
|
||
1C411000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
B4B000
|
heap
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
1C62E000
|
stack
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
7FF848EF1000
|
trusted library allocation
|
page read and write
|
||
193F9E9B000
|
heap
|
page read and write
|
||
BF53907000
|
stack
|
page read and write
|
||
BF5277E000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
26080C09000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
260F89DD000
|
heap
|
page read and write
|
||
2B86C79000
|
stack
|
page read and write
|
||
193F9E98000
|
heap
|
page read and write
|
||
28CC000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
236FA610000
|
heap
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
236E2A15000
|
trusted library allocation
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
26D0000
|
heap
|
page execute and read and write
|
||
1707C3A0000
|
heap
|
page read and write
|
||
236E32C7000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
193F9E5B000
|
heap
|
page read and write
|
||
BF52B39000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
19381164000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
260FAB00000
|
heap
|
page read and write
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
19381893000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
7FF848F02000
|
trusted library allocation
|
page read and write
|
||
1B6EE000
|
stack
|
page read and write
|
||
12CB3000
|
trusted library allocation
|
page read and write
|
||
236E04B2000
|
heap
|
page read and write
|
||
88D69CE000
|
stack
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
260F8C30000
|
trusted library allocation
|
page read and write
|
||
19380D7F000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
236FA79B000
|
heap
|
page read and write
|
||
260FA9A0000
|
heap
|
page read and write
|
||
193902ED000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
167AB6E000
|
unkown
|
page read and write
|
||
236FA74F000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
193FC22B000
|
heap
|
page read and write
|
||
236FA732000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
236FA708000
|
heap
|
page read and write
|
||
1B5EE000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
236E04FD000
|
heap
|
page read and write
|
||
193FC290000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
236FA7F6000
|
heap
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
19381787000
|
trusted library allocation
|
page read and write
|
||
193F9F0D000
|
heap
|
page read and write
|
||
236FA890000
|
heap
|
page read and write
|
||
236E0610000
|
heap
|
page readonly
|
||
2B86DFD000
|
stack
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
193FC22E000
|
heap
|
page read and write
|
||
28B8000
|
trusted library allocation
|
page read and write
|
||
193FA050000
|
trusted library allocation
|
page read and write
|
||
28C8000
|
trusted library allocation
|
page read and write
|
||
88D5D7E000
|
stack
|
page read and write
|
||
1707C3A9000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
1B2AF000
|
stack
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
236FA888000
|
heap
|
page read and write
|
||
236F1FC1000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
26081E24000
|
trusted library allocation
|
page read and write
|
||
236E04E5000
|
heap
|
page read and write
|
||
236FA7EA000
|
heap
|
page read and write
|
||
19381341000
|
trusted library allocation
|
page read and write
|
||
236E2BCA000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page execute and read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
B64000
|
heap
|
page read and write
|
||
193F9E4E000
|
heap
|
page read and write
|
||
236E0685000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
19390010000
|
trusted library allocation
|
page read and write
|
||
1707C665000
|
heap
|
page read and write
|
||
193F9EF9000
|
heap
|
page read and write
|
||
236FA77A000
|
heap
|
page read and write
|
||
19380C11000
|
trusted library allocation
|
page read and write
|
||
BF52DBE000
|
stack
|
page read and write
|
||
260FABFD000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
BF52BB7000
|
stack
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
BF52CBE000
|
stack
|
page read and write
|
||
1A880000
|
trusted library allocation
|
page read and write
|
||
260FA9F7000
|
heap
|
page execute and read and write
|
||
FF5000
|
heap
|
page read and write
|
||
236FA84B000
|
heap
|
page read and write
|
||
BF52D3B000
|
stack
|
page read and write
|
||
351000
|
stack
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
193FBA41000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
2B8723B000
|
stack
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page read and write
|
||
236FA637000
|
heap
|
page read and write
|
||
236F1FE1000
|
trusted library allocation
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
236FA700000
|
heap
|
page read and write
|
||
2B87E8C000
|
stack
|
page read and write
|
||
12861000
|
trusted library allocation
|
page read and write
|
||
193810C7000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
1BB95000
|
stack
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
236FA4B8000
|
heap
|
page read and write
|
||
125A3000
|
trusted library allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
260F8940000
|
heap
|
page read and write
|
||
2B87E8E000
|
stack
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
193902F5000
|
trusted library allocation
|
page read and write
|
||
7DF4C18B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
193FC1E0000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
BF52A3F000
|
stack
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
There are 916 hidden memdumps, click here to show them.