IOC Report
TJXpRilNkh.exe

loading gif

Files

File Path
Type
Category
Malicious
TJXpRilNkh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TJXpRilNkh.exe_7798d0edf58a88474c55bd682fcb8233a8db919a_0fb3adf6_f232989f-0a90-4f63-b4c9-acad96803681\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TJXpRilNkh.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER443E.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Oct 31 18:59:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER46FE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER476D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5vhrkizl.hze.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cnr3mf5r.xku.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0zwcvow.gwj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gcn5cwp2.nl0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idz1z0tt.u4i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_igiwb250.hyz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_irloizci.3hx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kepp52vb.3u0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mknoxajp.kba.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nbrft2t1.pjc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w3jmfkpc.cyd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3rgcjxd.zqo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TJXpRilNkh.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 17:57:32 2024, mtime=Thu Oct 31 17:57:34 2024, atime=Thu Oct 31 17:57:34 2024, length=76800, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TJXpRilNkh.exe
"C:\Users\user\Desktop\TJXpRilNkh.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\TJXpRilNkh.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'TJXpRilNkh.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\TJXpRilNkh.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "TJXpRilNkh" /tr "C:\Users\user\AppData\Roaming\TJXpRilNkh.exe"
malicious
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
"C:\Users\user\AppData\Roaming\TJXpRilNkh.exe"
malicious
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
"C:\Users\user\AppData\Roaming\TJXpRilNkh.exe"
malicious
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
malicious
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
C:\Users\user\AppData\Roaming\TJXpRilNkh.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5236 -s 2964
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://i.ibb.co
unknown
http://i.ibb.co
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://i.ibb.co/Dwrj41N/Image.png
169.197.85.95
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
i.ibb.co
169.197.85.95

IPs

IP
Domain
Country
Malicious
169.197.85.95
i.ibb.co
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
TJXpRilNkh
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\TJXpRilNkh_RASMANCS
FileDirectory
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
ProgramId
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
FileId
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
LowerCaseLongPath
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
LongPathHash
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
Name
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
OriginalFileName
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
Publisher
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
Version
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
BinFileVersion
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
BinaryType
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
ProductName
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
ProductVersion
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
LinkDate
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
BinProductVersion
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
AppxPackageFullName
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
AppxPackageRelativeId
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
Size
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
Language
\REGISTRY\A\{0dfd090d-1716-b0d6-fcc8-0e6daa00d77a}\Root\InventoryApplicationFile\tjxprilnkh.exe|f1f5bcfe6e9b4e0d
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5F2000
unkown
page readonly
malicious
1AA1D000
stack
page read and write
7FF84913C000
trusted library allocation
page read and write
88D55AE000
stack
page read and write
7FF8490D8000
trusted library allocation
page read and write
7FF849099000
trusted library allocation
page read and write
2B86CFF000
stack
page read and write
193FBF40000
heap
page read and write
EC0000
trusted library allocation
page read and write
CA8000
heap
page read and write
236E382D000
trusted library allocation
page read and write
260FAC5C000
heap
page read and write
260FAC45000
heap
page read and write
236E05A0000
heap
page read and write
236FA46D000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
112F000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
236E05C0000
heap
page read and write
7FF848F22000
trusted library allocation
page read and write
1B4EF000
stack
page read and write
7FF848F54000
trusted library allocation
page read and write
260FA3B8000
heap
page read and write
2DFE000
trusted library allocation
page read and write
260FA9CD000
heap
page read and write
7FF848F22000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
BF52AB7000
stack
page read and write
91C000
heap
page read and write
193F9DC0000
heap
page read and write
236E0592000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
236E3081000
trusted library allocation
page read and write
236FA5E7000
heap
page execute and read and write
2B86EBE000
stack
page read and write
260804CE000
trusted library allocation
page read and write
236E2F6B000
trusted library allocation
page read and write
