IOC Report
http://app.1self.co/v1/streams//events

loading gif

Files

File Path
Type
Category
Malicious
C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\18beeecc-34b3-4233-bbfd-7ae961ce2be6.tmp
SysEx File -
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\1925cbb2-5dce-487c-95e8-c368f2e421d3.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\5f904f67-d5e1-4fee-a5ea-3fef9d65b6d4.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\7737ef24-4fa3-4457-b3c9-349e6de92dd5.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
data
modified
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\0f21645d-ae51-46c5-8072-3834e3bfcc67.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\1415ef02-a835-453a-884c-c1db67153032.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\4a6c5730-d44e-46f3-9b1d-3bf0dd029a92.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\4c4b06da-4ae3-492e-b834-b6a461066129.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\5e6a9ead-c41e-42e6-b088-323f46bc7f25.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\664180b5-b62c-4bec-9a6e-0ad6f7982129.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\7396eec4-920e-43e2-bc64-522371ecdd7b.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\9829bee1-abed-4e62-8f97-94f11908fb56.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\d0281781-5f13-4742-a6d1-e40d8cc087ec.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\afc23d10-ede0-4a41-891d-ec6296e799b4.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\f30f7bee-95b6-485a-90a2-f5d626cee9e5.tmp
ASCII text, with very long lines, with no line terminators
modified
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ff323c7b-9cfc-455f-98e1-d89683890d78.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\d780d5b1-1b99-40b4-b2a9-2a9fae71cf91.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\f91c1e09-fa1f-4ff8-a53a-66516d55459e.tmp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\fac75d26-239a-4442-b7c3-d77920272bac.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\46f2797b-517e-490a-bb4b-6ed430254de1.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\7290f0a2-acde-45d0-837a-39d1960c0d40.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\87ceedb2-1079-4f44-8505-cf591eae855d.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\9dada8b5-3a97-487d-983e-eac7c6d88fdd.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\87ceedb2-1079-4f44-8505-cf591eae855d.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\bg\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ca\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\cs\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\da\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\de\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\el\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\en\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\en_GB\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\es\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\es_419\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\et\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\fi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\fil\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\fr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\hi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\hr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\hu\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\id\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\it\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ja\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ko\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\lt\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\lv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\nb\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\nl\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\pl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\pt_BR\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\pt_PT\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ro\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ru\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\th\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\tr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\uk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\vi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\zh_CN\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\zh_TW\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\craw_background.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\craw_window.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\css\craw_window.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\html\craw_window.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\flapper.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\icon_128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\icon_16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_close.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_hover.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_maximize.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_pressed.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\manifest.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\46f2797b-517e-490a-bb4b-6ed430254de1.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\bg\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ca\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\cs\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\da\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\de\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\el\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\en\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\en_GB\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\es\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\es_419\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\et\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\fi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\fil\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\fr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\hi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\hr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\hu\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\id\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\it\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ja\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ko\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\lt\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\lv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\nb\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\nl\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\pl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\pt_BR\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\pt_PT\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ro\messages.json
