Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Invoice#0036473 .xlsx
|
Microsoft Excel 2007+
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\index[1].htm
|
HTML document, UTF-8 Unicode text, with CRLF line terminators
|
downloaded
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\index[1].htm
|
HTML document, UTF-8 Unicode text, with CRLF line terminators
|
downloaded
|
||
C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\1aa1e2ae-a008-48f2-9a00-950f13de6f16.tmp
|
SysEx File -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\25f44532-3c2e-40b6-b226-70d49123bf36.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\426d4312-aea0-4881-af65-3e2d056b80e7.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\645b6acd-32ef-46c5-b04e-45becdcbdc09.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\7ba9cb53-984a-4699-8353-58f189a93a72.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\81c675b7-7c7a-479c-ac72-9efc226a8ad9.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\8a1a20b3-f5e6-4fe3-9a63-ad9192746343.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\95b1abdd-d52f-4cbc-b086-3ae19d1e8029.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\2bb8be48-7e72-4290-bb6b-6ab5f3a98207.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\4071c3c0-9bab-4e09-96cb-097a690243fb.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\71b843c2-4b70-4ce2-95c8-13f810853f15.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\85ab7ce1-3258-4e9b-a0e3-3e50db926871.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\93422060-12de-434b-bf87-254d0ffca119.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\962ced69-1c12-40da-8cbb-f3f48e7b42c7.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Provider Cache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\6e83c16a-0f9f-4ba7-9421-b3a33db95024.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent
State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\7e11f068-5877-44c9-9e16-a0421d08125b.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Persistent
State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\c78cfa55-e1b4-4010-b1c1-a509d5123b73.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\d9b6f731-7f0c-4e5e-a34d-e1509d6c291d.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\dd213049-8a25-4006-9a0f-1b60de69be5e.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\e087d5d6-61a6-4968-a1d6-b478e27ef5d7.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\f52ec09a-4950-4b99-81cc-a00db2867efe.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\GrShaderCache\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\c31c0479-e4e4-4ded-825b-2ae50e1d6e8d.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\e8b91c13-687e-4a5b-90e8-7c0373992032.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\ec3a40c3-1400-4f01-815d-b48d30faaa73.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\231C2286-1237-4321-A2E6-258BBA83D8CD
|
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\1A5C2F1B.tmp
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\FBE12F02.png
|
PNG image data, 1140 x 1281, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_pnacl_json
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_crtbegin_for_eh_o
|
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_crtbegin_o
|
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_crtend_o
|
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_ld_nexe
|
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=7511538a3a6a0b862c772eace49075ed1bbe2377,
stripped
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_libcrt_platform_a
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_libgcc_a
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_libpnacl_irt_shim_a
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_libpnacl_irt_shim_dummy_a
|
current ar archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_pnacl_llc_nexe
|
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=309d6d3d463e6b1b0690f39eb226b1e4c469b2ce,
stripped
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\_platform_specific\x86_64\pnacl_public_x86_64_pnacl_sz_nexe
|
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=4b15de4ab227d5e46213978b8518d53c53ce1db9,
stripped
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\manifest.fingerprint
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\1828_1378596767\manifest.json
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_877695470\Recovery.crx3
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_877695470\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_877695470\manifest.fingerprint
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1828_877695470\manifest.json
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3a6ddb19-0e1b-45fc-b970-e7ff4e6406ca.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cfba26a0-2d5f-46ad-b890-a1b6725a941d.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\bg\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\ca\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\cs\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\da\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\de\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\el\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\en\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\en_GB\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\es\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\es_419\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\et\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\fi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\fil\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\fr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\hi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\hr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\hu\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\id\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\it\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\ja\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\ko\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\lt\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\lv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\nb\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\nl\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\pl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\pt_BR\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\pt_PT\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\ro\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\ru\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\sk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\sl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\sr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\sv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\th\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\tr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\uk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\vi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\zh_CN\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_locales\zh_TW\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\craw_background.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\craw_window.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\css\craw_window.css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\html\craw_window.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\flapper.gif
|
GIF image data, version 89a, 30 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\icon_128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\icon_16.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\topbar_floating_button.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\topbar_floating_button_close.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\topbar_floating_button_hover.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\topbar_floating_button_maximize.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\images\topbar_floating_button_pressed.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\CRX_INSTALL\manifest.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1828_1251794979\cfba26a0-2d5f-46ad-b890-a1b6725a941d.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF3005FED378034CC9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF82F1E915A6B871DD.TMP
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$Invoice#0036473 .xlsx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\0f9da6dd-02d1-4716-bb65-0ecc794f8349.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\24bfe171-efe7-4072-8cd7-5dd0ecaef267.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\26d44847-f29b-44b4-83c5-a4e6cc440bf9.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\31067a2a-5ce7-4ec9-98cd-89c86b9b1309.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\3a1d6b1f-342a-4802-8123-4b45d21f9eab.tmp
|
PGP symmetric key encrypted data - Plaintext or unencrypted data salted -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\51a627a5-22fb-4a4b-9790-73b801998960.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\51b2f774-2252-48f6-923d-fd7fac7b6110.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\8658dadd-071f-4fed-a194-d19faaa6b86c.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\055edf99-becc-45c4-be14-4dc525a5432e.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\0a6c3045-da8d-47a3-8153-9afce256711f.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\0eb7fe35-30bc-48b6-8257-0982ee1a4890.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\1f2324ab-adab-45fc-a3ab-9367bc32878e.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\2277d4eb-77ab-4279-9966-ee1e49db086b.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\262f10db-b419-4f57-98ae-ce9fa3a50196.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\61c8e5c5-f16b-4c38-9921-56f055e52cd4.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\js\index
|
ISO-8859 text, with no line terminators, with escape sequences
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\js\index-dir\the-real-index
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\wasm\index
|
ISO-8859 text, with no line terminators, with escape sequences
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\wasm\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\wasm\index-dir\the-real-index
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_0
|
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_2
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_3
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\index
|
FoxPro FPT, blocks size 512, next free block index 3284796353, field type 0
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Local Storage\leveldb\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Local Storage\leveldb\CURRENT
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Local Storage\leveldb\MANIFEST-000001
|
PGP\011Secret Key -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\CURRENT
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\MANIFEST-000001
|
PGP\011Secret Key -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Session Storage\000001.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Session Storage\CURRENT
(copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Session Storage\MANIFEST-000001
|
PGP\011Secret Key -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\dbf751fd-7169-44d5-bc18-7d3260ccc2c2.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ae88f5b9-6052-479d-9cbb-f68142e85df6.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\c30600a5-0365-44d0-9fe1-ffaca26edf6a.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\d3ab0dfa-11f4-433d-9005-94d12dd095d7.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000008.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\e0720955-3d9c-4af0-bd4a-8510afe9a7c7.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ef55ff91-ca42-48c2-8615-538469a3af8b.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\ab0bf9f2-309c-4bce-bd9c-e4ac34748242.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\b4fa85b6-444c-425f-a911-93b415a035a5.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8B3464B5.png
|
PNG image data, 1140 x 1281, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\24CF.tmp
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\55b2e026-228a-40a5-8bfd-0bdbd2ce629e.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5b406153-e928-4185-97db-235773365636.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\5b406153-e928-4185-97db-235773365636.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\bg\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\ca\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\cs\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\da\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\de\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\el\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\en\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\en_GB\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\es\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\es_419\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\et\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\fi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\fil\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\fr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\hi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\hr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\hu\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\id\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\it\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\ja\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\ko\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\lt\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\lv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\nb\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\nl\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\pl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\pt_BR\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\pt_PT\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\ro\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\ru\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\sk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\sl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\sr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\sv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\th\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\tr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\uk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\vi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\zh_CN\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_locales\zh_TW\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\craw_background.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\craw_window.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\css\craw_window.css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\html\craw_window.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\flapper.gif
|
GIF image data, version 89a, 30 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\icon_128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\icon_16.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\topbar_floating_button.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\topbar_floating_button_close.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\topbar_floating_button_hover.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\topbar_floating_button_maximize.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\images\topbar_floating_button_pressed.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir1212_480453973\CRX_INSTALL\manifest.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF600634D9D62A1024.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFBA9233580D836EA0.TMP
|
data
|
dropped
|
There are 225 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
|
"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1572,2584016860965793630,9285400582768245070,131072
--lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1916 /prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation -- "https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1492,14547596045636120040,8967704105705094900,131072
--lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1932 /prefetch:8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|
||
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--field-trial-handle=1008,1868451693323365442,12850068766914001285,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox
--mojo-platform-channel-handle=1468 /prefetch:8
|
||
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation -- "https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|
||
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
|
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--field-trial-handle=980,3874853447565799984,15077386689876222862,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox
--mojo-platform-channel-handle=1380 /prefetch:8
|
||
C:\Windows\splwow64.exe
|
C:\Windows\splwow64.exe 12288
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://eyecandylashcompany.com/payment/frontend_paper_lantern/images/office3651.png
|
69.49.244.155
|
||
https://eyecandylashcompany.com/payment/frontend_paper_lantern/images/gmail.png
|
69.49.244.155
|
||
https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html2
|
unknown
|
||
https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|
69.49.244.155
|
||
https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|
|||
https://eyecandylashcompany.com/payment/frontend_paper_lantern/css/hover.css
|
69.49.244.155
|
||
https://shell.suite.office.com:1443
|
unknown
|
||
https://autodiscover-s.outlook.com/
|
unknown
|
||
https://code.jquery.com/jquery-3.2.1.slim.min.js
|
unknown
|
||
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
|
unknown
|
||
https://cdn.entity.