19380F6C000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
236FA7EE000
heap
page read and write
2932000
trusted library allocation
page read and write
260813C8000
trusted library allocation
page read and write
236FA4DA000
heap
page read and write
2740000
heap
page read and write
C68000
heap
page read and write
27FF000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
E30000
heap
page read and write
1938186C000
trusted library allocation
page read and write
260902F4000
trusted library allocation
page read and write
193F9E96000
heap
page read and write
7FF849001000
trusted library allocation
page read and write
236E04BF000
heap
page read and write
193FC179000
heap
page read and write
88D5CF8000
stack
page read and write
1C72D000
stack
page read and write
7DF3FEE40000
trusted library allocation
page execute and read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF8491C0000
trusted library allocation
page read and write
2801000
trusted library allocation
page read and write
B20000
heap
page read and write
193FC203000
heap
page read and write
2B86BFE000
stack
page read and write
193FC143000
heap
page read and write
9C0000
heap
page read and write
236F22FC000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1BEF0000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
260902EC000
trusted library allocation
page read and write
63F000
heap
page read and write
7FF84919D000
trusted library allocation
page read and write
193F9EF2000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
236E1FC1000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
7FF849150000
trusted library allocation
page read and write
7E0000
heap
page read and write
193804CD000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
2B87C8C000
stack
page read and write
236E1E60000
trusted library allocation
page read and write
236FA6F4000
heap
page read and write
193F9E72000
heap
page read and write
1B23D000
stack
page read and write
27FC000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
236FA540000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
BF529F8000
stack
page read and write
260FA9B1000
heap
page read and write
90F000
heap
page read and write
19381E2A000
trusted library allocation
page read and write
236F1FF1000
trusted library allocation
page read and write
BF53A8C000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
6CA000
heap
page read and write
1B670000
heap
page execute and read and write
7FF849094000
trusted library allocation
page read and write
236F22AD000
trusted library allocation
page read and write
B95000
heap
page read and write
236F9FCD000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
193FC3F0000
heap
page read and write
26080088000
trusted library allocation
page read and write
BF53A8E000
stack
page read and write
1AC6D000
stack
page read and write
2B870BF000
stack
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
193FB944000
heap
page read and write
236E1F70000
heap
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
12CB8000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
260F8900000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF8490A8000
trusted library allocation
page read and write
19381DE0000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
26081E04000
trusted library allocation
page read and write
236FA410000
heap
page read and write
28B2000
trusted library allocation
page read and write
260F89E5000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
600000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
B2C000
heap
page read and write
2B871BF000
stack
page read and write
88D59FF000
stack
page read and write
236E2F63000
trusted library allocation
page read and write
B20000
heap
page read and write
193FC115000
heap
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
26080BF9000
trusted library allocation
page read and write
23F0000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848D61000
trusted library allocation
page read and write
12CB1000
trusted library allocation
page read and write
88D5C77000
stack
page read and write
FF0000
heap
page read and write
1170000
heap
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
28BC000
trusted library allocation
page read and write
260FAC61000
heap
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
19390021000
trusted library allocation
page read and write
260F89DF000
heap
page read and write
66A000
heap
page read and write
193811E0000
trusted library allocation
page read and write
88D5DFE000
stack
page read and write
1AE5F000
stack
page read and write
1B8FE000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
1B71E000
stack
page read and write
7FF848E66000
trusted library allocation
page execute and read and write
193F9E57000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
1AF40000
heap
page execute and read and write
7FF848E2C000
trusted library allocation
page execute and read and write
1707C370000
heap
page read and write
1C41B000
heap
page read and write
193FC0BB000
heap
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF848E80000
trusted library allocation
page execute and read and write
60C000
heap
page read and write
193FB930000
heap
page read and write
7FF84913A000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
19380F71000
trusted library allocation
page read and write
88D6A49000
stack
page read and write
1B1AF000
stack
page read and write
12853000
trusted library allocation
page read and write
3B0000
heap
page read and write
3D0000
heap
page read and write
236E28D9000
trusted library allocation
page read and write
1B49D000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
193FB97C000
heap
page read and write
3A0000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
12B23000
trusted library allocation
page read and write
88D5B79000
stack
page read and write
