Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\18beeecc-34b3-4233-bbfd-7ae961ce2be6.tmp
|
SysEx File -
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\1925cbb2-5dce-487c-95e8-c368f2e421d3.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\5f904f67-d5e1-4fee-a5ea-3fef9d65b6d4.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\7737ef24-4fa3-4457-b3c9-349e6de92dd5.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\0f21645d-ae51-46c5-8072-3834e3bfcc67.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\1415ef02-a835-453a-884c-c1db67153032.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\4a6c5730-d44e-46f3-9b1d-3bf0dd029a92.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\4c4b06da-4ae3-492e-b834-b6a461066129.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\5e6a9ead-c41e-42e6-b088-323f46bc7f25.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\664180b5-b62c-4bec-9a6e-0ad6f7982129.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\7396eec4-920e-43e2-bc64-522371ecdd7b.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\9829bee1-abed-4e62-8f97-94f11908fb56.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent
State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\d0281781-5f13-4742-a6d1-e40d8cc087ec.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_1
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Persistent
State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\afc23d10-ede0-4a41-891d-ec6296e799b4.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\f30f7bee-95b6-485a-90a2-f5d626cee9e5.tmp
|
ASCII text, with very long lines, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ff323c7b-9cfc-455f-98e1-d89683890d78.tmp
|
UTF-8 Unicode text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\d780d5b1-1b99-40b4-b2a9-2a9fae71cf91.tmp
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\f91c1e09-fa1f-4ff8-a53a-66516d55459e.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\fac75d26-239a-4442-b7c3-d77920272bac.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\46f2797b-517e-490a-bb4b-6ed430254de1.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7290f0a2-acde-45d0-837a-39d1960c0d40.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\87ceedb2-1079-4f44-8505-cf591eae855d.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9dada8b5-3a97-487d-983e-eac7c6d88fdd.tmp
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\87ceedb2-1079-4f44-8505-cf591eae855d.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\bg\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ca\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\cs\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\da\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\de\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\el\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\en\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\en_GB\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\es\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\es_419\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\et\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\fi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\fil\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\fr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\hi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\hr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\hu\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\id\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\it\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ja\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ko\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\lt\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\lv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\nb\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\nl\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\pl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\pt_BR\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\pt_PT\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ro\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\ru\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\sv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\th\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\tr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\uk\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\vi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\zh_CN\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_locales\zh_TW\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\craw_background.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\craw_window.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\css\craw_window.css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\html\craw_window.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\flapper.gif
|
GIF image data, version 89a, 30 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\icon_128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\icon_16.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_close.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_hover.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_maximize.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\images\topbar_floating_button_pressed.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_148754904\CRX_INSTALL\manifest.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\46f2797b-517e-490a-bb4b-6ed430254de1.tmp
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\bg\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ca\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\cs\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\da\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\de\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\el\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\en\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\en_GB\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\es\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\es_419\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\et\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\fi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\fil\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\fr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\hi\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\hr\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\hu\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\id\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\it\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ja\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ko\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\lt\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\lv\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\nb\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\nl\messages.json
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\pl\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\pt_BR\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\pt_PT\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ro\messages.json
|
UTF-8 Unicode text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\ru\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sk\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sl\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sr\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\sv\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\th\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\tr\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\uk\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\vi\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\zh_CN\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_locales\zh_TW\messages.json