UTF-8 Unicode text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ru\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sk\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sl\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sr\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sv\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\th\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\tr\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\uk\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\vi\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\zh_CN\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\zh_TW\messages.json
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\craw_background.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\craw_window.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\css\craw_window.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\html\craw_window.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\flapper.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\icon_128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\icon_16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_close.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_hover.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_maximize.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_pressed.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\manifest.json
ASCII text, with CRLF line terminators
dropped
There are 143 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1504,7241009153634526847,18253391524234669070,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1920 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" "http://app.1self.co/v1/streams//events

URLs

Name
IP
Malicious
http://app.1self.co/v1/streams//events
https://www.google.com
unknown
https://www.google.com/images/dot2.gif
unknown
https://dns.google
unknown
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
unknown
https://www.google.com/intl/en-US/chrome/blank.html
unknown
https://ogs.google.com
unknown
https://www.google.com/images/cleardot.gif
unknown
https://play.google.com
unknown
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
172.217.168.14
https://accounts.google.com
unknown
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
142.250.203.109
https://payments.google.com/payments/v4/js/integrator.js
unknown
http://app.1self.co/v1/streams//events
35.205.61.67
https://clients2.googleusercontent.com
unknown
https://apis.google.com
unknown
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
unknown
https://sandbox.google.com/payments/v4/js/integrator.js
unknown
https://www.google.com/images/x2.gif
unknown
https://www.google.com/
unknown
https://www-googleapis-staging.sandbox.google.com
unknown
http://app.1self.co/v1/streams//1
35.205.61.67
https://accounts.google.com/MergeSession
unknown
https://clients2.google.com
unknown
https://clients2.google.com/service/update2/crx
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
app.1self.co
35.205.61.67
accounts.google.com
142.250.203.109
clients.l.google.com
172.217.168.14
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
172.217.168.14
clients.l.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown
142.250.203.109
accounts.google.com
United States
35.205.61.67
app.1self.co
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mfehgcgbbipciphmccgaenjidiccnmng
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
pkedcjkdefgpdelpbcmbmeomcjbeemfm
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blacklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
There are 40 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
127FD32C000
trusted library allocation
page read and write
1F4BF030000
remote allocation
page read and write
127FC343000
heap
page read and write
127FD1C4000
trusted library allocation
page read and write
127FD320000
trusted library allocation
page read and write
40079FF000
stack
page read and write
127FD725000
heap
page read and write
127FDCD3000
heap
page read and write
127FDCC9000
heap
page read and write
127FDCAA000
heap
page read and write
1AD95600000
heap
page read and write
127FD64F000
heap
page read and write
127FC3CF000
heap
page read and write
1F4BA39A000
heap
page read and write
127FD270000
remote allocation
page read and write
127FD600000
heap
page read and write
22EA6031000
heap
page read and write
127FD774000
heap
page read and write
1E2A2AC1000
heap
page read and write
127FDCB0000
heap
page read and write
127FD74B000
heap
page read and write
127FD1CE000
trusted library allocation
page read and write
127FDCD6000
heap
page read and write
266227A000
stack
page read and write
14EED002000
heap
page read and write
127FC12E000
heap
page read and write
1AD9564B000
heap
page read and write
1E2A3002000
heap
page read and write
127FDE0B000
heap
page read and write
127FDC61000
heap
page read and write
2661EFE000
stack
page read and write
1F4BA215000
heap
page read and write
127FD766000
heap
page read and write
200D3E55000
heap
page read and write
1DA34A4B000
heap
page read and write
127FDC4D000
heap
page read and write
127FD762000
heap
page read and write
127FDD5A000
heap
page read and write
EF044FC000
stack
page read and write
127FDCEB000
heap
page read and write
A191C77000
stack
page read and write
1F4BEEF0000
trusted library allocation
page read and write
127FD77B000
heap
page read and write
40078FB000
stack
page read and write
22C9487E000
heap
page read and write
1F4BF25D000
heap
page read and write
127FD770000
heap
page read and write
1AD95613000
heap
page read and write
127FD626000
heap
page read and write
127FDC37000
heap
page read and write
127FDD53000
heap
page read and write
1F4BF315000
heap
page read and write
127FD1C8000
trusted library allocation
page read and write
127FD727000
heap
page read and write
127FDCB2000
heap
page read and write
22C9488A000
heap
page read and write
127FDCAE000
heap
page read and write
127FC3D3000
heap
page read and write
127FDC96000
heap
page read and write
127FDCF1000
heap
page read and write
1F4BA1C0000
trusted library allocation
page read and write
127FDD24000
heap
page read and write
22EA5F10000
heap
page read and write
127FDC9F000
heap
page read and write
1DA34A85000
heap
page read and write
127FD1CE000
trusted library allocation
page read and write
11A137E000