260F8960000
trusted library section
page read and write
1938007F000
trusted library allocation
page read and write
1BD9B000
stack
page read and write
2B86FBA000
stack
page read and write
236FA5E0000
heap
page execute and read and write
9D0000
heap
page read and write
1B9FF000
stack
page read and write
88D6ACD000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
236E05C5000
heap
page read and write
F60000
heap
page read and write
2B87C0F000
stack
page read and write
BF53A0C000
stack
page read and write
7FF848F58000
trusted library allocation
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
260FAA20000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
88D55EE000
stack
page read and write
BF52C3E000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
1939006E000
trusted library allocation
page read and write
7FF8490A2000
trusted library allocation
page read and write
7FF848E69000
trusted library allocation
page execute and read and write
1B3AE000
stack
page read and write
25A1000
trusted library allocation
page read and write
62D000
heap
page read and write
260FA3A5000
heap
page read and write
193FA040000
heap
page readonly
193902E7000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
2608186B000
trusted library allocation
page read and write
236E0594000
heap
page read and write
7FF8490D2000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
641000
heap
page read and write
193F9E5D000
heap
page read and write
C7C000
heap
page read and write
88D5BF7000
stack
page read and write
236E311E000
trusted library allocation
page read and write
236E3DA1000
trusted library allocation
page read and write
19380F68000
trusted library allocation
page read and write
1270000
heap
page read and write
193FB993000
heap
page read and write
19381069000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
236FA869000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
236E319A000
trusted library allocation
page read and write
BF5287E000
stack
page read and write
2B8713E000
stack
page read and write
19381E05000
trusted library allocation
page read and write
7FF848EFA000
trusted library allocation
page read and write
260FAC54000
heap
page read and write
7FF8490AC000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page execute and read and write
236FA472000
heap
page read and write
B90000
heap
page read and write
1B4C1000
heap
page read and write
19380001000
trusted library allocation
page read and write
125A8000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
236E2BF4000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
88D58FE000
stack
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849133000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
260FABC9000
heap
page read and write
236E3266000
trusted library allocation
page read and write
E70000
heap
page read and write
2B86E79000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
260810C4000
trusted library allocation
page read and write
D50000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
284E000
stack
page read and write
260F8C50000
trusted library allocation
page read and write
1B14F000
stack
page read and write
7FF848EF2000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
260FAB82000
heap
page read and write
7FF8490A3000
trusted library allocation
page read and write
260F8C40000
heap
page readonly
236E3DE6000
trusted library allocation
page read and write
D11000
stack
page read and write
1B0AD000
stack
page read and write
1ABD4000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848E20000
trusted library allocation
page execute and read and write
1938109B000
trusted library allocation
page read and write
1BA8F000
stack
page read and write
236FA7BD000
heap
page read and write
193F9E10000
heap
page read and write
193FBA23000
heap
page read and write
7FF848EE2000
trusted library allocation
page read and write
193FB9A3000
heap
page read and write
2CAF000
stack
page read and write
D30000
heap
page execute and read and write
260FA96A000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
193FBA30000
heap
page read and write
1B7FE000
stack
page read and write
7FF848D64000
trusted library allocation
page read and write
1C1EE000
stack
page read and write
2630000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
1938130D000
trusted library allocation
page read and write
193F9DA0000
heap
page read and write
2B86A73000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
28C4000
trusted library allocation
page read and write
7FF8491CD000
trusted library allocation
page read and write
88D5523000
stack
page read and write
236E37EC000
trusted library allocation
page read and write
26081033000
trusted library allocation
page read and write
1707C350000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
7FF848D83000
trusted library allocation
page read and write
193FB9D6000
heap
page read and write
1B6F0000
heap
page read and write
236F22AB000
trusted library allocation
page read and write
F0F000
stack
page read and write
19380F79000
trusted library allocation
page read and write
7FF849073000
trusted library allocation
page read and write
591000
stack
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
97E000
heap
page read and write
28B4000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
C60000
heap
page read and write
C5B000
heap
page read and write
1B420000
heap
page read and write
2D70000
trusted library allocation
page read and write
260811DD000
trusted library allocation
page read and write
260FAD80000
heap
page read and write
606000
unkown
page readonly
19390001000
trusted library allocation
page read and write
25AC000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
236FA5F0000
heap
page read and write
236FA87C000
heap
page read and write
19390305000
trusted library allocation
page read and write
D1E000
stack
page read and write