|
unknown
|
||
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
|
unknown
|
||
https://rpsticket.partnerservices.getmicrosoftkey.com
|
unknown
|
||
https://lookup.onenote.com/lookup/geolocation/v1
|
unknown
|
||
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
|
unknown
|
||
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
|
unknown
|
||
https://api.aadrm.com/
|
unknown
|
||
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
|
unknown
|
||
https://api.microsoftstream.com/api/
|
unknown
|
||
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
|
unknown
|
||
https://cr.office.com
|
unknown
|
||
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
|
104.18.10.207
|
||
https://kit.fontawesome.com/585b051251.js
|
unknown
|
||
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
|
unknown
|
||
https://res.getmicrosoftkey.com/api/redemptionevents
|
unknown
|
||
https://tasks.office.com
|
unknown
|
||
https://officeci.azurewebsites.net/api/
|
unknown
|
||
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
|
unknown
|
||
https://store.office.cn/addinstemplate
|
unknown
|
||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.251.36.238
|
||
https://messaging.engagement.office.com/
|
unknown
|
||
https://payments.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://lh3.googleusercontent.com
|
unknown
|
||
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
https://www.odwebp.svc.ms
|
unknown
|
||
https://api.powerbi.com/v1.0/myorg/groups
|
unknown
|
||
https://web.microsoftstream.com/video/
|
unknown
|
||
https://api.addins.store.officeppe.com/addinstemplate
|
unknown
|
||
https://graph.windows.net
|
unknown
|
||
https://www.google.com/images/dot2.gif
|
unknown
|
||
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
|
unknown
|
||
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
|
unknown
|
||
https://ncus.contentsync.
|
unknown
|
||
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
|
unknown
|
||
http://weather.service.msn.com/data.aspx
|
unknown
|
||
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
|
unknown
|
||
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
|
unknown
|
||
https://wus2.contentsync.
|
unknown
|
||
https://clients.config.office.net/user/v1.0/ios
|
unknown
|
||
https://www.google.com/images/cleardot.gif
|
unknown
|
||
https://play.google.com
|
unknown
|
||
https://o365auditrealtimeingestion.manage.office.com
|
unknown
|
||
https://outlook.office365.com/api/v1.0/me/Activities
|
unknown
|
||
https://clients.config.office.net/user/v1.0/android/policies
|
unknown
|
||
https://entitlement.diagnostics.office.com
|
unknown
|
||
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
|
unknown
|
||
https://outlook.office.com/
|
unknown
|
||
https://accounts.google.com/MergeSession
|
unknown
|
||
https://storage.live.com/clientlogs/uploadlocation
|
unknown
|
||
https://substrate.office.com/search/api/v1/SearchHistory
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
|
unknown
|
||
https://graph.windows.net/
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
https://devnull.onenote.com
|
unknown
|
||
http://schemas.microsoft.cA.
|
unknown
|
||
https://messaging.office.com/
|
unknown
|
||
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
|
unknown
|
||
https://skyapi.live.net/Activity/
|
unknown
|
||
https://www.google.com/intl/en-US/chrome/blank.html
|
unknown
|
||
https://api.cortana.ai
|
unknown
|
||
https://messaging.action.office.com/setcampaignaction
|
unknown
|
||
https://visio.uservoice.com/forums/368202-visio-on-devices
|
unknown
|
||
https://code.jquery.com/jquery-3.1.1.min.js
|
unknown
|
||
https://staging.cortana.ai
|
unknown
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
142.251.36.205
|
||
https://onedrive.live.com/embed?
|
unknown
|
||
https://augloop.office.com
|
unknown
|
||
http://schemas.microsoft.
|
unknown
|
||
https://chromium.googlesource.com/a/native_client/pnacl-llvm.git
|
unknown
|
||
https://api.diagnosticssdf.office.com/v2/file
|
unknown
|
||
https://code.jquery.com/jquery-3.3.1.js
|
unknown
|
||
https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
|
unknown
|
||
https://api.diagnostics.office.com
|
unknown
|
||
https://store.office.de/addinstemplate
|
unknown
|
||
https://wus2.pagecontentsync.
|
unknown
|
||
https://api.powerbi.com/v1.0/myorg/datasets
|
unknown
|
||
https://cortana.ai/api
|
unknown
|
||
https://clients2.googleusercontent.com
|
unknown
|
||
https://chromium.googlesource.com/a/native_client/pnacl-clang.git
|
unknown
|
||
https://clients2.google.com/service/update2/crx
|
unknown
|
||
https://api.diagnosticssdf.office.com
|
unknown
|
||
https://login.microsoftonline.com/
|
unknown
|
||
http://schemas.mic
|
unknown
|
||
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
|
unknown
|
||
https://cdn.pixabay.com/photo/2018/03/10/12/00/paper-3213924_1280.jpg
|
172.64.150.12
|
||
https://roaming.edog.