stack
page read and write
282F0400000
heap
page read and write
127FD7B6000
heap
page read and write
127FDD0A000
heap
page read and write
1F4BF000000
trusted library allocation
page read and write
282F0360000
heap
page read and write
1AD95602000
heap
page read and write
656B6FF000
stack
page read and write
200D3C30000
heap
page read and write
127FD32C000
trusted library allocation
page read and write
27188A70000
heap
page read and write
1F4BAA10000
trusted library section
page readonly
40076FE000
stack
page read and write
127FCFA0000
trusted library section
page readonly
127FD746000
heap
page read and write
1F4B9970000
trusted library allocation
page read and write
127FC100000
heap
page read and write
127FDD4C000
heap
page read and write
656B87E000
stack
page read and write
266237E000
stack
page read and write
C44D6FA000
stack
page read and write
127FD62C000
heap
page read and write
127FD759000
heap
page read and write
1F4B9A8F000
heap
page read and write
1F4BF2F8000
heap
page read and write
127FB7D0000
trusted library allocation
page read and write
127FD550000
trusted library allocation
page read and write
127FC397000
heap
page read and write
127FD77A000
heap
page read and write
127FD7C0000
heap
page read and write
127FD192000
trusted library allocation
page read and write
127FD1BE000
trusted library allocation
page read and write
127FB856000
heap
page read and write
127FDC4A000
heap
page read and write
127FDE00000
heap
page read and write
1F4B9A00000
heap
page read and write
127FD7FB000
heap
page read and write
1AD95713000
heap
page read and write
14EECED0000
heap
page read and write
127FC34D000
heap
page read and write
14EECFA0000
remote allocation
page read and write
22C947F0000
heap
page read and write
127FDC7A000
heap
page read and write
127FD7DA000
heap
page read and write
1F4BF322000
heap
page read and write
A19178E000
stack
page read and write
127FCA01000
trusted library allocation
page read and write
282F03F0000
trusted library allocation
page read and write
22EA6041000
heap
page read and write
127FB83C000
heap
page read and write
266217F000
stack
page read and write
1F4BED70000
trusted library allocation
page read and write
229237E000
stack
page read and write
127FDC6C000
heap
page read and write
22C94902000
heap
page read and write
127FD7F3000
heap
page read and write
127FD1D0000
trusted library allocation
page read and write
127FD602000
heap
page read and write
1F4BF200000
heap
page read and write
282F0500000
heap
page read and write
1DA34A47000
heap
page read and write
1F4BF24A000
heap
page read and write
127FDC91000
heap
page read and write
127FC3D6000
heap
page read and write
127FD310000
trusted library allocation
page read and write
127FD1CC000
trusted library allocation
page read and write
127FD7F8000
heap
page read and write
127FDC71000
heap
page read and write
127FC3A8000
heap
page read and write
127FD215000
trusted library allocation
page read and write
1F4BA200000
heap
page read and write
127FD7AF000
heap
page read and write
127FD191000
trusted library allocation
page read and write
127FDC8B000
heap
page read and write
127FDCBD000
heap
page read and write
C44D4F9000
stack
page read and write
16891E02000
heap
page read and write
127FD7FA000
heap
page read and write
127FC3A7000
heap
page read and write
656B67E000
stack
page read and write
127FDC43000
heap
page read and write
1AD95670000
heap
page read and write
2661DFC000
stack
page read and write
1F4BEED0000
trusted library allocation
page read and write
127FC015000
heap
page read and write
127FDCB0000
heap
page read and write
200D3E02000
heap
page read and write
1F4BF020000
trusted library allocation
page read and write
200D3E7B000
heap
page read and write
1E2A2A6E000
heap
page read and write
16891C60000
heap
page read and write
127FD1BC000
trusted library allocation
page read and write
127FD250000
trusted library allocation
page read and write
127FDDDB000
heap
page read and write
127FDD5E000
heap
page read and write
1DA34A41000
heap
page read and write
11A0EFC000
stack
page read and write
127FD320000
trusted library allocation
page read and write
1F4C0000000
heap
page read and write
127FC11D000
heap
page read and write
127FDC87000
heap
page read and write
1F4B9AFA000
heap
page read and write
1F4BF302000
heap
page read and write
282F0457000
heap
page read and write
127FDCA8000
heap
page read and write
127FB843000
heap
page read and write
127FBFE0000
trusted library allocation
page read and write
127FB895000
heap
page read and write
127FD72A000
heap
page read and write
1F4B9870000
heap
page read and write
1AD95626000
heap
page read and write
127FDC8D000
heap
page read and write
127FDCA4000
heap
page read and write
1DA34A6E000
heap
page read and write
127FDC74000
heap
page read and write
127FD7BF000
heap
page read and write
127FD669000
heap
page read and write
127FDD88000
heap
page read and write
127FB843000
heap
page read and write
55068FB000
stack
page read and write
282F0502000
heap
page read and write
127FD797000
heap
page read and write
55064EB000
stack
page read and write
656B8FC000
stack
page read and write
1F4BEF10000
trusted library allocation
page read and write
26620FE000
stack
page read and write
127FD7F1000
heap
page read and write
127FD32C000
trusted library allocation
page read and write
A19168B000
stack
page read and write
16891E58000
heap
page read and write
27188B13000
heap
page read and write
127FDDDC000
heap
page read and write
127FD1D2000
trusted library allocation
page read and write
127FC223000
heap
page read and write
127FD1C0000
trusted library allocation
page read and write
C44D7FB000
stack
page read and write
22C94829000
heap
page read and write
127FD74F000
heap
page read and write
127FDD8B000
heap
page read and write
1AD9568F000
heap
page read and write
1F4BA9F0000
trusted library section
page readonly
127FDC2D000
heap
page read and write
127FDD69000
heap
page read and write
14EECF40000
heap
page read and write
1DA34A78000
heap
page read and write
27188A99000
heap
page read and write
127FD1B0000
trusted library allocation
page read and write
127FD1FA000
trusted library allocation
page read and write
1DA34A7F000
heap
page read and write
1DA34A4F000
heap
page read and write
127FD747000
heap
page read and write
127FC3CC000
heap
page read and write
27188A13000
heap
page read and write
127FDC4D000
heap
page read and write
656B7FC000
stack
page read and write
8FF613B000
stack
page read and write
EF0410E000
stack
page read and write
127FD320000
trusted library allocation
page read and write
127FD270000
remote allocation
page read and write
27189130000
unkown
page write copy
1F4BF328000
heap
page read and write
127FD7FC000
heap
page read and write
1DA34A2E000
heap
page read and write