F30000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
236E052A000
heap
page read and write
19381129000
trusted library allocation
page read and write
1C3EE000
stack
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF849166000
trusted library allocation
page read and write
C7A000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1C418000
heap
page read and write
26081098000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
193FB870000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
193FC105000
heap
page read and write
236E3915000
trusted library allocation
page read and write
1A850000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
236E2FF1000
trusted library allocation
page read and write
D43000
trusted library allocation
page read and write
1B24E000
stack
page read and write
1707C3AE000
heap
page read and write
BF5297D000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
62B000
heap
page read and write
193FA030000
trusted library allocation
page read and write
895000
heap
page read and write
260FABF7000
heap
page read and write
88D6B4E000
stack
page read and write
236FA449000
heap
page read and write
7FF470840000
trusted library allocation
page execute and read and write
260F8800000
heap
page read and write
7FF848EE2000
trusted library allocation
page read and write
7FF848D9B000
trusted library allocation
page execute and read and write
1ADDD000
stack
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
C30000
heap
page read and write
236E0350000
heap
page read and write
26081953000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
236FA70C000
heap
page read and write
F38000
heap
page read and write
2B1E000
stack
page read and write
19380229000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
BF5380E000
stack
page read and write
193F9D90000
heap
page read and write
26081216000
trusted library allocation
page read and write
F6A000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
236F234C000
trusted library allocation
page read and write
260FAD00000
trusted library allocation
page read and write
236FA784000
heap
page read and write
193F9E17000
heap
page read and write
7FF8490A5000
trusted library allocation
page read and write
236E04E7000
heap
page read and write
2608022A000
trusted library allocation
page read and write
236E2EB9000
trusted library allocation
page read and write
19380F8A000
trusted library allocation
page read and write
790000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
236F202D000
trusted library allocation
page read and write
260FA9F0000
heap
page execute and read and write
12858000
trusted library allocation
page read and write
26090031000
trusted library allocation
page read and write
236E2FC5000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
193FC14D000
heap
page read and write
8E8000
heap
page read and write
260F89FD000
heap
page read and write
7FF848EFA000
trusted library allocation
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
236E04C4000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF849099000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
2B86D77000
stack
page read and write
236E0620000
trusted library allocation
page read and write
C20000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
19380A53000
trusted library allocation
page read and write
1C2ED000
stack
page read and write
7FF848E10000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
260812AB000
trusted library allocation
page read and write
260FA2C0000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
236E3055000
trusted library allocation
page read and write
236E0450000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
193FC11D000
heap
page read and write
2609006E000
trusted library allocation
page read and write
C48000
heap
page read and write
1C76E000
stack
page read and write
193FC040000
heap
page execute and read and write
167ABEF000
stack
page read and write
19380F86000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
193FA070000
heap
page read and write
7FF8490AC000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page read and write
260FA5A0000
heap
page execute and read and write
E50000
heap
page read and write
2608130D000
trusted library allocation
page read and write
26081786000
trusted library allocation
page read and write
236E32FB000
trusted library allocation
page read and write
C2F000
stack
page read and write
26081127000
trusted library allocation
page read and write
260FAC1E000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
7FF849030000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
27E0000
heap
page execute and read and write
7FF8491E0000
trusted library allocation
page read and write
260902E7000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2B87E0C000
stack
page read and write
1B4C6000
heap
page read and write
7FF8491C6000
trusted library allocation
page read and write
7FF848F24000
trusted library allocation
page read and write
193FA010000
trusted library allocation
page read and write
260F8980000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848F21000
trusted library allocation
page read and write
BF523C3000
stack
page read and write
2B2C000
trusted library allocation
page read and write
741000
stack
page read and write
193FC119000
heap
page read and write
193FC21A000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
26090021000
trusted library allocation
page read and write
7FF848D5B000
trusted library allocation
page read and write
971000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
1BE98000
stack
page read and write
C65000
heap
page read and write
260F8A24000
heap
page read and write
7FF848EF2000
trusted library allocation
page read and write
946000
heap
page read and write
EE0000
trusted library allocation
page read and write
236FA46B000
heap
page read and write