|
unknown
|
||
https://api.addins.omex.office.net/appinfo/query
|
unknown
|
||
https://clients.config.office.net/user/v1.0/tenantassociationkey
|
unknown
|
||
https://powerlift.acompli.net
|
unknown
|
||
https://consent.google.com
|
unknown
|
||
https://ogs.google.com
|
unknown
|
||
http://www.gmail.com
|
unknown
|
||
https://adservice.google.com
|
unknown
|
||
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
|
104.18.11.207
|
||
https://lh3.googleusercontent.com/proxy/bATQDWurvLlY3z2KTwUlb1gMxwLZoCk7CvqzrLqN1JioLU4nXkElVj-rMrvN
|
unknown
|
||
https://sandbox.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://www.google.com/images/x2.gif
|
unknown
|
||
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
|
104.18.10.207
|
||
https://lh3.googleusercontent.com/proxy/bATQDWurvLlY3z2KTwUlb1gMxwLZoCk7CvqzrLqN1JioLU4nXkElVj-rMrvNZjuUXh3c1WhNOGX5_Cg18Wmltm3vvna-uZDqOkUISXU4XOYsUyt-4962tq2u0WiI358gef4ewWcVp0PA6YiTnICV2Cg7wLzdb0DlXw
|
172.217.16.161
|
||
https://www.google.com
|
unknown
|
||
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
|
104.17.25.14
|
||
https://accounts.google.com
|
unknown
|
||
https://cdn.iconscout.com/icon/free/png-512/microsoft-sharepoint-3-599372.png
|
104.18.29.243
|
||
https://www.google.com/
|
unknown
|
||
https://www-googleapis-staging.sandbox.google.com
|
unknown
|
||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=84.0.4147.135&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.250.185.78
|
||
https://clients2.google.com
|
unknown
|
There are 109 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
eyecandylashcompany.com
|
69.49.244.155
|
||
gstaticadssl.l.google.com
|
142.251.36.227
|
||
stackpath.bootstrapcdn.com
|
104.18.10.207
|
||
accounts.google.com
|
142.251.36.205
|
||
cdnjs.cloudflare.com
|
104.17.24.14
|
||
maxcdn.bootstrapcdn.com
|
104.18.10.207
|
||
clients.l.google.com
|
142.251.36.238
|
||
cdn.iconscout.com
|
104.18.28.243
|
||
cdn.pixabay.com
|
172.64.150.12
|
||
googlehosted.l.googleusercontent.com
|
172.217.16.161
|
||
clients2.google.com
|
unknown
|
||
ka-f.fontawesome.com
|
unknown
|
||
code.jquery.com
|
unknown
|
||
kit.fontawesome.com
|
unknown
|
||
lh3.googleusercontent.com
|
unknown
|
There are 5 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
69.49.244.155
|
eyecandylashcompany.com
|
United States
|
||
104.17.24.14
|
cdnjs.cloudflare.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
104.18.10.207
|
stackpath.bootstrapcdn.com
|
United States
|
||
142.251.36.205
|
accounts.google.com
|
United States
|
||
142.251.36.238
|
clients.l.google.com
|
United States
|
||
142.251.36.227
|
gstaticadssl.l.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.18.28.243
|
cdn.iconscout.com
|
United States
|
||
172.64.150.12
|
cdn.pixabay.com
|
United States
|
||
172.217.16.161
|
googlehosted.l.googleusercontent.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.185.78
|
clients.l.google.com
|
United States
|
||
104.18.11.207
|
stackpath.bootstrapcdn.com
|
United States
|
||
104.18.29.243
|
cdn.iconscout.com
|
United States
|
||
192.168.2.255
|
unknown
|
unknown
|
||
104.17.25.14
|
cdnjs.cloudflare.com
|
United States
|
There are 7 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
|
p$:
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
|
$:
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
|
RemoteClearDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
|
Last
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
FilePath
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
StartDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
EndDate
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
Properties
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
|
Url
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
|
LastClean
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableWinHttpCertAuth
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableIsOwnerRegex
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableSessionAwareHttpClose
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableADALForExtendedApps
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
DisableADALSetSilentAuth
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
msoridDisableGuestCredProvider
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
|
msoridDisableOstringReplace
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
|
LastBootTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\2112D
|
2112D
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
|
MSForms
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ExdCache\Excel8.0
|
MSComctlLib
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\StartupItems
|
"p:
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\35D16
|
35D16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Resiliency\DocumentRecovery\37E0C
|
37E0C
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet
|
UseRWHlinkNavigation
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\General
|
FileFormatBallotBoxAppIDBootedOnce
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
|
en-US
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
|
en-US
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
|
RoamingConfigurableSettings
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
|
RoamingLastSyncTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
|
RoamingLastWriteTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
|
LastBootTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gfdkimpbcpahaombhbimeihdjnejgicl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mfehgcgbbipciphmccgaenjidiccnmng
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
pkedcjkdefgpdelpbcmbmeomcjbeemfm
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gfdkimpbcpahaombhbimeihdjnejgicl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blacklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
vf/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\67A2F
|
67A2F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
4k/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\742F9
|
742F9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\74DE2
|
74DE2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet
|
UseRWHlinkNavigation
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-966771315-3019405637-367336477-1006
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
There are 146 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3AB5000
|
heap
|
page read and write
|
||
3393000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
344F000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
2688C000000
|
heap
|
page read and write
|
||
3A53000
|
heap
|
page read and write
|
||
21E0257F000
|
heap
|
page read and write
|
||
3A72000
|
heap
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
1D022B45000
|
heap
|
page read and write
|
||
1A44A510000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3975000
|
heap
|
page read and write
|
||
79154FF000
|
stack
|
page read and write
|
||
BF0000
|
remote allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
2D03000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
83FEA7E000
|
stack
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
1F17847A000
|
heap
|
page read and write
|
||
2688B340000
|
trusted library allocation
|
page read and write
|
||
268E57D000
|
stack
|
page read and write
|
||
340B000
|
heap
|
page read and write
|
||
342B000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
26885C71000
|
heap
|
page read and write
|
||
3A88000
|
heap
|
page read and write
|
||
1F178456000
|
heap
|
page read and write
|
||
342E000
|
heap
|
page read and write
|
||
337E000
|
heap
|
page read and write
|
||
3A63000
|
heap
|
page read and write
|
||
21E0257C000
|
heap
|
page read and write
|
||
26885CA1000
|
heap
|
page read and write
|
||
2688B244000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2688B20E000
|
trusted library allocation
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
1D022B50000
|
heap
|
page read and write
|
||
19220C29000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
19220C66000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
338F000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
2F15000
|
heap
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
1E982089000
|
heap
|
page read and write
|
||
3A7F000
|
heap
|
page read and write
|
||
1F6AE648000
|
heap
|
page read and write
|
||
FFC000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
FEC000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
21E0259C000
|
heap
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
876597C000
|
stack
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
21E01CD4000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2EA5000
|
heap
|
page read and write
|
||
3A52000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
3A67000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
3ADE000
|
heap
|
page read and write
|
||
268E47E000
|
stack
|
page read and write
|
||
39BA000
|
heap
|
page read and write
|
||
3384000
|
heap
|
page read and write
|
||
791517B000
|
stack
|
page read and write
|
||
E549B7B000
|
stack
|
page read and write
|
||
339F000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
1F6AE650000
|
heap
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
3CB1000
|
heap
|
page read and write
|
||
39BE000
|
heap
|
page read and write
|
||
1EBE07B000
|
stack
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
21E0257C000
|
heap
|
page read and write
|
||
26BD9EA9000
|
heap
|
page read and write
|
||
3A66000
|
heap
|
page read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
2688B4FB000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
3978000
|
heap
|
page read and write
|
||
CAA1AFE000
|
stack
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
3A42000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
21E025A3000
|
heap
|
page read and write
|
||
ADB45FF000
|
stack
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
2F15000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
26885CFD000
|
heap
|
page read and write
|
||
3987000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
3343000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
343C000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
ADB42FC000
|
stack
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
21E0259A000
|
heap
|
page read and write
|
||
3A25000
|
heap
|
page read and write
|
||
2688B350000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
272F4662000
|
heap
|
page read and write
|
||
2688B201000
|
trusted library allocation
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
87657FE000
|
stack
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
7914A7B000
|
stack
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
3522000
|
heap
|
page read and write
|
||
2688B360000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
21E02A00000
|
heap
|
page read and write
|
||
2F06000
|
heap
|
page read and write
|
||
1D022DC5000
|
heap
|
page read and write
|
||
3A5A000
|
heap
|
page read and write
|
||
26886D10000
|
trusted library section
|
page readonly
|
||
39D2000
|
heap
|
page read and write
|
||
1A44A677000
|
heap
|
page read and write
|
||
21E02573000
|
heap
|
page read and write
|
||
26886CE0000
|
trusted library section
|
page readonly
|
||
3A40000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
83FEC7E000
|
stack