127FDE12000
heap
page read and write
88CF8EB000
stack
page read and write
22EA6056000
heap
page read and write
127FD65C000
heap
page read and write
127FD741000
heap
page read and write
127FC37A000
heap
page read and write
1F4BA700000
trusted library allocation
page read and write
1F4BEFF0000
trusted library allocation
page read and write
127FD1C2000
trusted library allocation
page read and write
127FDE12000
heap
page read and write
229227E000
stack
page read and write
127FC36F000
heap
page read and write
127FDC72000
heap
page read and write
127FD1C0000
trusted library allocation
page read and write
127FDC10000
heap
page read and write
1F4BF22C000
heap
page read and write
127FDCBF000
heap
page read and write
127FD2A0000
remote allocation
page read and write
127FD7F1000
heap
page read and write
EF0487F000
stack
page read and write
127FD7F6000
heap
page read and write
127FD7F6000
heap
page read and write
127FC002000
heap
page read and write
1DA34A7B000
heap
page read and write
127FD1BC000
trusted library allocation
page read and write
127FD638000
heap
page read and write
200D3C40000
heap
page read and write
127FDCC7000
heap
page read and write
127FD702000
heap
page read and write
127FDC79000
heap
page read and write
550717F000
stack
page read and write
127FD300000
trusted library allocation
page read and write
127FDD2D000
heap
page read and write
127FC391000
heap
page read and write
127FD1B0000
trusted library allocation
page read and write
5506D7D000
stack
page read and write
1DA34A6C000
heap
page read and write
127FDD06000
heap
page read and write
1F4BF2FC000
heap
page read and write
127FD7C7000
heap
page read and write
550707F000
stack
page read and write
127FDC2B000
heap
page read and write
1AD9567E000
heap
page read and write
127FDE0B000
heap
page read and write
127FD764000
heap
page read and write
1F4BF020000
trusted library allocation
page read and write
127FDCDA000
heap
page read and write
127FDCB8000
heap
page read and write
127FD32C000
trusted library allocation
page read and write
127FDCEF000
heap
page read and write
127FDD80000
heap
page read and write
127FDC61000
heap
page read and write
127FD070000
trusted library allocation
page read and write
127FC354000
heap
page read and write
127FDCF3000
heap
page read and write
14EED03D000
heap
page read and write
127FDD63000
heap
page read and write
1F4BF212000
heap
page read and write
1F4BA8E0000
trusted library allocation
page read and write
266150C000
stack
page read and write
1F4BF1C0000
trusted library allocation
page read and write
14EECEE0000
heap
page read and write
282F0452000
heap
page read and write
1AD95700000
heap
page read and write
127FD7EF000
heap
page read and write
127FD324000
trusted library allocation
page read and write
1DA347D0000
heap
page read and write
1F4BA9E0000
trusted library section
page readonly
944CCF7000
stack
page read and write
1F4B9A6E000
heap
page read and write
1F4BA318000
heap
page read and write
127FDD77000
heap
page read and write
1AD95651000
heap
page read and write
22C94790000
heap
page read and write
127FC258000
heap
page read and write
14EECF70000
trusted library allocation
page read and write
127FDC1F000
heap
page read and write
88CF96F000
stack
page read and write
127FDCB3000
heap
page read and write
1E2A2AE8000
heap
page read and write
14EED013000
heap
page read and write
9B36B79000
stack
page read and write
127FD655000
heap
page read and write
127FD75D000
heap
page read and write
127FCFB0000
trusted library section
page readonly
127FC1B0000
heap
page read and write
1AD9564E000
heap
page read and write
127FDE02000
heap
page read and write
127FDC0E000
heap
page read and write
1DA34A29000
heap
page read and write
127FD1B5000
trusted library allocation
page read and write
127FDC37000
heap
page read and write
127FD634000
heap
page read and write
127FDD1F000
heap
page read and write
127FD7AF000
heap
page read and write
C44DAFD000
stack
page read and write
1F4BAD60000
trusted library allocation
page read and write
1F4BA9D0000
trusted library section
page readonly
127FC127000
heap
page read and write
127FDC2F000
heap
page read and write
1AD95688000
heap
page read and write
127FD74E000
heap
page read and write
127FD662000
heap
page read and write
127FDCBF000
heap
page read and write
8FF657C000
stack
page read and write
EF0467E000
stack
page read and write
282F045B000
heap
page read and write
C44CD77000
stack
page read and write
127FDCE4000
heap
page read and write
127FD639000
heap
page read and write
16891E40000
heap
page read and write
22C94780000
heap
page read and write
127FD7F6000
heap
page read and write
127FDDB9000
heap
page read and write
127FDC19000
heap
page read and write
127FD7B2000
heap
page read and write
127FD1CC000
trusted library allocation
page read and write
22C94880000
heap
page read and write
22C9485D000
heap
page read and write
127FD643000
heap
page read and write
22EA603B000
heap
page read and write
282F0478000
heap
page read and write
127FD781000
heap
page read and write
282F03C0000
heap
page read and write
550656D000
stack
page read and write
127FD65F000
heap
page read and write
127FDC6A000
heap
page read and write
1F369335000
heap
page read and write
12780000000
trusted library allocation
page read and write
2291ECB000
stack
page read and write
127FD3C0000
trusted library allocation
page read and write
9B3697E000
stack
page read and write
127FD771000
heap
page read and write
127FDC83000
heap
page read and write
127FC384000
heap
page read and write
127FD7A4000
heap
page read and write
127FC3D3000
heap
page read and write
1F4BF2FE000
heap
page read and write
127FD610000
heap
page read and write
127FDC6F000
heap
page read and write
1DA34A32000
heap
page read and write
127FD626000
heap
page read and write
127FDC78000
heap
page read and write
127FDD49000
heap
page read and write
EF04777000
stack
page read and write
127FDCBB000
heap
page read and write
200D3E71000
heap
page read and write
127FD72D000
heap
page read and write
127FC3D1000
heap
page read and write
127FDD6C000
heap
page read and write
127FD430000
trusted library allocation
page read and write
A191AFC000
stack
page read and write
127FDD67000
heap
page read and write
127FC3FC000
heap
page read and write
127FD74B000
heap
page read and write
944C77F000
stack
page read and write
1F4BEFE0000
trusted library allocation
page read and write
1DA34A00000
heap
page read and write
1DA34A42000
heap
page read and write
127FDCE9000
heap
page read and write
127FDCB1000
heap
page read and write
127FDDA9000
heap
page read and write
C44D57E000
stack
page read and write
127FC191000
heap
page read and write
22925FD000
stack
page read and write
127FD1C6000
trusted library allocation
page read and write