236E0680000
heap
page read and write
7FF848F52000
trusted library allocation
page read and write
7FF848D72000
trusted library allocation
page read and write
28AB000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
19380F7D000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
236FA83B000
heap
page read and write
236FA78D000
heap
page read and write
127F8000
trusted library allocation
page read and write
1B61E000
stack
page read and write
236E248F000
trusted library allocation
page read and write
F58000
heap
page read and write
7FF849094000
trusted library allocation
page read and write
7DF3FEE30000
trusted library allocation
page execute and read and write
7FF848DCC000
trusted library allocation
page execute and read and write
236E2047000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page execute and read and write
88D5EFB000
stack
page read and write
260902EE000
trusted library allocation
page read and write
193FB920000
heap
page execute and read and write
19380F75000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
7FF8490C4000
trusted library allocation
page read and write
D65000
heap
page read and write
193FC225000
heap
page read and write
7FF8490A8000
trusted library allocation
page read and write
26090001000
trusted library allocation
page read and write
193F9E51000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
88D5AFE000
stack
page read and write
7FF848D50000
trusted library allocation
page read and write
26A0000
heap
page execute and read and write
19381065000
trusted library allocation
page read and write
B25000
heap
page read and write
236E1F90000
heap
page execute and read and write
66C000
heap
page read and write
26081E29000
trusted library allocation
page read and write
236E04E9000
heap
page read and write
7C0000
heap
page read and write
88D694D000
stack
page read and write
193FB840000
trusted library allocation
page read and write
BF528F9000
stack
page read and write
12851000
trusted library allocation
page read and write
193FA075000
heap
page read and write
260FA550000
heap
page execute and read and write
1938138B000
trusted library allocation
page read and write
236E04DD000
heap
page read and write
B3F000
heap
page read and write
F96000
heap
page read and write
236E2E4F000
trusted library allocation
page read and write
236E04E3000
heap
page read and write
193FB99D000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
918000
heap
page read and write
19380D17000
trusted library allocation
page read and write
26081891000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
7FF848F12000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
236E04DF000
heap
page read and write
E6E000
stack
page read and write
BF5267D000
stack
page read and write
D60000
heap
page read and write
12B21000
trusted library allocation
page read and write
260FA3A0000
heap
page read and write
1205000
heap
page read and write
193FC020000
heap
page execute and read and write
2D83000
trusted library allocation
page read and write
236F22A7000
trusted library allocation
page read and write
193FC090000
heap
page read and write
19390031000
trusted library allocation
page read and write
236FA503000
heap
page read and write
7FF848F28000
trusted library allocation
page read and write
193F9E36000
heap
page read and write
28C0000
trusted library allocation
page read and write
26080001000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
11D0000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
193FB9A5000
heap
page read and write
91F000
heap
page read and write
810000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
BF5000
heap
page read and write
260F89E7000
heap
page read and write
1C86D000
stack
page read and write
7A0000
heap
page read and write
236FA6F8000
heap
page read and write
1B04E000
stack
page read and write
C40000
heap
page read and write
7FF8491CF000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
BF526FE000
stack
page read and write
26080D74000
trusted library allocation
page read and write
7DF4C18C0000
trusted library allocation
page execute and read and write
236F22B5000
trusted library allocation
page read and write
193FA090000
heap
page read and write
236FA6F0000
heap
page read and write
26081340000
trusted library allocation
page read and write
236FA452000
heap
page read and write
6BE000
heap
page read and write
1C3F0000
heap
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
236FAA80000
heap
page read and write
880000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
1B313000
heap
page read and write
236FA7DC000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1707C270000
heap
page read and write
7DF4C9EE0000
trusted library allocation
page execute and read and write
19381954000
trusted library allocation
page read and write
260FA350000
heap
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
26090306000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
193F9FE0000
heap
page read and write
1B453000
heap
page read and write
1BC8D000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
236E05E0000
trusted library allocation
page read and write
1405000
heap
page read and write
2B87D89000
stack
page read and write
236E2D42000
trusted library allocation
page read and write
BF5398E000
stack
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
2B86B7E000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
167AAE9000
stack
page read and write
19380C00000
trusted library allocation
page read and write
236E04A8000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF849073000
trusted library allocation
page read and write
BF527F9000
stack
page read and write
193FC111000
heap
page read and write
1B310000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
260F8A29000
heap
page read and write
28AF000
trusted library allocation
page read and write