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
1F178439000
|
heap
|
page read and write
|
||
26886CD0000
|
trusted library section
|
page readonly
|
||
3384000
|
heap
|
page read and write
|
||
26098200000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
268E07C000
|
stack
|
page read and write
|
||
3987000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
3AA1000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
19220B10000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
21E025B3000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
876557E000
|
stack
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
21E01C64000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
272F4702000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
3982000
|
heap
|
page read and write
|
||
3A4F000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
2E84000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
1E982000000
|
heap
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
8E22E8A000
|
stack
|
page read and write
|
||
21E02270000
|
remote allocation
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
1F178455000
|
heap
|
page read and write
|
||
3AB4000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3B0C000
|
heap
|
page read and write
|
||
26BDAC30000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
21E02573000
|
heap
|
page read and write
|
||
3347000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
21E025A0000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
2688B4FE000
|
heap
|
page read and write
|
||
1EBDBBE000
|
stack
|
page read and write
|
||
3AE2000
|
heap
|
page read and write
|
||
26885C56000
|
heap
|
page read and write
|
||
BF0000
|
remote allocation
|
page read and write
|
||
26BDA950000
|
trusted library allocation
|
page read and write
|
||
2CE3000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3A93000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
3973000
|
heap
|
page read and write
|
||
CAA0D1C000
|
stack
|
page read and write
|
||
21E02270000
|
remote allocation
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
1F6AE63C000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
21E0257B000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
21E019E0000
|
heap
|
page read and write
|
||
3B45000
|
heap
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
3B04000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
2688B230000
|
trusted library allocation
|
page read and write
|
||
268E1FE000
|
stack
|
page read and write
|
||
19220D13000
|
heap
|
page read and write
|
||
26BD9F07000
|
heap
|
page read and write
|
||
3A41000
|
heap
|
page read and write
|
||
21E02571000
|
heap
|
page read and write
|
||
3384000
|
heap
|
page read and write
|
||
3A6F000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
2688B4A7000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
2688B507000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
1D022B42000
|
heap
|
page read and write
|
||
21E01CF8000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
21E02577000
|
heap
|
page read and write
|
||
2688B4DF000
|
heap
|
page read and write
|
||
21E0259A000
|
heap
|
page read and write
|
||
3446000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
3984000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
39C7000
|
heap
|
page read and write
|
||
3AEB000
|
heap
|
page read and write
|
||
3A7A000
|
heap
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
21E025B4000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
1E981FE0000
|
trusted library allocation
|
page read and write
|
||
3A94000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
3968000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
26885C77000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
340E000
|
heap
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
83FEE7E000
|
stack
|
page read and write
|
||
39C0000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
3A55000
|
heap
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
79155FA000
|
stack
|
page read and write
|
||
7914D7A000
|
stack
|
page read and write
|
||
2688B370000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
1EBDF7B000
|
stack
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
26886518000
|
heap
|
page read and write
|
||
3A5F000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
3978000
|
heap
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
2688B50C000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
3347000
|
heap
|
page read and write
|
||
3A84000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
19220C2D000
|
heap
|
page read and write
|
||
21E0254D000
|
heap
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
ADB3F0D000
|
stack
|
page read and write
|
||
19220AB0000
|
heap
|
page read and write
|
||
39C8000
|
heap
|
page read and write
|
||
2688B200000
|
trusted library allocation
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
26BD9E25000
|
heap
|
page read and write
|
||
3A64000
|
heap
|
page read and write
|
||
272F4713000
|
heap
|
page read and write
|
||
14161202000
|
heap
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
268E17F000
|
stack
|
page read and write
|
||
3402000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
2688B4DA000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
3A93000
|
heap
|
page read and write
|
||
26886500000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
3975000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
2688B411000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
1F178413000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
398F000
|
heap
|
page read and write
|
||
272F4676000
|
heap
|
page read and write
|
||
397B000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
342B000
|
heap
|
page read and write
|
||
342F000
|
heap
|
page read and write
|
||
3A45000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3AD7000
|
heap
|
page read and write
|
||
3B4E000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
3ADE000
|
heap
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
21E025A8000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3AF7000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
3434000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
2688B4FB000
|
heap
|
page read and write
|
||
1F17845E000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
3AE0000
|
trusted library allocation
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
3AFB000
|
heap
|
page read and write
|
||
E54987B000
|
stack
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
FFC000
|
heap
|
page read and write
|
||
348B000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
1F178C02000
|
trusted library allocation
|
page read and write
|
||
14161257000
|
heap
|
page read and write
|
||
3B47000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
26098A02000
|
trusted library allocation
|
page read and write
|
||
3968000
|
heap
|
page read and write
|
||
1F17847E000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
3A6C000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
1A44A629000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
3A60000
|
heap
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
21E01C5C000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
1E981E10000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
2688B20B000
|
trusted library allocation
|
page read and write
|
||
1D022B20000
|
heap
|
page read and write
|
||
3342000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
3446000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
1F178445000
|
heap
|
page read and write
|
||
3ADA000
|
heap
|
page read and write
|
||
2E7C000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
2D05000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
3978000
|
heap
|
page read and write
|
||
21E0257C000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
21E02573000
|
heap
|
page read and write
|
||
39BA000
|
heap
|
page read and write
|
||
1F178429000
|
heap
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
51C5D7E000
|
stack
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
2688B350000
|
trusted library allocation
|
page read and write
|
||
21E0257D000
|
heap
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
21E0259E000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
21E01CAB000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
3A67000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
3423000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
26098264000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
26886518000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
2688B502000
|
heap
|
page read and write
|
||
2EA8000
|
heap
|
page read and write
|
||
260980E0000
|
heap
|
page read and write
|
||
26886D00000
|
trusted library section
|
page readonly
|
||
3387000
|
heap
|
page read and write
|
||
1D022B36000
|
heap
|
page read and write
|
||
3AE2000
|
heap
|
page read and write
|
||
3426000
|
heap
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
398C000
|
heap
|
page read and write
|
||
3428000
|
heap
|
page read and write
|
||
397B000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
26098225000
|
heap
|
page read and write
|
||
26BD9CC0000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
1A44A673000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
2688B360000
|
remote allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3395000
|
heap
|
page read and write
|
||
3CC1000
|
heap
|
page read and write
|
||
3A6F000
|
heap
|
page read and write
|
||
268E2FE000
|
stack
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
26BD9E29000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
1F17846D000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3975000
|
heap
|
page read and write
|
||
1A44A5A0000
|
trusted library allocation
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
26885C00000
|
heap
|
page read and write
|
||
3995000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
2688B310000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
21E01C65000
|
heap
|
page read and write
|
||
397E000
|
heap
|
page read and write
|
||
FFA000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
3A30000
|
heap
|
page read and write
|
||
3373000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
26098287000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
3A2B000
|
heap
|
page read and write
|
||
21E01CEA000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2E71000
|
heap
|
page read and write
|
||
ADB46FE000
|
stack
|
page read and write
|
||
3A57000
|
heap
|
page read and write
|
||
3344000
|
heap
|
page read and write
|
||
3483000
|
heap
|
page read and write
|
||
2688B502000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3A22000
|
heap
|
page read and write
|
||
3ADE000
|
heap
|
page read and write
|
||
39BB000
|
heap
|
page read and write
|
||
3A88000
|
heap
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
3502000
|
heap
|
page read and write
|
||
26098170000
|
trusted library allocation
|
page read and write
|
||
3504000
|
heap
|
page read and write
|
||
26098229000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
2688B4F0000
|
heap
|
page read and write
|
||
3431000
|
heap
|
page read and write
|
||
3A74000
|
heap
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
2EA7000
|
heap
|
page read and write
|
||
3A70000
|
heap
|
page read and write
|
||
CAA117B000