1AD955C0000
trusted library allocation
page read and write
1F4B9A13000
heap
page read and write
EF0408B000
stack
page read and write
9B36A7E000
stack
page read and write
1E2A2A13000
heap
page read and write
1F4B9A78000
heap
page read and write
127FD230000
trusted library allocation
page read and write
127FD215000
trusted library allocation
page read and write
16891E60000
heap
page read and write
127FCC88000
trusted library allocation
page read and write
127FD72A000
heap
page read and write
C44D37E000
stack
page read and write
2661CFA000
stack
page read and write
1F4BF31A000
heap
page read and write
127FC3E4000
heap
page read and write
1E2A3100000
heap
page read and write
944CEFC000
stack
page read and write
127FD7F1000
heap
page read and write
127FD73F000
heap
page read and write
282F0482000
heap
page read and write
229267F000
stack
page read and write
266158E000
stack
page read and write
127FC3E1000
heap
page read and write
127FDCE7000
heap
page read and write
127FDC82000
heap
page read and write
22EA6000000
heap
page read and write
22EA6002000
heap
page read and write
C44CF7B000
stack
page read and write
944C6FC000
stack
page read and write
127FDDAA000
heap
page read and write
1F4BF030000
trusted library allocation
page read and write
127FD724000
heap
page read and write
1DA34A60000
heap
page read and write
127FD7E6000
heap
page read and write
127FDCAD000
heap
page read and write
1F4B9A73000
heap
page read and write
127FC3AF000
heap
page read and write
127FDCA9000
heap
page read and write
127FB88D000
heap
page read and write
16891E28000
heap
page read and write
27188990000
trusted library allocation
page read and write
127FDC50000
heap
page read and write
127FDCB6000
heap
page read and write
127FC980000
trusted library allocation
page read and write
1F4BA1E0000
trusted library allocation
page read and write
1AD95629000
heap
page read and write
127FB780000
heap
page read and write
127FDD5B000
heap
page read and write
127FDD14000
heap
page read and write
1DA34A67000
heap
page read and write
944CDFF000
stack
page read and write
127FD324000
trusted library allocation
page read and write
127FD7A2000
heap
page read and write
127FDC4B000
heap
page read and write
27188A3C000
heap
page read and write
22C9487E000
heap
page read and write
656B3CA000
stack
page read and write
127FDDBC000
heap
page read and write
88CF9EF000
stack
page read and write
22EA5EB0000
heap
page read and write
127FD62F000
heap
page read and write
1F4BEED1000
trusted library allocation
page read and write
26622FE000
stack
page read and write
127FD3F0000
trusted library allocation
page read and write
127FDDB3000
heap
page read and write
127FCFE0000
trusted library section
page readonly
22924FF000
stack
page read and write
127FDC4D000
heap
page read and write
127FDC6E000
heap
page read and write
1F4B99E1000
trusted library allocation
page read and write
127FD700000
heap
page read and write
127FDDC0000
heap
page read and write
282F0508000
heap
page read and write
127FDD7C000
heap
page read and write
127FDC77000
heap
page read and write
127FDE19000
heap
page read and write
127FD653000
heap
page read and write
27188900000
heap
page read and write
127FDD2F000
heap
page read and write
127FB813000
heap
page read and write
127FD32C000
trusted library allocation
page read and write
1F369340000
heap
page read and write
16891E6B000
heap
page read and write
127FB720000
heap
page read and write
127FB98E000
heap
page read and write
127FDD4E000
heap
page read and write
127FD1C4000
trusted library allocation
page read and write
127FDCCF000
heap
page read and write
127FD7FC000
heap
page read and write
127FC3D4000
heap
page read and write
127FC39F000
heap
page read and write
88CFEF7000
stack
page read and write
127FDC4C000
heap
page read and write
127FDCA6000
heap
page read and write
22C94800000
heap
page read and write
8FF69FB000
stack
page read and write
1DA34A13000
heap
page read and write
1F4BF2F2000
heap
page read and write
1DA34A30000
heap
page read and write
127FD1CA000
trusted library allocation
page read and write
127FDD95000
heap
page read and write
127FD710000
heap
page read and write
1F4BEED0000
trusted library allocation
page read and write
127FDCE4000
heap
page read and write
11A167F000
stack
page read and write
127FDE19000
heap
page read and write
127FDCE1000
heap
page read and write
200D3DA0000
trusted library allocation
page read and write
127FC1C6000
heap
page read and write
127FDCD8000
heap
page read and write
127FDDAF000
heap
page read and write
127FD1C0000
trusted library allocation
page read and write
127FDCAC000
heap
page read and write
127FD72B000
heap
page read and write
127FC000000
heap
page read and write
1F4BF030000
remote allocation
page read and write
1F4B9A29000
heap
page read and write
127FC300000
heap
page read and write
200D3E13000
heap
page read and write
127FD781000
heap
page read and write
127FDD13000
heap
page read and write
127FDC4D000
heap
page read and write
944C7FE000
stack
page read and write
127FD7C0000
heap
page read and write
8FF61BE000
stack
page read and write
127FD754000
heap
page read and write
127FD320000
trusted library allocation
page read and write
127FD1B0000
trusted library allocation
page read and write
22EA6013000
heap
page read and write
127FB800000
heap
page read and write
127FD77D000
heap
page read and write
1F4B9AAC000
heap
page read and write
1E2A2A88000
heap
page read and write
22C94813000
heap
page read and write
C44CE7A000
stack
page read and write
127FD786000
heap
page read and write
5506A7F000
stack
page read and write
127FDC7B000
heap
page read and write
8FF697C000
stack
page read and write
1F4BF140000
trusted library allocation
page read and write
127FD62D000
heap
page read and write
1F4BEEDE000
trusted library allocation
page read and write
1F4B9A89000
heap
page read and write
127FD7E7000
heap
page read and write
16891BF0000
heap
page read and write
22EA6802000
trusted library allocation
page read and write
14EED029000
heap
page read and write
127FC16F000
heap
page read and write
127FD1B0000
trusted library allocation
page read and write
14EED000000
heap
page read and write
127FDC70000
heap
page read and write
22C94F50000
trusted library allocation
page read and write
127FDCC4000
heap
page read and write
1DA34A3A000
heap
page read and write
127FD7C5000
heap
page read and write
A191B7F000
stack
page read and write
127FDC89000
heap
page read and write
127FDC66000
heap
page read and write
1AD95702000
heap
page read and write
127FDC18000
heap
page read and write
1F4B9A8B000
heap
page read and write
127FDC00000
heap
page read and write
127FD2E0000
trusted library allocation
page read and write
127FD1B5000
trusted library allocation
page read and write