236FA61A000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
260F8970000
trusted library section
page read and write
D60000
heap
page read and write
7FF8491C8000
trusted library allocation
page read and write
193812AC000
trusted library allocation
page read and write
236E0600000
trusted library allocation
page read and write
2590000
heap
page execute and read and write
91A000
heap
page read and write
D75000
heap
page read and write
236FA6FC000
heap
page read and write
FA0000
heap
page execute and read and write
8FB000
heap
page read and write
28C6000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
236E1FB0000
heap
page read and write
88D5A77000
stack
page read and write
7FF848D44000
trusted library allocation
page read and write
7DF4C9EC0000
trusted library allocation
page execute and read and write
7FF849025000
trusted library allocation
page read and write
236E3748000
trusted library allocation
page read and write
26080A53000
trusted library allocation
page read and write
635000
heap
page read and write
FF1000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
BE3000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
236FA426000
heap
page read and write
236E3383000
trusted library allocation
page read and write
236E2F69000
trusted library allocation
page read and write
7FF848EF1000
trusted library allocation
page read and write
C00000
heap
page read and write
236FA86D000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
260F8C70000
heap
page read and write
9E0000
heap
page read and write
127F1000
trusted library allocation
page read and write
260F89A0000
heap
page read and write
2B87D0E000
stack
page read and write
7FF8490C9000
trusted library allocation
page read and write
88D68CE000
stack
page read and write
D70000
heap
page read and write
193902EB000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
193FC026000
heap
page execute and read and write
1B0AF000
stack
page read and write
26081DDF000
trusted library allocation
page read and write
88D5979000
stack
page read and write
260FA8F0000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
2B87039000
stack
page read and write
B26000
heap
page read and write
1707C660000
heap
page read and write
2B2F000
trusted library allocation
page read and write
236E30E3000
trusted library allocation
page read and write
BF52E3B000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
7FF848D5D000
trusted library allocation
page execute and read and write
19381E25000
trusted library allocation
page read and write
1BEA0000
heap
page read and write
7FF849197000
trusted library allocation
page read and write
B00000
heap
page read and write
2B86F36000
stack
page read and write
236E3854000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
236E21EC000
trusted library allocation
page read and write
236E3DEB000
trusted library allocation
page read and write
BF5388C000
stack
page read and write
7FF848D70000
trusted library allocation
page read and write
127F3000
trusted library allocation
page read and write
260FA93D000
heap
page read and write
12B28000
trusted library allocation
page read and write
26081007000
trusted library allocation
page read and write
2B86AFE000
stack
page read and write
F6D000
heap
page read and write
193FC10D000
heap
page read and write
236E0430000
heap
page read and write
7FF848D42000
trusted library allocation
page read and write
260FAC1C000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
D30000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF8490DC000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
260FA9E9000
heap
page read and write
236F22C5000
trusted library allocation
page read and write
260F8C75000
heap
page read and write
193FC0EC000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
C15000
heap
page read and write
F60000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
F98000
heap
page read and write
5F0000
unkown
page readonly
7DF4C9ED0000
trusted library allocation
page execute and read and write
236E04A0000
heap
page read and write
88D5E7E000
stack
page read and write
193813C9000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page execute and read and write
260F88E0000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
A9F000
stack
page read and write
7FF848F72000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
7FF848F2A000
trusted library allocation
page read and write
7FF8490AA000
trusted library allocation
page read and write
26080C01000
trusted library allocation
page read and write
1C425000
heap
page read and write
B00000
heap
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
905000
heap
page read and write
2CC1000
trusted library allocation
page read and write
88D587F000
stack
page read and write
F30000
heap
page read and write
1275000
heap
page read and write
236E3DC7000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
7FF848D70000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
260F8A98000
heap
page read and write
1C0E9000
stack
page read and write
19381038000
trusted library allocation
page read and write
AFF000
stack
page read and write
193F9E6F000
heap
page read and write
237E000
stack
page read and write
1938194E000
trusted library allocation
page read and write
193FA095000
heap
page read and write
236FA41D000
heap
page read and write
236E0525000
heap
page read and write
1C411000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
B4B000
heap
page read and write
B62000
heap
page read and write
1C62E000
stack
page read and write
B05000
heap
page read and write
261E000
stack
page read and write
7FF848EF1000
trusted library allocation
page read and write
193F9E9B000
heap
page read and write
BF53907000
stack
page read and write
BF5277E000
stack
page read and write
7D0000
heap
page read and write
26080C09000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
260F89DD000
heap