|
stack
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
14161870000
|
remote allocation
|
page read and write
|
||
141611E0000
|
trusted library allocation
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3970000
|
heap
|
page read and write
|
||
2F01000
|
heap
|
page read and write
|
||
1A44A713000
|
heap
|
page read and write
|
||
21E02552000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
3507000
|
heap
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
3A61000
|
heap
|
page read and write
|
||
1E9820CC000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
342E000
|
heap
|
page read and write
|
||
3A4B000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
26885D26000
|
heap
|
page read and write
|
||
3407000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
1F6AEE02000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3B4A000
|
heap
|
page read and write
|
||
272F4613000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
1A44A602000
|
heap
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
3A8A000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
337F000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
272F465C000
|
heap
|
page read and write
|
||
26BD9F07000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
3979000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3AE7000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
1F17844F000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
3AB8000
|
heap
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
791567F000
|
stack
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
39B2000
|
heap
|
page read and write
|
||
3A87000
|
heap
|
page read and write
|
||
3334000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
3984000
|
heap
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
14161070000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
3428000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
3A56000
|
heap
|
page read and write
|
||
1A44A659000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
19220C61000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
2EA9000
|
heap
|
page read and write
|
||
1E9820E4000
|
heap
|
page read and write
|
||
3A93000
|
heap
|
page read and write
|
||
272F463C000
|
heap
|
page read and write
|
||
19220C83000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
26886518000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
26886513000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
339F000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
19220D02000
|
heap
|
page read and write
|
||
272F4708000
|
heap
|
page read and write
|
||
CAA16FE000
|
stack
|
page read and write
|
||
2688B0A0000
|
trusted library allocation
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
3433000
|
heap
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
343F000
|
heap
|
page read and write
|
||
26BDAC10000
|
heap
|
page readonly
|
||
272F44B0000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
3384000
|
heap
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
3A75000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1F178446000
|
heap
|
page read and write
|
||
3968000
|
heap
|
page read and write
|
||
2688B45F000
|
heap
|
page read and write
|
||
FC2C57E000
|
stack
|
page read and write
|
||
26886415000
|
heap
|
page read and write
|
||
21E025A8000
|
heap
|
page read and write
|
||
5CD317B000
|
stack
|
page read and write
|
||
3422000
|
heap
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
21E01C13000
|
heap
|
page read and write
|
||
26885C94000
|
heap
|
page read and write
|
||
21E02575000
|
heap
|
page read and write
|
||
E549A7C000
|
stack
|
page read and write
|
||
397E000
|
heap
|
page read and write
|
||
3AE6000
|
heap
|
page read and write
|
||
3A93000
|
heap
|
page read and write
|
||
3978000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
1416123D000
|
heap
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
CAA15FD000
|
stack
|
page read and write
|
||
21E01CC9000
|
heap
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
350E000
|
heap
|
page read and write
|
||
3A4E000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
3ABE000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3347000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2E8A000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
2CEE000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
26BD9F0C000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
3A87000
|
heap
|
page read and write
|
||
39B7000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
21E025DB000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
2688B670000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
26886559000
|
heap
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
26BDA9B0000
|
trusted library allocation
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
2688B220000
|
trusted library allocation
|
page read and write
|
||
3A52000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
21E0257F000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
3A2A000
|
heap
|
page read and write
|
||
21E0257C000
|
heap
|
page read and write
|
||
1EBE4FE000
|
stack
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3A71000
|
heap
|
page read and write
|
||
21E02593000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
26BDA9C0000
|
trusted library allocation
|
page read and write
|
||
3A7A000
|
heap
|
page read and write
|
||
5CD327F000
|
stack
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
1F178444000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
1F1782C0000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
3AB9000
|
heap
|
page read and write
|
||
2CEE000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
791527E000
|
stack
|
page read and write
|
||
344F000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
2E7C000
|
heap
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
3AA0000
|
heap
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
3A58000
|
heap
|
page read and write
|
||
2CE7000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
2688B42D000
|
heap
|
page read and write
|
||
342F000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
7914E7A000
|
stack
|
page read and write
|
||
1E9820BB000
|
heap
|
page read and write
|
||
26886701000
|
trusted library allocation
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
1E982013000
|
heap
|
page read and write
|
||
3ABE000
|
heap
|
page read and write
|
||
1D022B61000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
3A98000
|
heap
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
1D022B31000
|
heap
|
page read and write
|
||
342F000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
3A64000
|
heap
|
page read and write
|
||
2688B499000
|
heap
|
page read and write
|
||
3AD4000
|
heap
|
page read and write
|
||
FC2C11D000
|
stack
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
39D4000
|
heap
|
page read and write
|
||
1F178A80000
|
trusted library allocation
|
page read and write
|
||
21E02517000
|
heap
|
page read and write
|
||
21E02563000
|
heap
|
page read and write
|
||
2688B330000
|
trusted library allocation
|
page read and write
|
||
3429000
|
heap
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
1A44A702000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
2688B206000
|
trusted library allocation
|
page read and write
|
||
1D022B2B000
|
heap
|
page read and write
|
||
51C61FE000
|
stack
|
page read and write
|
||
2688B680000
|
trusted library allocation
|
page read and write
|
||
2E76000
|
heap
|
page read and write
|
||
3A5A000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
2E5C000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
26BD9EB1000
|
heap
|
page read and write
|
||
1F6AE713000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
3343000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
3AB0000
|
heap
|
page read and write
|
||
FC2C5FB000
|
stack
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3342000
|
heap
|
page read and write
|
||
1E981DB0000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
26885B40000
|
heap
|
page read and write
|
||
1029000
|
heap
|
page read and write
|
||
83FED7E000
|
stack
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
51C5C7C000
|
stack
|
page read and write
|
||
1F17846A000
|
heap
|
page read and write
|
||
21E025A4000
|
heap
|
page read and write
|
||
21E02575000
|
heap
|
page read and write
|
||
3A47000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3975000
|
heap
|
page read and write
|
||
26886558000
|
heap
|
page read and write
|
||
3A4C000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
2688B44B000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
3A3C000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
8765B7C000
|
stack
|
page read and write
|
||
3A6D000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
26BD9EFB000
|
heap
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
2EF7000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
3ADB000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
1E982700000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
1EBDE7E000
|
stack
|
page read and write
|
||
3A42000
|
heap
|
page read and write
|
||
3A27000
|
heap
|
page read and write
|
||
2688B43E000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
3A73000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
83FEAFE000
|
stack
|
page read and write
|
||
791547F000
|
stack
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
1EBE1F7000
|
stack
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
79152FF000
|
stack
|
page read and write
|
||
8E2337E000
|
stack
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3AE0000
|
trusted library allocation
|
page read and write
|
||
3967000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
2688B4AC000
|
heap
|
page read and write
|
||
268DCBB000
|
stack
|
page read and write
|
||
1F6AE629000
|
heap
|
page read and write
|
||
2BAC000
|
stack
|
page read and write
|
||
19220C3C000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
3B43000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
348E000
|
heap
|
page read and write
|
||
3AE9000
|
heap
|
page read and write
|
||
26886518000
|
heap
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
3AB6000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
2E64000
|
heap
|
page read and write
|
||
350E000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
3A2A000
|
heap
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
2EA5000
|
heap
|
page read and write
|
||
1F6AE480000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
1F178461000
|
heap
|
page read and write
|
||
3A2E000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
3A75000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
14161A02000
|
trusted library allocation
|
page read and write
|
||
21E0259A000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
3A72000
|
heap
|
page read and write
|
||
26885D13000
|
heap
|
page read and write
|
||
2F1E000
|
heap
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
26885B30000
|
heap
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3AA3000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
3A67000
|
heap
|
page read and write
|
||
51C6478000
|
stack
|
page read and write
|
||
3A38000
|
heap
|
page read and write
|
||
2688B4FB000
|
heap
|
page read and write
|
||
333B000
|
heap
