Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
prog.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\win32\svhost.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\pnhtlztmuvjx.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0clplbcd.mp2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_120ozldt.xt5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkqt4yur.xc1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wev4shdz.3ic.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_53ji52ho.qwi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_agef4gqi.jsx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_ptcbpiqz.4kc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_pzo521gx.ly2.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\prog.exe
|
"C:\Users\user\Desktop\prog.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop UsoSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop WaaSMedicSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop wuauserv
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop bits
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop dosvc
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe delete "appdata"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe create "appdata" binpath= "C:\ProgramData\win32\svhost.exe" start= "auto"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop eventlog
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe start "appdata"
|
||
C:\ProgramData\win32\svhost.exe
|
C:\ProgramData\win32\svhost.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop UsoSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop WaaSMedicSvc
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop wuauserv
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop bits
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop dosvc
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
|
||
C:\Windows\System32\svchost.exe
|
svchost.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 49 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.94.1q
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pool.hashvault.pro
|
95.179.241.203
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
95.179.241.203
|
pool.hashvault.pro
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
|
DontOfferThroughWUAU
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
140001000
|
unkown
|
page execute and read and write
|
||
1B35F6D0000
|
heap
|
page read and write
|
||
7FF6F1FB0000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
BC1A07F000
|
stack
|
page read and write
|
||
1631AE5E000
|
heap
|
page read and write
|
||
2A8A4E70000
|
heap
|
page read and write
|
||
2A8A5043000
|
heap
|
page read and write
|
||
1631B6C5000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
7FF6F1FBB000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2A8A503A000
|
heap
|
page read and write
|
||
163ADEA4000
|
heap
|
page read and write
|
||
1631B460000
|
trusted library allocation
|
page read and write
|
||
21398B60000
|
heap
|
page read and write
|
||
237523E0000
|
heap
|
page read and write
|
||
107C56B0000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
C6AC8FE000
|
unkown
|
page readonly
|
||
C6AC9FE000
|
stack
|
page read and write
|
||
248803A5000
|
heap
|
page read and write
|
||
1631AD60000
|
heap
|
page read and write
|
||
1631B600000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2207FA50000
|
heap
|
page read and write
|
||
1631AEEE000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
17CA59F9000
|
heap
|
page read and write
|
||
1B35F3A0000
|
heap
|
page read and write
|
||
1FFBD570000
|
heap
|
page read and write
|
||
F6F010E000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1B4BAB95000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
739237F000
|
stack
|
page read and write
|
||
42A507F000
|
stack
|
page read and write
|
||
7FF6F1FBF000
|
unkown
|
page write copy
|
||
7FF6F2240000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
4E216FF000
|
stack
|
page read and write
|
||
2A865C88000
|
heap
|
page read and write
|
||
2F5BDB25000
|
heap
|
page read and write
|
||
BC1A17E000
|
stack
|
page read and write
|
||
2A865E75000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
163ADE57000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
C6AC7FC000
|
stack
|
page read and write
|
||
BC19D4D000
|
stack
|
page read and write
|
||
1918B195000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
198FD240000
|
heap
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
38F677E000
|
stack
|
page read and write
|
||
2207FDA0000
|
heap
|
page read and write
|
||
107C5880000
|
heap
|
page read and write
|
||
2BDAAFF000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631AF13000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B800000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
176CDC0F000
|
heap
|
page read and write
|
||
17CA59F0000
|
heap
|
page read and write
|
||
1BE3E8C0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
21398850000
|
heap
|
page read and write
|
||