page read and write
2B86C79000
stack
page read and write
193F9E98000
heap
page read and write
28CC000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848D5B000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
7FF8491C0000
trusted library allocation
page read and write
236FA610000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
236E2A15000
trusted library allocation
page read and write
99F000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
26D0000
heap
page execute and read and write
1707C3A0000
heap
page read and write
236E32C7000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
193F9E5B000
heap
page read and write
BF52B39000
stack
page read and write
890000
heap
page read and write
7FF848D8B000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
19381164000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
CA6000
heap
page read and write
260FAB00000
heap
page read and write
7FF848D9D000
trusted library allocation
page execute and read and write
19381893000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
7FF848F02000
trusted library allocation
page read and write
1B6EE000
stack
page read and write
12CB3000
trusted library allocation
page read and write
236E04B2000
heap
page read and write
88D69CE000
stack
page read and write
FF5000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
260F8C30000
trusted library allocation
page read and write
19380D7F000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
2CBF000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
236FA79B000
heap
page read and write
260FA9A0000
heap
page read and write
193902ED000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
2B31000
trusted library allocation
page read and write
167AB6E000
unkown
page read and write
236FA74F000
heap
page read and write
7FF848D50000
trusted library allocation
page read and write
200000
unkown
page readonly
193FC22B000
heap
page read and write
236FA732000
heap
page read and write
1400000
heap
page read and write
236FA708000
heap
page read and write
1B5EE000
stack
page read and write
5E0000
heap
page read and write
236E04FD000
heap
page read and write
193FC290000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
236FA7F6000
heap
page read and write
830000
trusted library allocation
page read and write
19381787000
trusted library allocation
page read and write
193F9F0D000
heap
page read and write
236FA890000
heap
page read and write
236E0610000
heap
page readonly
2B86DFD000
stack
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
193FC22E000
heap
page read and write
28B8000
trusted library allocation
page read and write
193FA050000
trusted library allocation
page read and write
28C8000
trusted library allocation
page read and write
88D5D7E000
stack
page read and write
1707C3A9000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
1B2AF000
stack
page read and write
130E000
stack
page read and write
1200000
heap
page read and write
236FA888000
heap
page read and write
236F1FC1000
trusted library allocation
page read and write
8E0000
heap
page read and write
26081E24000
trusted library allocation
page read and write
236E04E5000
heap
page read and write
236FA7EA000
heap
page read and write
19381341000
trusted library allocation
page read and write
236E2BCA000
trusted library allocation
page read and write
13B0000
heap
page execute and read and write
7FF848F60000
trusted library allocation
page execute and read and write
7FF848E56000
trusted library allocation
page execute and read and write
B64000
heap
page read and write
193F9E4E000
heap
page read and write
236E0685000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
19390010000
trusted library allocation
page read and write
1707C665000
heap
page read and write
193F9EF9000
heap
page read and write
236FA77A000
heap
page read and write
19380C11000
trusted library allocation
page read and write
BF52DBE000
stack
page read and write
260FABFD000
heap
page read and write
10FF000
stack
page read and write
C60000
trusted library allocation
page read and write
BF52BB7000
stack
page read and write
9A6000
heap
page read and write
BF52CBE000
stack
page read and write
1A880000
trusted library allocation
page read and write
260FA9F7000
heap
page execute and read and write
FF5000
heap
page read and write
236FA84B000
heap
page read and write
BF52D3B000
stack
page read and write
351000
stack
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
193FBA41000
heap
page read and write
606000
heap
page read and write
2B8723B000
stack
page read and write
7FF848F12000
trusted library allocation
page read and write
236FA637000
heap
page read and write
236F1FE1000
trusted library allocation
page read and write
948000
heap
page read and write
236FA700000
heap
page read and write
2B87E8C000
stack
page read and write
12861000
trusted library allocation
page read and write
193810C7000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848F24000
trusted library allocation
page read and write
1BB95000
stack
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
236FA4B8000
heap
page read and write
125A3000
trusted library allocation
page read and write
C65000
heap
page read and write
7FF84917C000
trusted library allocation
page read and write
260F8940000
heap
page read and write
2B87E8E000
stack
page read and write
125A1000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
C70000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
193902F5000
trusted library allocation
page read and write
7DF4C18B0000
trusted library allocation
page execute and read and write
7FF848F10000
trusted library allocation
page execute and read and write
193FC1E0000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
BF52A3F000
stack
page read and write
7FF848D54000
trusted library allocation
page read and write
There are 916 hidden memdumps, click here to show them.