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
2E9A000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
26BD9E20000
|
heap
|
page read and write
|
||
1F6AE64D000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
2688B200000
|
trusted library allocation
|
page read and write
|
||
26886559000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2688B50C000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
3A2E000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
1E9820C4000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3A45000
|
heap
|
page read and write
|
||
1EBE3FC000
|
stack
|
page read and write
|
||
21E02573000
|
heap
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
21E02A20000
|
heap
|
page read and write
|
||
2688B4F6000
|
heap
|
page read and write
|
||
26886518000
|
heap
|
page read and write
|
||
19220AA0000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
3A7A000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
1F17844C000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
heap
|
page read and write
|
||
21E0259A000
|
heap
|
page read and write
|
||
3A6C000
|
heap
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
39CC000
|
heap
|
page read and write
|
||
1F6AE602000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
272F4654000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
1F178430000
|
heap
|
page read and write
|
||
3395000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
3A93000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
3989000
|
heap
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
1A44A613000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
3A44000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2688B50C000
|
heap
|
page read and write
|
||
51C5CFE000
|
stack
|
page read and write
|
||
39BE000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
14161229000
|
heap
|
page read and write
|
||
337E000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
2E9B000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
26886781000
|
trusted library allocation
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
1017000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3434000
|
heap
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
26BD9E30000
|
heap
|
page read and write
|
||
2688B400000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
3A6A000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
1F178448000
|
heap
|
page read and write
|
||
3B42000
|
heap
|
page read and write
|
||
1F6AE672000
|
heap
|
page read and write
|
||
26885BE0000
|
trusted library section
|
page read and write
|
||
791537F000
|
stack
|
page read and write
|
||
19220C79000
|
heap
|
page read and write
|
||
3A5A000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
3A72000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
3A8B000
|
heap
|
page read and write
|
||
21E02592000
|
heap
|
page read and write
|
||
26886CF0000
|
trusted library section
|
page readonly
|
||
2CC0000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
CAA12FE000
|
stack
|
page read and write
|
||
2688B2D0000
|
trusted library allocation
|
page read and write
|
||
21E01B50000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
83FEF7F000
|
stack
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
E549DFE000
|
stack
|
page read and write
|
||
21E0259D000
|
heap
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
3B44000
|
heap
|
page read and write
|
||
3AF5000
|
heap
|
page read and write
|
||
3CB0000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
3A23000
|
heap
|
page read and write
|
||
21E02270000
|
remote allocation
|
page read and write
|
||
87656FC000
|
stack
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
3CB1000
|
heap
|
page read and write
|
||
26BD9FA0000
|
trusted library allocation
|
page read and write
|
||
2D02000
|
heap
|
page read and write
|
||
3A8A000
|
heap
|
page read and write
|
||
2E87000
|
heap
|
page read and write
|
||
21E02594000
|
heap
|
page read and write
|
||
3A64000
|
heap
|
page read and write
|
||
26885BA0000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3369000
|
heap
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
3A6E000
|
heap
|
page read and write
|
||
1E981DA0000
|
heap
|
page read and write
|
||
3A57000
|
heap
|
page read and write
|
||
268863F0000
|
trusted library allocation
|
page read and write
|
||
5CD307B000
|
stack
|
page read and write
|
||
338C000
|
heap
|
page read and write
|
||
E549CF7000
|
stack
|
page read and write
|
||
1F6AE613000
|
heap
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
397A000
|
heap
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
3A48000
|
heap
|
page read and write
|
||
102E000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
3434000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
26BD9F01000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
3984000
|
heap
|
page read and write
|
||
3AF4000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
3AE0000
|
heap
|
page read and write
|
||
1A44A700000
|
heap
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
2609825A000
|
heap
|
page read and write
|
||
337F000
|
heap
|
page read and write
|
||
3A72000
|
heap
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
2EA8000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
102C000
|
heap
|
page read and write
|
||
19220C4D000
|
heap
|
page read and write
|
||
21E02A03000
|
heap
|
page read and write
|
||
342B000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
342B000
|
heap
|
page read and write
|
||
3A6F000
|
heap
|
page read and write
|
||
3A97000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
21E02A3E000
|
heap
|
page read and write
|
||
338A000
|
heap
|
page read and write
|
||
21E0257D000
|
heap
|
page read and write
|
||
3A42000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
3A5A000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
1D022A90000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
272F462A000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
3AB4000
|
heap
|
page read and write
|
||
1EBE2FF000
|
stack
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
334E000
|
heap
|
page read and write
|
||
1F178502000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3B4A000
|
heap
|
page read and write
|
||
26886558000
|
heap
|
page read and write
|
||
3A57000
|
heap
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
21E02592000
|
heap
|
page read and write
|
||
399F000
|
heap
|
page read and write
|
||
26098302000
|
heap
|
page read and write
|
||
3A4E000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
26885C13000
|
heap
|
page read and write
|
||
3AD5000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
2E9A000
|
heap
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
3A62000
|
heap
|
page read and write
|
||
3984000
|
heap
|
page read and write
|
||
21E02573000
|
heap
|
page read and write
|
||
3AE4000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
2688B070000
|
trusted library allocation
|
page read and write
|
||
21E02402000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3A7F000
|
heap
|
page read and write
|
||
3A9D000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3A8A000
|
heap
|
page read and write
|
||
21E0259A000
|
heap
|
page read and write
|
||
21E025BF000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
337F000
|
heap
|
page read and write
|
||
1F178447000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
2E84000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
3984000
|
heap
|
page read and write
|
||
333A000
|
heap
|
page read and write
|
||
14161080000
|
heap
|
page read and write
|
||
21E0257B000
|
heap
|
page read and write
|
||
3453000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
348E000
|
heap
|
page read and write
|
||
3A5E000
|
heap
|
page read and write
|
||
79157FE000
|
stack
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
26BDAC00000
|
trusted library allocation
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
BF0000
|
remote allocation
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
21E0257C000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
2D0B000
|
heap
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
26BD9F00000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
26885C3D000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
3B04000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3989000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
2CE4000
|
heap
|
page read and write
|
||
19220D00000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
8765C7F000
|
stack
|
page read and write
|
||
2D02000
|
heap
|
page read and write
|
||
26098275000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
1A44A570000
|
heap
|
page read and write
|
||
3522000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2E65000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3A67000
|
heap
|
page read and write
|
||
3A66000
|
heap
|
page read and write
|
||
26885C9F000
|
heap
|
page read and write
|
||
2688B205000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
39A1000
|
heap
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
3AA4000
|
heap
|
page read and write
|
||
3A52000
|
heap
|
page read and write
|
||
21E01A50000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
3A93000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
1F178477000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
26885C8F000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
ADB3F8E000
|
stack
|
page read and write
|
||
21E0257C000
|
heap
|
page read and write
|
||
21E025B3000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3A5B000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
3B4B000
|
heap
|
page read and write
|
||
3A27000
|
heap
|
page read and write
|
||
3435000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
21E025AB000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
791507A000
|
stack
|
page read and write
|
||
2688B50A000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
21E025B4000
|
heap
|
page read and write
|
||
3973000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
3507000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
3376000
|
heap
|
page read and write
|
||
19221270000
|
trusted library allocation
|
page read and write
|
||
3B40000
|
heap
|
page read and write
|
||
3407000
|
heap
|
page read and write
|
||
337E000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2609826C000
|
heap
|
page read and write
|
||
26098265000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
3345000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
272F4520000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
1EBE0FE000
|
stack
|
page read and write
|
||
3A72000
|
heap
|
page read and write
|
||
14161870000
|
remote allocation
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
1F178431000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
337E000
|
heap
|
page read and write
|
||
E549EFE000
|
stack
|
page read and write
|
||
3A6E000
|
heap
|
page read and write
|
||
3A6F000
|
heap
|
page read and write
|
||
272F4660000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
2688B420000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
3B4E000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
E5498FE000
|
stack
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
1F17845E000
|
heap