107C56B7000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2F5BF320000
|
heap
|
page read and write
|
||
1D873910000
|
unkown
|
page read and write
|
||
2F5BD740000
|
heap
|
page read and write
|
||
420B87D000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
188079F000
|
stack
|
page read and write
|
||
282DA5A8000
|
heap
|
page read and write
|
||
1D8737F5000
|
heap
|
page read and write
|
||
1631AEC1000
|
heap
|
page read and write
|
||
1631AEFF000
|
heap
|
page read and write
|
||
282DA8B0000
|
heap
|
page read and write
|
||
1963CDB0000
|
heap
|
page read and write
|
||
24880040000
|
heap
|
page read and write
|
||
163ADE47000
|
heap
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
237523E8000
|
heap
|
page read and write
|
||
1F4ABE70000
|
heap
|
page read and write
|
||
1D8737F0000
|
heap
|
page read and write
|
||
196E9B20000
|
heap
|
page read and write
|
||
859C54F000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
640197E000
|
stack
|
page read and write
|
||
22037400000
|
heap
|
page read and write
|
||
3635CFF000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED3000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
C1B999D000
|
stack
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1C92FD000
|
stack
|
page read and write
|
||
2A865AC0000
|
heap
|
page read and write
|
||
17CA5AF0000
|
heap
|
page read and write
|
||
198FD550000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B460000
|
heap
|
page read and write
|
||
1BE3E619000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
23B29EB0000
|
heap
|
page read and write
|
||
1629CA10000
|
heap
|
page read and write
|
||
7FF7E3580000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
38F667C000
|
stack
|
page read and write
|
||
163ADE02000
|
heap
|
page read and write
|
||
1631B460000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
7BF90FF000
|
stack
|
page read and write
|
||
1918B190000
|
heap
|
page read and write
|
||
1631AECA000
|
heap
|
page read and write
|
||
7FF6F223B000
|
unkown
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
F6F00FD000
|
stack
|
page read and write
|
||
17CA5BF0000
|
heap
|
page read and write
|
||
140503000
|
unkown
|
page execute and read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
91DE37F000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
2AE7B888000
|
heap
|
page read and write
|
||
3635DFF000
|
stack
|
page read and write
|
||
1631B6D6000
|
heap
|
page read and write
|
||
140500000
|
unkown
|
page execute and read and write
|
||
1631B6AC000
|
heap
|
page read and write
|
||
23B29EE0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B6A4000
|
heap
|
page read and write
|
||
ABEF6FE000
|
stack
|
page read and write
|
||
2207FDB0000
|
unkown
|
page read and write
|
||
248803B0000
|
unkown
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1918AF28000
|
heap
|
page read and write
|
||
21398830000
|
heap
|
page read and write
|
||
2A865BA0000
|
heap
|
page read and write
|
||
7FF7E32FE000
|
unkown
|
page read and write
|
||
17CA5D05000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
140847000
|
unkown
|
page read and write
|
||
1631ADB0000
|
heap
|
page readonly
|
||
C1B9CFE000
|
stack
|
page read and write
|
||
2F5BD750000
|
heap
|
page read and write
|
||
1631AC60000
|
heap
|
page read and write
|
||
D5EA7FD000
|
stack
|
page read and write
|
||
1631AD80000
|
direct allocation
|
page execute read
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
FBBE7DE000
|
stack
|
page read and write
|
||
1BE3E510000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
7FF7E32F0000
|
unkown
|
page readonly
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
7FF6F1FBE000
|
unkown
|
page write copy
|
||
31D527E000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B684000
|
heap
|
page read and write
|
||
1631AE13000
|
heap
|
page read and write
|
||
1CC886D8000
|
heap
|
page read and write
|
||
2AE7B6C0000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631ADB0000
|
trusted library allocation
|
page read and write
|
||
282DA530000
|
heap
|
page read and write
|
||
1F4AC065000
|
heap
|
page read and write
|
||
1631AE97000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2F5BD7B8000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AE6B000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631C200000
|
heap
|
page read and write
|
||
1631EA00000
|
heap
|
page read and write
|
||
1FD67270000
|
heap
|
page read and write
|
||
4E212FD000
|
stack
|
page read and write
|
||
31D517F000
|
stack
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
17CA5BD0000
|
heap
|
page read and write
|
||
1631AEFA000
|
heap
|
page read and write
|
||
25A22C10000
|
heap
|
page read and write
|
||
1631AEB8000
|
heap
|
page read and write
|
||
1631AE92000
|
heap
|
page read and write
|
||
17CA5D00000
|
heap
|
page read and write
|
||
1963CB60000
|
heap
|
page read and write
|
||
1631AE9A000
|
heap
|
page read and write
|
||
640187E000
|
stack
|
page read and write
|
||
1918B110000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2F5BD7B0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B69C000