127FDC96000
heap
page read and write
1E2A27A0000
heap
page read and write
1F4B9800000
heap
page read and write
127FDC0E000
heap
page read and write
127FD1B8000
trusted library allocation
page read and write
127FD73A000
heap
page read and write
127FDD89000
heap
page read and write
127FDD1D000
heap
page read and write
127FD080000
trusted library allocation
page read and write
22C94908000
heap
page read and write
5506F7F000
stack
page read and write
8FF6BFF000
stack
page read and write
127FDCA7000
heap
page read and write
127FDCAB000
heap
page read and write
127FDC31000
heap
page read and write
1F4BEF00000
trusted library allocation
page read and write
1F3691E0000
heap
page read and write
127FC1CA000
heap
page read and write
127FD75F000
heap
page read and write
22C94865000
heap
page read and write
14EECFA0000
remote allocation
page read and write
127FDD25000
heap
page read and write
127FDC16000
heap
page read and write
1F4BA300000
heap
page read and write
127FD7E4000
heap
page read and write
127FD1C4000
trusted library allocation
page read and write
127FD72E000
heap
page read and write
127FD7EF000
heap
page read and write
127FDC2D000
heap
page read and write
1F4BA1F0000
trusted library allocation
page read and write
127FDC53000
heap
page read and write
1F4BA401000
trusted library allocation
page read and write
266187E000
stack
page read and write
16891E79000
heap
page read and write
1F4B9810000
heap
page read and write
1E2A2AD2000
heap
page read and write
1DA34A6A000
heap
page read and write
14EED058000
heap
page read and write
127FC1F3000
heap
page read and write
127FDDCD000
heap
page read and write
127FC25A000
heap
page read and write
1AD954C0000
heap
page read and write
A191F7E000
stack
page read and write
127FD370000
trusted library allocation
page read and write
229287F000
stack
page read and write
127FD1B8000
trusted library allocation
page read and write
127FD310000
trusted library allocation
page read and write
127FD190000
trusted library allocation
page read and write
14EECFA0000
remote allocation
page read and write
127FD7EF000
heap
page read and write
1F4BF2F8000
heap
page read and write
127FDC23000
heap
page read and write
127FD7FC000
heap
page read and write
127FC202000
heap
page read and write
127FD75B000
heap
page read and write
C44D17B000
stack
page read and write
1F4BA1C3000
trusted library allocation
page read and write
1DA34A75000
heap
page read and write
127FD781000
heap
page read and write
127FC200000
heap
page read and write
944CBFB000
stack
page read and write
200D3E5C000
heap
page read and write
127FB86C000
heap
page read and write
22C94860000
heap
page read and write
22EA6102000
heap
page read and write
127FB710000
heap
page read and write
1F4BEF14000
trusted library allocation
page read and write
127FE010000
heap
page read and write
271889B0000
unkown
page readonly
1DA34A76000
heap
page read and write
127FC3A8000
heap
page read and write
88CFFFF000
stack
page read and write
127FDC4D000
heap
page read and write
266207F000
stack
page read and write
127FDCED000
heap
page read and write
127FDCA7000
heap
page read and write
127FC1D1000
heap
page read and write
127FD65B000
heap
page read and write
127FD7A3000
heap
page read and write
282F0427000
heap
page read and write
127FDC81000
heap
page read and write
282F0413000
heap
page read and write
EF0497F000
stack
page read and write
127FD7C5000
heap
page read and write
127FDCBD000
heap
page read and write
27188960000
heap
page read and write
9B368FF000
stack
page read and write
16891E00000
heap
page read and write
127FC3B4000
heap
page read and write
127FD310000
trusted library allocation
page read and write
1E2A2B02000
heap
page read and write
2661BF9000
stack
page read and write
127FDC7F000
heap
page read and write
127FB892000
heap
page read and write
127FDC4D000
heap
page read and write
282F043C000
heap
page read and write
1DA34B02000
heap
page read and write
127FDC37000
heap
page read and write
1DA34A39000
heap
page read and write
1F4BF262000
heap
page read and write
127FDC94000
heap
page read and write
127FD1C2000
trusted library allocation
page read and write
EF045FB000
stack
page read and write
127FDC60000
heap
page read and write
2661A7F000
stack
page read and write
127FD000000
trusted library allocation
page read and write
127FDCA0000
heap
page read and write
C44C9AD000
stack
page read and write
127FDC26000
heap
page read and write
127FDD38000
heap
page read and write
2662AFD000
unkown
page read and write
127FC158000
heap
page read and write
127FD613000
heap
page read and write
16891D60000
trusted library allocation
page read and write
22C9483C000
heap
page read and write
127FD653000
heap
page read and write
282F0462000
heap
page read and write
11A157E000
stack
page read and write
26627FE000
stack
page read and write
944CAFB000
stack
page read and write
27188B02000
heap
page read and write
88CFDFB000
stack
page read and write
1F4BEED5000
trusted library allocation
page read and write
22C95002000
trusted library allocation
page read and write
27188A8A000
heap
page read and write
127FDD35000
heap
page read and write
127FD1AC000
trusted library allocation
page read and write
127FD7F8000
heap
page read and write
127FC12C000
heap
page read and write
127FCFC0000
trusted library section
page readonly
127FD7C3000
heap
page read and write
127FDC5E000
heap
page read and write
16891F00000
heap
page read and write
C44D1FE000
stack
page read and write
9B36D7F000
stack
page read and write
127FDC6E000
heap
page read and write
1DA347C0000
heap
page read and write
127FD1CA000
trusted library allocation
page read and write
1E2A2800000
heap
page read and write
127FD1D2000
trusted library allocation
page read and write
127FDD91000
heap
page read and write
C44CC7E000
stack
page read and write
1DA34F90000
trusted library allocation
page read and write
40077FB000
stack
page read and write
127FB86E000
heap
page read and write
127FD76C000
heap
page read and write
127FD330000
trusted library allocation
page read and write
550727F000
stack
page read and write
127FB9C2000
heap
page read and write
127FDC10000
heap
page read and write
127FD7B4000
heap
page read and write
127FBFC1000
trusted library allocation
page read and write
127FB863000
heap
page read and write
127FD64D000
heap
page read and write
C44D07F000
stack
page read and write
27188A83000
heap
page read and write
127FDC65000
heap
page read and write
1DA34A61000
heap
page read and write
127FDD1B000
heap
page read and write
22C94900000
heap
page read and write
26628FF000
stack
page read and write
127FDC93000
heap
page read and write
127FD324000
trusted library allocation
page read and write
1F4BF2E1000
heap
page read and write
127FD32C000
trusted library allocation