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
21E0257A000
|
heap
|
page read and write
|
||
1F178460000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
26886BE0000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
333E000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
19221402000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
1F178320000
|
heap
|
page read and write
|
||
19220C5E000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
141610E0000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
26BD9E90000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
1F178462000
|
heap
|
page read and write
|
||
1E982102000
|
heap
|
page read and write
|
||
350B000
|
heap
|
page read and write
|
||
3446000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
2609823D000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
21E01C8A000
|
heap
|
page read and write
|
||
7914C77000
|
stack
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
3524000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3976000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
1F178449000
|
heap
|
page read and write
|
||
2EA9000
|
heap
|
page read and write
|
||
1028000
|
heap
|
page read and write
|
||
21E01CB5000
|
heap
|
page read and write
|
||
334E000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2688B0F0000
|
trusted library allocation
|
page read and write
|
||
2C3A000
|
stack
|
page read and write
|
||
FC2C479000
|
stack
|
page read and write
|
||
3A55000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
87653FC000
|
stack
|
page read and write
|
||
2F06000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3A64000
|
heap
|
page read and write
|
||
7914F7E000
|
stack
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
26885C8B000
|
heap
|
page read and write
|
||
2EA5000
|
heap
|
page read and write
|
||
1D022A70000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
3AD0000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
21E0257F000
|
heap
|
page read and write
|
||
3976000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3ADA000
|
heap
|
page read and write
|
||
3332000
|
heap
|
page read and write
|
||
1F6AE708000
|
heap
|
page read and write
|
||
26BDAC20000
|
trusted library allocation
|
page read and write
|
||
3523000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
21E02500000
|
heap
|
page read and write
|
||
3482000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
1A44A682000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
21E01CE7000
|
heap
|
page read and write
|
||
26BD9EEA000
|
heap
|
page read and write
|
||
26098275000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
3A54000
|
heap
|
page read and write
|
||
21E01D08000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
39B3000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
CAA19FF000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
21E01CEA000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3A61000
|
heap
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
268863D1000
|
trusted library allocation
|
page read and write
|
||
2688B509000
|
heap
|
page read and write
|
||
3CC4000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
1A44A500000
|
heap
|
page read and write
|
||
21E01D13000
|
heap
|
page read and write
|
||
2EF6000
|
heap
|
page read and write
|
||
8E22F8E000
|
stack
|
page read and write
|
||
3AA3000
|
heap
|
page read and write
|
||
1A44A63D000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
3968000
|
heap
|
page read and write
|
||
2BB9000
|
stack
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
2D05000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
3969000
|
heap
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
3A53000
|
heap
|
page read and write
|
||
8E233FC000
|
stack
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
3A44000
|
heap
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
3CA0000
|
heap
|
page read and write
|
||
21E02515000
|
heap
|
page read and write
|
||
1F17847B000
|
heap
|
page read and write
|
||
26885D02000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
21E01C00000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
51C62F8000
|
stack
|
page read and write
|
||
21E0254D000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
3982000
|
heap
|
page read and write
|
||
39B5000
|
heap
|
page read and write
|
||
2688B221000
|
trusted library allocation
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
2CEB000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
1F6AE470000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
3B0C000
|
heap
|
page read and write
|
||
272F4600000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
342E000
|
heap
|
page read and write
|
||
342B000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
2688B230000
|
trusted library allocation
|
page read and write
|
||
19220C00000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
3978000
|
heap
|
page read and write
|
||
3973000
|
heap
|
page read and write
|
||
3A37000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
1F178442000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
E54997D000
|
stack
|
page read and write
|
||
21E025A4000
|
heap
|
page read and write
|
||
2688B320000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
26885C24000
|
heap
|
page read and write
|
||
337F000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
2EA9000
|
heap
|
page read and write
|
||
1D022B50000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
51C60F7000
|
stack
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
3A95000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
ADB44F7000
|
stack
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
51C5EFE000
|
stack
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
1F17846B000
|
heap
|
page read and write
|
||
3AD2000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
1F178467000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
3A48000
|
heap
|
page read and write
|
||
21E02574000
|
heap
|
page read and write
|
||
1D022B36000
|
heap
|
page read and write
|
||
39B4000
|
heap
|
page read and write
|
||
2688B50C000
|
heap
|
page read and write
|
||
21E01CE1000
|
heap
|
page read and write
|
||
26BD9EEA000
|
heap
|
page read and write
|
||
2EA9000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
1D022B62000
|
heap
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
51C5FF7000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
3A52000
|
heap
|
page read and write
|
||
344F000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
2E7C000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
272F4682000
|
heap
|
page read and write
|
||
397E000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
1F6AE600000
|
heap
|
page read and write
|
||
21E02593000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
2D07000
|
heap
|
page read and write
|
||
350A000
|
heap
|
page read and write
|
||
1F1782B0000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3345000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
21E019F0000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
1F178450000
|
heap
|
page read and write
|
||
2E9D000
|
heap
|
page read and write
|
||
CAA13FB000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
2EA9000
|
heap
|
page read and write
|
||
3A24000
|
heap
|
page read and write
|
||
3974000
|
heap
|
page read and write
|
||
2609826F000
|
heap
|
page read and write
|
||
3ABB000
|
heap
|
page read and write
|
||
336C000
|
heap
|
page read and write
|
||
2688B20A000
|
trusted library allocation
|
page read and write
|
||
2688B224000
|
trusted library allocation
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
2688B208000
|
trusted library allocation
|
page read and write
|
||
1E982023000
|
heap
|
page read and write
|
||
14161302000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
ADB43FB000
|
stack
|
page read and write
|
||
21E02577000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
1F178440000
|
heap
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
26886400000
|
heap
|
page read and write
|
||
26886502000
|
heap
|
page read and write
|
||
3A94000
|
heap
|
page read and write
|
||
3A6D000
|
heap
|
page read and write
|
||
21E01CC2000
|
heap
|
page read and write
|
||
79153FE000
|
stack
|
page read and write
|
||
2688B240000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
2688B060000
|
trusted library allocation
|
page read and write
|
||
3AAC000
|
heap
|
page read and write
|
||
3B10000
|
heap
|
page read and write
|
||
3B0D000
|
heap
|
page read and write
|
||
1D022B46000
|
heap
|
page read and write
|
||
26885BD0000
|
trusted library allocation
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
1D022DC0000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
3AA8000
|
heap
|
page read and write
|
||
3395000
|
heap
|
page read and write
|
||
3AB3000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
21E01D02000
|
heap
|
page read and write
|
||
39B7000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
19220C92000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
1A44A600000
|
heap
|
page read and write
|
||
1F178441000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
3378000
|
heap
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
FC2C09B000
|
stack
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
1F17843D000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
339F000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
21E025A0000
|
heap
|
page read and write
|
||
2688B080000
|
trusted library allocation
|
page read and write
|
||
1D022B50000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3971000
|
heap
|
page read and write
|
||
3A72000
|
heap
|
page read and write
|
||
5CD2B4C000
|
stack
|
page read and write
|
||
1F6AE627000
|
heap
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
3A74000
|
heap
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
342F000
|
heap
|
page read and write
|
||
26BD9EE3000
|
heap
|
page read and write
|
||
21E0257B000
|
heap
|
page read and write
|
||
3973000
|
heap
|
page read and write
|
||
26BD9CB0000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
2CE5000
|
heap
|
page read and write
|
||
CAA18FF000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
334B000
|
heap
|
page read and write
|
||
26098313000
|
heap
|
page read and write
|
||
21E02581000
|
heap
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
260980D0000
|
heap
|
page read and write
|
||
272F44C0000
|
heap
|
page read and write
|
||
2E9F000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
39D6000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
2688B50A000
|
heap
|
page read and write
|
||
3AB5000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
1D022B44000
|
heap
|
page read and write
|
||
2CE2000
|
heap
|
page read and write
|
||
2E83000
|
heap
|
page read and write
|
||
3A48000
|
heap
|
page read and write
|
||
3ADA000
|
heap
|
page read and write
|
||
2E9B000
|
heap
|
page read and write
|
||
3434000
|
heap
|
page read and write
|
||
3379000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
26BDAC80000
|
trusted library allocation
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
21E01D16000
|
heap
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
3374000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
3423000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
26887060000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