|
heap
|
page read and write
|
||
2DEBC7E000
|
stack
|
page read and write
|
||
7FF7E32FB000
|
unkown
|
page readonly
|
||
282DA520000
|
heap
|
page read and write
|
||
1B35F6D5000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
direct allocation
|
page execute and read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
248800D9000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1CC889A5000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
25A22B50000
|
heap
|
page read and write
|
||
1404DC000
|
unkown
|
page execute and read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1B4BA8B0000
|
heap
|
page read and write
|
||
A11147F000
|
stack
|
page read and write
|
||
1963CBC0000
|
heap
|
page read and write
|
||
23B29EE8000
|
heap
|
page read and write
|
||
23B29E80000
|
heap
|
page read and write
|
||
1631B643000
|
heap
|
page read and write
|
||
14080D000
|
unkown
|
page execute and read and write
|
||
176CDC08000
|
heap
|
page read and write
|
||
1F4ABE78000
|
heap
|
page read and write
|
||
1631B6FF000
|
heap
|
page read and write
|
||
23B29EC0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
163ADF02000
|
heap
|
page read and write
|
||
1B35F310000
|
heap
|
page read and write
|
||
1631AEC7000
|
heap
|
page read and write
|
||
163ADE02000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
23B29E90000
|
heap
|
page read and write
|
||
1C967E000
|
unkown
|
page readonly
|
||
640155D000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B6FF000
|
heap
|
page read and write
|
||
1631B4C0000
|
direct allocation
|
page execute and read and write
|
||
2A8A5102000
|
heap
|
page read and write
|
||
7FF7E32F1000
|
unkown
|
page execute read
|
||
1FFBD650000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
C6ABD2B000
|
stack
|
page read and write
|
||
2A865BC0000
|
heap
|
page read and write
|
||
4E215FE000
|
stack
|
page read and write
|
||
282DA8B5000
|
heap
|
page read and write
|
||
140840000
|
unkown
|
page execute and read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
95D377F000
|
stack
|
page read and write
|
||
2A865C80000
|
heap
|
page read and write
|
||
F6F04FE000
|
stack
|
page read and write
|
||
91DE2FF000
|
stack
|
page read and write
|
||
1BE3E530000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1CC886D0000
|
heap
|
page read and write
|
||
D0D67FE000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1FD67210000
|
heap
|
page read and write
|
||
C6AC3FE000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1FD67130000
|
heap
|
page read and write
|
||
22037430000
|
heap
|
page read and write
|
||
1631AEAF000
|
heap
|
page read and write
|
||
1631B6B4000
|
heap
|
page read and write
|
||
1FD67278000
|
heap
|
page read and write
|
||
1631B460000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
163ADE4B000
|
heap
|
page read and write
|
||
1629CD55000
|
heap
|
page read and write
|
||
7BF907F000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
21398810000
|
heap
|
page read and write
|
||
49084FF000
|
stack
|
page read and write
|
||
1B4BA990000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
21398B65000
|
heap
|
page read and write
|
||
1631AEFB000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
4BE307D000
|
stack
|
page read and write
|
||
2A8A502B000
|
heap
|
page read and write
|
||
1631CC00000
|
heap
|
page read and write
|
||
1F4ABE50000
|
heap
|
page read and write
|
||
1B4BAB90000
|
heap
|
page read and write
|
||
1FD67230000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1B4BA9B0000
|
heap
|
page read and write
|
||
31D507D000
|
stack
|
page read and write
|
||
7FF7E32FB000
|
unkown
|
page readonly
|
||
859C4CD000
|
stack
|
page read and write
|
||
1918AF00000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
282DA550000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AE9E000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1963CA80000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2AE7B7C0000
|
heap
|
page read and write
|
||
22037810000
|
heap
|
page read and write
|
||
1CC88610000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2207FB30000
|
heap
|
page read and write
|
||
739247F000
|
stack
|
page read and write
|
||
1631AE96000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED3000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
16321200000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
7FF6F1FBE000
|
unkown
|
page read and write
|
||
4E211FE000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
7FF6F223D000
|
unkown
|
page readonly
|
||
1631AEFB000
|
heap
|
page read and write
|
||
1F4AC060000
|
heap
|
page read and write
|
||
22037410000
|
heap
|
page read and write
|
||
198FD320000
|
heap
|
page read and write
|
||
7FF6F1FB1000
|
unkown
|
page execute read
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
95D37FF000
|
stack
|
page read and write
|
||
2207FB80000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
282DA5A0000
|
heap
|
page read and write
|
||
1D873640000
|
heap
|
page read and write
|
||
1FD674B5000
|
heap
|