page read and write
127FDC8F000
heap
page read and write
11A147F000
stack
page read and write
229277D000
stack
page read and write
1F4BEED8000
trusted library allocation
page read and write
1F4BA1D0000
trusted library allocation
page read and write
127FDD56000
heap
page read and write
1E2A3112000
heap
page read and write
14EED052000
heap
page read and write
1F36942E000
heap
page read and write
1F4BEEF4000
trusted library allocation
page read and write
127FC21B000
heap
page read and write
127FD1C0000
trusted library allocation
page read and write
8FF6AFD000
stack
page read and write
8FF647D000
stack
page read and write
127FDD03000
heap
page read and write
1F4BF150000
trusted library allocation
page read and write
127FD5A0000
trusted library allocation
page read and write
127FDC62000
heap
page read and write
127FDDB5000
heap
page read and write
127FDCC5000
heap
page read and write
127FD650000
heap
page read and write
9B36E7F000
stack
page read and write
1F4BF30A000
heap
page read and write
27188A00000
heap
page read and write
2661FFA000
stack
page read and write
127FDD58000
heap
page read and write
127FDC12000
heap
page read and write
C44D27F000
stack
page read and write
C44D3FE000
stack
page read and write
127FD1C6000
trusted library allocation
page read and write
16891E5B000
heap
page read and write
127FD1BE000
trusted library allocation
page read and write
282F0513000
heap
page read and write
127FD190000
trusted library allocation
page read and write
127FD63A000
heap
page read and write
1E2A2B13000
heap
page read and write
127FD776000
heap
page read and write
C44C92B000
stack
page read and write
127FD738000
heap
page read and write
127FD768000
heap
page read and write
127FE010000
heap
page read and write
1F4BEDB0000
trusted library allocation
page read and write
C44D2FE000
stack
page read and write
1F4BA313000
heap
page read and write
127FDC7C000
heap
page read and write
127FCEC0000
trusted library allocation
page read and write
26624FD000
stack
page read and write
282F0350000
heap
page read and write
1F4BF289000
heap
page read and write
1AD95460000
heap
page read and write
127FD781000
heap
page read and write
282F0460000
heap
page read and write
2291FCE000
stack
page read and write
127FD77B000
heap
page read and write
1DA34A46000
heap
page read and write
127FDCA5000
heap
page read and write
1AD95E02000
trusted library allocation
page read and write
5506C7F000
stack
page read and write
1AD9563C000
heap
page read and write
1DA34A7C000
heap
page read and write
127FD2F0000
trusted library allocation
page read and write
1F4BA9C0000
trusted library section
page readonly
266197A000
stack
page read and write
127FD310000
trusted library allocation
page read and write
127FD420000
trusted library allocation
page read and write
1E2A2A3E000
heap
page read and write
127FDCA2000
heap
page read and write
127FD7C7000
heap
page read and write
1DA34830000
heap
page read and write
127FDDCA000
heap
page read and write
127FC3CF000
heap
page read and write
127FD1FA000
trusted library allocation
page read and write
127FD3B0000
trusted library allocation
page read and write
A191D77000
stack
page read and write
1F4BEF00000
trusted library allocation
page read and write
8FF66FE000
stack
page read and write
127FD7F6000
heap
page read and write
127FDE0B000
heap
page read and write
127FCFD0000
trusted library section
page readonly
A191E7C000
stack
page read and write
22C94802000
heap
page read and write
1F4BF30B000
heap
page read and write
1F4B9B13000
heap
page read and write
200D3E29000
heap
page read and write
EF0418E000
stack
page read and write
127FD7B2000
heap
page read and write
27188A29000
heap
page read and write
127FC3CE000
heap
page read and write
1E2A2AE2000
heap
page read and write
127FD23C000
trusted library allocation
page read and write
16891E13000
heap
page read and write
127FC3C2000
heap
page read and write
550697E000
stack
page read and write
127FDC5D000
heap
page read and write
127FC3D7000
heap
page read and write
127FDDAD000
heap
page read and write
1F4BF308000
heap
page read and write
271888F0000
heap
page read and write
1DA34A40000
heap
page read and write
26626FE000
stack
page read and write
127FC3F0000
heap
page read and write
127FDC97000
heap
page read and write
1DA34A39000
heap
page read and write
1DA34A3D000
heap
page read and write
2291F4E000
stack
page read and write
1F4BF2DB000
heap
page read and write
127FDC94000
heap
page read and write
127FDC9F000
heap
page read and write
656B778000
stack
page read and write
22C94913000
heap
page read and write
127FD1D0000
trusted library allocation
page read and write
127FD7E9000
heap
page read and write
1F4BA318000
heap
page read and write
127FDD8D000
heap
page read and write
127FDC7E000
heap
page read and write
1F4BA302000
heap
page read and write
26629FD000
stack
page read and write
1F4BF2B0000
heap
page read and write
127FDCE5000
heap
page read and write
88CFCFB000
stack
page read and write
282F0C02000
trusted library allocation
page read and write
1F4BF030000
remote allocation
page read and write
200D3CA0000
heap
page read and write
127FDC93000
heap
page read and write
127FBFF0000
trusted library allocation
page read and write
127FDC21000
heap
page read and write
127FD764000
heap
page read and write
127FDC31000
heap
page read and write
11A0F7E000
stack
page read and write
127FC1CF000
heap
page read and write
200D3E61000
heap
page read and write
127FDC29000
heap
page read and write
127FB7B0000
trusted library allocation
page read and write
127FD324000
trusted library allocation
page read and write
1DA34A62000
heap
page read and write
127FD1B0000
trusted library allocation
page read and write
40073EE000
stack
page read and write
200D3E61000
heap
page read and write
22EA603E000
heap
page read and write
127FCC90000
trusted library allocation
page read and write
127FD1C0000
trusted library allocation
page read and write
127FDCC1000
heap
page read and write
127FCFF0000
trusted library section
page readonly
A19207A000
stack
page read and write
200D3E3F000
heap
page read and write
127FD63F000
heap
page read and write
127FC3EF000
heap
page read and write
127FD360000
trusted library allocation
page read and write
127FD656000
heap
page read and write
127FDC1B000
heap
page read and write
127FC11D000
heap
page read and write
1F4BF317000
heap
page read and write
26623FF000
stack
page read and write
127FD300000
trusted library allocation
page read and write
127FD1B0000
trusted library allocation
page read and write
22EA6047000
heap
page read and write
127FD7B1000
heap
page read and write
127FD7F1000
heap
page read and write
127FC3AF000
heap
page read and write
127FCC80000
trusted library allocation
page read and write
127FD1CC000