21E01C69000
|
heap
|
page read and write
|
||
1F6AE652000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
21E0257B000
|
heap
|
page read and write
|
||
1E98206E000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
39A1000
|
heap
|
page read and write
|
||
3AE0000
|
trusted library allocation
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
3AE5000
|
heap
|
page read and write
|
||
26098140000
|
heap
|
page read and write
|
||
1E982712000
|
heap
|
page read and write
|
||
1F17845E000
|
heap
|
page read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
3980000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
334E000
|
heap
|
page read and write
|
||
1F178484000
|
heap
|
page read and write
|
||
39BA000
|
heap
|
page read and write
|
||
3335000
|
heap
|
page read and write
|
||
26885C29000
|
heap
|
page read and write
|
||
1D022B4E000
|
heap
|
page read and write
|
||
3381000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
1D022B4E000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
3A6B000
|
heap
|
page read and write
|
||
21E025B3000
|
heap
|
page read and write
|
||
FC2C4F9000
|
stack
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3A6D000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3A54000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
3368000
|
heap
|
page read and write
|
||
26098202000
|
heap
|
page read and write
|
||
26886A00000
|
trusted library allocation
|
page read and write
|
||
3333000
|
heap
|
page read and write
|
||
3AE0000
|
trusted library allocation
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
341C000
|
heap
|
page read and write
|
||
FC2C67E000
|
stack
|
page read and write
|
||
14161213000
|
heap
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
21E01C29000
|
heap
|
page read and write
|
||
268E3FD000
|
stack
|
page read and write
|
||
3AE3000
|
heap
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
21E0251D000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
83FE79B000
|
stack
|
page read and write
|
||
1F17844D000
|
heap
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
3383000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
19220C5A000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3B47000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
2EB5000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
268863F3000
|
trusted library allocation
|
page read and write
|
||
3995000
|
heap
|
page read and write
|
||
21E02A02000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
398F000
|
heap
|
page read and write
|
||
1F6AE702000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
3523000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
3969000
|
heap
|
page read and write
|
||
3AAC000
|
heap
|
page read and write
|
||
CAA17FF000
|
stack
|
page read and write
|
||
2688B360000
|
remote allocation
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
8764FAB000
|
stack
|
page read and write
|
||
2688C010000
|
heap
|
page read and write
|
||
340E000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
21E02592000
|
heap
|
page read and write
|
||
3A5A000
|
heap
|
page read and write
|
||
3AE0000
|
trusted library allocation
|
page read and write
|
||
26886402000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
3484000
|
heap
|
page read and write
|
||
3A88000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
2688B360000
|
remote allocation
|
page read and write
|
||
2E9A000
|
heap
|
page read and write
|
||
3ADD000
|
heap
|
page read and write
|
||
26BD9EA0000
|
heap
|
page read and write
|
||
FFC000
|
heap
|
page read and write
|
||
19220C13000
|
heap
|
page read and write
|
||
1017000
|
heap
|
page read and write
|
||
2D03000
|
heap
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
26885C7B000
|
heap
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
21E0254D000
|
heap
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
2EF8000
|
heap
|
page read and write
|
||
2D04000
|
heap
|
page read and write
|
||
3973000
|
heap
|
page read and write
|
||
3AD3000
|
heap
|
page read and write
|
||
3978000
|
heap
|
page read and write
|
||
2EFA000
|
heap
|
page read and write
|
||
3A5A000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
E549BFF000
|
stack
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
2688B4FF000
|
heap
|
page read and write
|
||
3A57000
|
heap
|
page read and write
|
||
21E0259E000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
103D000
|
heap
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
3B4A000
|
heap
|
page read and write
|
||
1F6AE657000
|
heap
|
page read and write
|
||
3A60000
|
heap
|
page read and write
|
||
3A6C000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
272F4700000
|
heap
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
26886CC0000
|
trusted library section
|
page readonly
|
||
21E01CAB000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
397E000
|
heap
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
352E000
|
heap
|
page read and write
|
||
26886518000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3A52000
|
heap
|
page read and write
|
||
21E025C7000
|
heap
|
page read and write
|
||
272F4E02000
|
trusted library allocation
|
page read and write
|
||
3972000
|
heap
|
page read and write
|
||
343A000
|
heap
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3AE0000
|
trusted library allocation
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
5CD337E000
|
stack
|
page read and write
|
||
3988000
|
heap
|
page read and write
|
||
FF6000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
1A44AE02000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
3AEE000
|
heap
|
page read and write
|
||
3A60000
|
heap
|
page read and write
|
||
2688B464000
|
heap
|
page read and write
|
||
3453000
|
heap
|
page read and write
|
||
3AD7000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3A61000
|
heap
|
page read and write
|
||
876567F000
|
stack
|
page read and write
|
||
3391000
|
heap
|
page read and write
|
||
396C000
|
heap
|
page read and write
|
||
3387000
|
heap
|
page read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
1E982602000
|
heap
|
page read and write
|
||
1F6AE4E0000
|
heap
|
page read and write
|
||
3C20000
|
trusted library allocation
|
page read and write
|
||
1F6AE5E0000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
2688B502000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1F6AE66A000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
3A88000
|
heap
|
page read and write
|
||
21E02592000
|
heap
|
page read and write
|
||
26886559000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
FEE000
|
heap
|
page read and write
|
||
ADB3E8C000
|
stack
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
2688B4FD000
|
heap
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
1F6AE68C000
|
heap
|
page read and write
|
||
2E73000
|
heap
|
page read and write
|
||
3373000
|
heap
|
page read and write
|
||
3A88000
|
heap
|
page read and write
|
||
3ABD000
|
heap
|
page read and write
|
||
1F6AE66A000
|
heap
|
page read and write
|
||
14161200000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
19220D08000
|
heap
|
page read and write
|
||
3A5E000
|
heap
|
page read and write
|
||
876587B000
|
stack
|
page read and write
|
||
51C637E000
|
unkown
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
1EBDB3B000
|
stack
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
397D000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
3A81000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
21E0259D000
|
heap
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
26BD9DF0000
|
heap
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
14161870000
|
remote allocation
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
3979000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
3975000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3980000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
334E000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
1F6AE681000
|
heap
|
page read and write
|
||
E7C000
|
stack
|
page read and write
|
||
3375000
|
heap
|
page read and write
|
||
21E01C60000
|
heap
|
page read and write
|
||
1006000
|
heap
|
page read and write
|
||
8E2327F000
|
stack
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
3AFB000
|
heap
|
page read and write
|
||
21E02576000
|
heap
|
page read and write
|
||
3960000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
FC2C19E000
|
stack
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
3A2A000
|
heap
|
page read and write
|
||
337B000
|
heap
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
7914B7E000
|
unkown
|
page read and write
|
||
3505000
|
heap
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
3984000
|
heap
|
page read and write
|
||
1D022B4E000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3A6D000
|
heap
|
page read and write
|
||
51C5E7C000
|
stack
|
page read and write
|
||
19220C5C000
|
heap
|
page read and write
|
||
342B000
|
heap
|
page read and write
|
||
1E982044000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
1F6AE700000
|
heap
|
page read and write
|
||
3AEB000
|
heap
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
3437000
|
heap
|
page read and write
|
||
8E232F8000
|
stack
|
page read and write
|
||
26BD9EEC000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
2688B502000
|
heap
|
page read and write
|
||
21E01C57000
|
heap
|
page read and write
|
||
3A58000
|
heap
|
page read and write
|
||
1E982029000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
21E02593000
|
heap
|
page read and write
|
||
19220C54000
|
heap
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
2EFF000
|
heap
|
page read and write
|
||
3970000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3393000
|
heap
|
page read and write
|
||
1F178400000
|
heap
|
page read and write
|
||
2E72000
|
heap
|
page read and write
|
||
2688B507000
|
heap
|
page read and write
|
||
104F000
|
heap
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
3A68000
|
heap
|
page read and write
|
||
FCA000
|
heap
|
page read and write
|
||
3CC1000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
3AC7000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
21E02592000
|
heap
|
page read and write
|
||
26098213000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
3372000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1D022940000
|
heap
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
1E982113000
|
heap
|
page read and write
|
||
8E22F0F000
|
stack
|
page read and write
|
||
26BD9EEA000
|
heap
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
3CB0000
|
trusted library allocation
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
8765A7E000
|
stack
|
page read and write
|
||
2688B0E0000
|
trusted library allocation
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
398C000
|
heap
|
page read and write
|
||
21E02580000
|
heap
|
page read and write
|
||
21E02593000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
3AEE000
|
heap
|
page read and write
|
||
21E01C3C000
|
heap
|
page read and write
|
||
103B000
|
heap
|
page read and write
|
||
272F4C80000
|
trusted library allocation
|
page read and write
|
||
272F465E000
|
heap
|
page read and write
|
There are 2119 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://eyecandylashcompany.com/payment/frontend_paper_lantern/index.html
|