page read and write
|
||
2A8A4F70000
|
heap
|
page read and write
|
||
196E98B0000
|
heap
|
page read and write
|
||
2BDA6BD000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
739227D000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AE00000
|
heap
|
page read and write
|
||
7FF6F1FBB000
|
unkown
|
page readonly
|
||
237527A5000
|
heap
|
page read and write
|
||
163ADE02000
|
heap
|
page read and write
|
||
2AE7B7D0000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1FFBD960000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
220374C0000
|
heap
|
page read and write
|
||
2AE7B880000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
237524F0000
|
heap
|
page read and write
|
||
2F5BDB20000
|
heap
|
page read and write
|
||
1CC889A0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2BDA7BF000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1D873720000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1963CBC8000
|
heap
|
page read and write
|
||
1C96FF000
|
stack
|
page read and write
|
||
7FF6F2240000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AEFD000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
2AE7B7C5000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B460000
|
trusted library allocation
|
page read and write
|
||
490819D000
|
stack
|
page read and write
|
||
196E97B0000
|
heap
|
page read and write
|
||
1631AE9A000
|
heap
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
198FD358000
|
heap
|
page read and write
|
||
1631D600000
|
heap
|
page read and write
|
||
14078B000
|
unkown
|
page execute and read and write
|
||
220374D4000
|
heap
|
page read and write
|
||
1B4BA9E8000
|
heap
|
page read and write
|
||
1629CD50000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
176CDE65000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
ABEF3CF000
|
stack
|
page read and write
|
||
107C58C0000
|
heap
|
page read and write
|
||
1631B6F7000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1BE3E430000
|
heap
|
page read and write
|
||
25A22BC0000
|
heap
|
page read and write
|
||
176CDC00000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
163ADE02000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
4E20DDB000
|
stack
|
page read and write
|
||
4AC1B7F000
|
stack
|
page read and write
|
||
4AC1A7C000
|
stack
|
page read and write
|
||
7FF7E32F1000
|
unkown
|
page execute read
|
||
248803A0000
|
heap
|
page read and write
|
||
198FD350000
|
heap
|
page read and write
|
||
1C93FE000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1918AF2F000
|
heap
|
page read and write
|
||
FBBE75C000
|
stack
|
page read and write
|
||
2207FB50000
|
unkown
|
page read and write
|
||
1631AED3000
|
heap
|
page read and write
|
||
1631AE92000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED4000
|
heap
|
page read and write
|
||
7FF7E3580000
|
unkown
|
page readonly
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
859C5CF000
|
stack
|
page read and write
|
||
237525F0000
|
heap
|
page read and write
|
||
4E217FE000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
25A22B30000
|
heap
|
page read and write
|
||
7FF6F1FB0000
|
unkown
|
page readonly
|
||
1631AEFD000
|
heap
|
page read and write
|
||
D0D66FE000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED6000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1918B0F0000
|
heap
|
page read and write
|
||
7FF6F223D000
|
unkown
|
page readonly
|
||
91DE27D000
|
stack
|
page read and write
|
||
2AE7B7A0000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
140006000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
163ADE02000
|
heap
|
page read and write
|
||
95D36FD000
|
stack
|
page read and write
|
||
1631E000000
|
heap
|
page read and write
|
||
7FF7E357D000
|
unkown
|
page readonly
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1FFBD700000
|
heap
|
page read and write
|
||
107C58B5000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED3000
|
heap
|
page read and write
|
||
25A22C19000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631FE00000
|
heap
|
page read and write
|
||
4E214FF000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
107C56A0000
|
heap
|
page read and write
|
||
1629CA50000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
4E210FE000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
16320800000
|
heap
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
188071D000
|
stack
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B684000
|
heap
|
page read and write
|
||
220374C9000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1B4BA9E0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1629CA58000
|
heap
|
page read and write
|
||
1FD674B0000
|
heap
|
page read and write
|
||
1631ADB0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1B35F3A8000
|
heap
|
page read and write
|
||
2F5BD770000
|
heap
|
page read and write
|
||
176CDD00000
|
heap
|
page read and write
|
||
A11127D000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1629CA00000
|
heap
|
page read and write
|
||
2A8A5013000
|
heap
|
page read and write
|
||