trusted library allocation
page read and write
127FDD46000
heap
page read and write
127FB9EB000
heap
page read and write
1F4BEEF1000
trusted library allocation
page read and write
127FD658000
heap
page read and write
22EA6029000
heap
page read and write
16891F13000
heap
page read and write
127FD1B0000
trusted library allocation
page read and write
127FD712000
heap
page read and write
127FDD1A000
heap
page read and write
127FC3D9000
heap
page read and write
2661B7C000
stack
page read and write
127FD3B0000
trusted library allocation
page read and write
127FB913000
heap
page read and write
127FD637000
heap
page read and write
127FDCC3000
heap
page read and write
22EA6670000
trusted library allocation
page read and write
127FDE0B000
heap
page read and write
C44D5FF000
stack
page read and write
127FDC76000
heap
page read and write
1F4BEDC0000
trusted library allocation
page read and write
127FC102000
heap
page read and write
1E2A2A00000
heap
page read and write
127FDDBE000
heap
page read and write
200D3E00000
heap
page read and write
200D3E6B000
heap
page read and write
1DA35002000
trusted library allocation
page read and write
127FD1FE000
trusted library allocation
page read and write
127FDCB4000
heap
page read and write
127FDDCB000
heap
page read and write
282F045D000
heap
page read and write
1DA34A4E000
heap
page read and write
127FDD3C000
heap
page read and write
127FDCC1000
heap
page read and write
127FD440000
trusted library allocation
page read and write
9B3687B000
stack
page read and write
127FD324000
trusted library allocation
page read and write
127FD7EF000
heap
page read and write
1DA34A48000
heap
page read and write
127FD324000
trusted library allocation
page read and write
127FD310000
trusted library allocation
page read and write
1DA34A2D000
heap
page read and write
22C94852000
heap
page read and write
1DA34A44000
heap
page read and write
282F0429000
heap
page read and write
1AD95654000
heap
page read and write
127FD1AC000
trusted library allocation
page read and write
8FF67FF000
stack
page read and write
1F4B9A3F000
heap
page read and write
1F4BEFA0000
trusted library allocation
page read and write
400736E000
stack
page read and write
8FF687C000
stack
page read and write
944CFFE000
stack
page read and write
127FDC2F000
heap
page read and write
1F4BF2B3000
heap
page read and write
1F4BF308000
heap
page read and write
127FDC76000
heap
page read and write
1DA34A49000
heap
page read and write
127FD320000
trusted library allocation
page read and write
127FDCA0000
heap
page read and write
127FD390000
trusted library allocation
page read and write
9B36C7C000
stack
page read and write
27189202000
trusted library allocation
page read and write
127FD74C000
heap
page read and write
22923FE000
stack
page read and write
1F4BAA00000
trusted library section
page readonly
40072EB000
stack
page read and write
A19170F000
stack
page read and write
5506E7F000
stack
page read and write
127FDD61000
heap
page read and write
1F4BF23D000
heap
page read and write
5506B7B000
stack
page read and write
127FD738000
heap
page read and write
1F4BF300000
heap
page read and write
1F4BF302000
heap
page read and write
1F4BA202000
heap
page read and write
1DA34A45000
heap
page read and write
127FD1FE000
trusted library allocation
page read and write
127FD320000
trusted library allocation
page read and write
8FF6DFE000
stack
page read and write
127FD190000
trusted library allocation
page read and write
14EED102000
heap
page read and write
1F4B9A75000
heap
page read and write
200D4602000
trusted library allocation
page read and write
127FDDCF000
heap
page read and write
1F4BA481000
trusted library allocation
page read and write
127FC1AD000
heap
page read and write
127FDDB7000
heap
page read and write
1E2A2A29000
heap
page read and write
127FD648000
heap
page read and write
127FDD65000
heap
page read and write
16891F02000
heap
page read and write
127FD1C8000
trusted library allocation
page read and write
200D3F13000
heap
page read and write
127FDD29000
heap
page read and write
127FDC74000
heap
page read and write
1F369431000
heap
page read and write
127FDC64000
heap
page read and write
127FDC14000
heap
page read and write
127FD7A1000
heap
page read and write
8FF6CFC000
stack
page read and write
55065EE000
stack
page read and write
127FD774000
heap
page read and write
1F4B9980000
trusted library section
page read and write
1F4B9A57000
heap
page read and write
1AD95708000
heap
page read and write
1F369310000
heap
page read and write
127FC3C9000
heap
page read and write
22C9485A000
heap
page read and write
127FD310000
trusted library allocation
page read and write
127FB888000
heap
page read and write
1E2A2790000
heap
page read and write
127FDC85000
heap
page read and write
127FC3DF000
heap
page read and write
1E2A2AD0000
heap
page read and write
14EED802000
trusted library allocation
page read and write
88D00FF000
stack
page read and write
127FDCA2000
heap
page read and write
127FC3AF000
heap
page read and write
C44D8FC000
stack
page read and write
1F369330000
heap
page read and write
1F36940B000
heap
page read and write
26625F5000
stack
page read and write
127FDC98000
heap
page read and write
1F4BA318000
heap
page read and write
127FC20A000
heap
page read and write
16891C00000
heap
page read and write
27188B00000
heap
page read and write
127FDD3E000
heap
page read and write
127FDCE5000
heap
page read and write
127FDD02000
heap
page read and write
127FB82A000
heap
page read and write
1F369400000
heap
page read and write
1E2A29D0000
trusted library allocation
page read and write
127FDD16000
heap
page read and write
127FD380000
trusted library allocation
page read and write
1F4B9B02000
heap
page read and write
16892602000
trusted library allocation
page read and write
127FD7E7000
heap
page read and write
127FD7C3000
heap
page read and write
127FDC5D000
heap
page read and write
1F4BF21E000
heap
page read and write
1F4BF010000
trusted library allocation
page read and write
127FB85D000
heap
page read and write
11A0FFE000
stack
page read and write
22EA5EC0000
heap
page read and write
C44D9FE000
stack
page read and write
127FDCB9000
heap
page read and write
1DA34A32000
heap
page read and write
127FDCB9000
heap
page read and write
127FDC68000
heap
page read and write
127FDD41000
heap
page read and write
127FDC1F000
heap
page read and write
1F4B9A9D000
heap
page read and write
1F4B9A9B000
heap
page read and write
127FDD00000
heap
page read and write
200D3F02000
heap
page read and write
127FDC16000
heap
page read and write
127FD400000
trusted library allocation
page read and write
127FDC9A000
heap
page read and write
1AD95450000
heap
page read and write
There are 1035 hidden memdumps, click here to show them.