23B29EB5000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
163ADEA4000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1CC88640000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
D0D63FD000
|
stack
|
page read and write
|
||
1F4ABD50000
|
heap
|
page read and write
|
||
1B35F2F0000
|
heap
|
page read and write
|
||
1880A7F000
|
stack
|
page read and write
|
||
1FFBD670000
|
heap
|
page read and write
|
||
2A8A5000000
|
heap
|
page read and write
|
||
1631AEFF000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631AEFF000
|
heap
|
page read and write
|
||
198FD555000
|
heap
|
page read and write
|
||
7FF7E32FE000
|
unkown
|
page write copy
|
||
1631AEEB000
|
heap
|
page read and write
|
||
1629CA30000
|
heap
|
page read and write
|
||
4E21AFF000
|
stack
|
page read and write
|
||
A11137F000
|
stack
|
page read and write
|
||
1631AEFB000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AE6B000
|
heap
|
page read and write
|
||
1631AED3000
|
heap
|
page read and write
|
||
2DEBB7F000
|
stack
|
page read and write
|
||
7FF7E32F0000
|
unkown
|
page readonly
|
||
107C58B0000
|
heap
|
page read and write
|
||
1631B470000
|
direct allocation
|
page execute and read and write
|
||
4E219FE000
|
stack
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
420B97F000
|
stack
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631AEFF000
|
heap
|
page read and write
|
||
4E213FC000
|
stack
|
page read and write
|
||
1631AC80000
|
heap
|
page read and write
|
||
1631F400000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1CC88620000
|
heap
|
page read and write
|
||
196E9950000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED3000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1BE3E8C5000
|
heap
|
page read and write
|
||
22037815000
|
heap
|
page read and write
|
||
42A50FF000
|
stack
|
page read and write
|
||
237527A0000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631AE7F000
|
heap
|
page read and write
|
||
25A22BC5000
|
heap
|
page read and write
|
||
36359CD000
|
stack
|
page read and write
|
||
248800D0000
|
heap
|
page read and write
|
||
4E218FF000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
7BF8DAD000
|
stack
|
page read and write
|
||
2A8A5002000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1F4ABE30000
|
heap
|
page read and write
|
||
24880030000
|
heap
|
page read and write
|
||
196E9B25000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AE97000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1D873810000
|
heap
|
page read and write
|
||
237525D0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2A865E70000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
176CDE60000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
198FD450000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
C6AC2FD000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
FBBEA7F000
|
stack
|
page read and write
|
||
D5EAA7F000
|
stack
|
page read and write
|
||
1631AF02000
|
heap
|
page read and write
|
||
42A4DCD000
|
stack
|
page read and write
|
||
D5EAAFF000
|
stack
|
page read and write
|
||
49081AD000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2DEBA7D000
|
stack
|
page read and write
|
||
7FF7E357D000
|
unkown
|
page readonly
|
||
140008000
|
unkown
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1918AF20000
|
heap
|
page read and write
|
||
1631AE2F000
|
heap
|
page read and write
|
||
1631AE81000
|
heap
|
page read and write
|
||
1BE3E610000
|
heap
|
page read and write
|
||
1631AED5000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
2207FB50000
|
unkown
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
176CDB20000
|
heap
|
page read and write
|
||
7FF6F1FB1000
|
unkown
|
page execute read
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
ABEF2CD000
|
stack
|
page read and write
|
||
2A8A4E90000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
C6ACAFE000
|
unkown
|
page readonly
|
||
176CDD20000
|
heap
|
page read and write
|
||
1631B4B0000
|
trusted library allocation
|
page read and write
|
||
420B8FF000
|
stack
|
page read and write
|
||
1B35F2E0000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
196E9959000
|
heap
|
page read and write
|
||
196E9890000
|
heap
|
page read and write
|
||
C59B88D000
|
stack
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
21398858000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2A8A4FA0000
|
trusted library allocation
|
page read and write
|
||
1FFBD965000
|
heap
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
2207FDA5000
|
heap
|
page read and write
|
||
140009000
|
unkown
|
page readonly
|
||
1963CB80000
|
heap
|
page read and write
|
||
2A8A5802000
|
trusted library allocation
|
page read and write
|
||
1631B4D0000
|
trusted library allocation
|
page read and write
|
||
1631AED5000
|
heap
|
page read and write
|
||
25A22A50000
|
heap
|
page read and write
|
||
1963CDB5000
|
heap
|
page read and write
|
||
1FFBD708000
|
heap
|
page read and write
|
||
21398800000
|
heap
|
page read and write
|
There are 623 hidden memdumps, click here to show them.