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\_metadata\verified_contents.json
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\craw_background.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\craw_window.js
|
ASCII text, with very long lines
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\css\craw_window.css
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\html\craw_window.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\flapper.gif
|
GIF image data, version 89a, 30 x 30
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\icon_128.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\icon_16.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_close.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_hover.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_maximize.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\images\topbar_floating_button_pressed.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scoped_dir6024_1577986418\CRX_INSTALL\manifest.json
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 143 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1504,7241009153634526847,18253391524234669070,131072
--lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1920 /prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" "http://app.1self.co/v1/streams//events
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://app.1self.co/v1/streams//events
|
|||
https://www.google.com
|
unknown
|
||
https://www.google.com/images/dot2.gif
|
unknown
|
||
https://dns.google
|
unknown
|
||
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
|
unknown
|
||
https://www.google.com/intl/en-US/chrome/blank.html
|
unknown
|
||
https://ogs.google.com
|
unknown
|
||
https://www.google.com/images/cleardot.gif
|
unknown
|
||
https://play.google.com
|
unknown
|
||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
172.217.168.14
|
||
https://accounts.google.com
|
unknown
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
142.250.203.109
|
||
https://payments.google.com/payments/v4/js/integrator.js
|
unknown
|
||
http://app.1self.co/v1/streams//events
|
35.205.61.67
|
||
https://clients2.googleusercontent.com
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
|
unknown
|
||
https://sandbox.google.com/payments/v4/js/integrator.js
|
unknown
|
||
https://www.google.com/images/x2.gif
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www-googleapis-staging.sandbox.google.com
|
unknown
|
||
http://app.1self.co/v1/streams//1
|
35.205.61.67
|
||
https://accounts.google.com/MergeSession
|
unknown
|
||
https://clients2.google.com
|
unknown
|
||
https://clients2.google.com/service/update2/crx
|
unknown
|
There are 14 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
app.1self.co
|
35.205.61.67
|
||
accounts.google.com
|
142.250.203.109
|
||
clients.l.google.com
|
172.217.168.14
|
||
clients2.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
||
172.217.168.14
|
clients.l.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
127.0.0.1
|
unknown
|
unknown
|
||
142.250.203.109
|
accounts.google.com
|
United States
|
||
35.205.61.67
|
app.1self.co
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gfdkimpbcpahaombhbimeihdjnejgicl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mfehgcgbbipciphmccgaenjidiccnmng
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
pkedcjkdefgpdelpbcmbmeomcjbeemfm
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gfdkimpbcpahaombhbimeihdjnejgicl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blacklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
There are 40 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
127FD32C000
|
trusted library allocation
|
page read and write
|
||
1F4BF030000
|
remote allocation
|
page read and write
|
||
127FC343000
|
heap
|
page read and write
|
||
127FD1C4000
|
trusted library allocation
|
page read and write
|
||
127FD320000
|
trusted library allocation
|
page read and write
|
||
40079FF000
|
stack
|
page read and write
|
||
127FD725000
|
heap
|
page read and write
|
||
127FDCD3000
|
heap
|
page read and write
|
||
127FDCC9000
|
heap
|
page read and write
|
||
127FDCAA000
|
heap
|
page read and write
|
||
1AD95600000
|
heap
|
page read and write
|
||
127FD64F000
|
heap
|
page read and write
|
||
127FC3CF000
|
heap
|
page read and write
|
||
1F4BA39A000
|
heap
|
page read and write
|
||
127FD270000
|
remote allocation
|
page read and write
|
||
127FD600000
|
heap
|
page read and write
|
||
22EA6031000
|
heap
|
page read and write
|
||
127FD774000
|
heap
|
page read and write
|
||
1E2A2AC1000
|
heap
|
page read and write
|
||
127FDCB0000
|
heap
|
page read and write
|
||
127FD74B000
|
heap
|
page read and write
|
||
127FD1CE000
|
trusted library allocation
|
page read and write
|
||
127FDCD6000
|
heap
|
page read and write
|
||
266227A000
|
stack
|
page read and write
|
||
14EED002000
|
heap
|
page read and write
|
||
127FC12E000
|
heap
|
page read and write
|
||
1AD9564B000
|
heap
|
page read and write
|
||
1E2A3002000
|
heap
|
page read and write
|
||
127FDE0B000
|
heap
|
page read and write
|
||
127FDC61000
|
heap
|
page read and write
|
||
2661EFE000
|
stack
|
page read and write
|
||
1F4BA215000
|
heap
|
page read and write
|
||
127FD766000
|
heap
|
page read and write
|
||
200D3E55000
|
heap
|
page read and write
|
||
1DA34A4B000
|
heap
|
page read and write
|
||
127FDC4D000
|
heap
|
page read and write
|
||
127FD762000
|
heap
|
page read and write
|
||
127FDD5A000
|
heap
|
page read and write
|
||
EF044FC000
|
stack
|
page read and write
|
||
127FDCEB000
|
heap
|
page read and write
|
||
A191C77000
|
stack
|
page read and write
|
||
1F4BEEF0000
|
trusted library allocation
|
page read and write
|
||
127FD77B000
|
heap
|
page read and write
|
||
40078FB000
|
stack
|
page read and write
|
||
22C9487E000
|
heap
|
page read and write
|
||
1F4BF25D000
|
heap
|
page read and write
|
||
127FD770000
|
heap
|
page read and write
|
||
1AD95613000
|
heap
|
page read and write
|
||
127FD626000
|
heap
|
page read and write
|
||
127FDC37000
|
heap
|
page read and write
|
||
127FDD53000
|
heap
|
page read and write
|
||
1F4BF315000
|
heap
|
page read and write
|
||
127FD1C8000
|
trusted library allocation
|
page read and write
|
||
127FD727000
|
heap
|
page read and write
|
||
127FDCB2000
|
heap
|
page read and write
|
||
22C9488A000
|
heap
|
page read and write
|
||
127FDCAE000
|
heap
|
page read and write
|
||
127FC3D3000
|
heap
|
page read and write
|
||
127FDC96000
|
heap
|
page read and write
|
||
127FDCF1000
|
heap
|
page read and write
|
||
1F4BA1C0000
|
trusted library allocation
|
page read and write
|
||
127FDD24000
|
heap
|
page read and write
|
||
22EA5F10000
|
heap
|
page read and write
|
||
127FDC9F000
|
heap
|
page read and write
|
||
1DA34A85000
|
heap
|
page read and write
|
||
127FD1CE000
|
trusted library allocation
|
page read and write
|
||
11A137E000
|
stack
|
page read and write
|
||
282F0400000
|
heap
|
page read and write
|
||
127FD7B6000
|
heap
|
page read and write
|
||
127FDD0A000
|
heap
|
page read and write
|
||
1F4BF000000
|
trusted library allocation
|
page read and write
|
||
282F0360000
|
heap
|
page read and write
|
||
1AD95602000
|
heap
|
page read and write
|
||
656B6FF000
|
stack
|
page read and write
|
||
200D3C30000
|
heap
|
page read and write
|
||
127FD32C000
|
trusted library allocation
|
page read and write
|
||
27188A70000
|
heap
|
page read and write
|
||
1F4BAA10000
|
trusted library section
|
page readonly
|
||
40076FE000
|
stack
|
page read and write
|
||
127FCFA0000
|
trusted library section
|
page readonly
|
||
127FD746000
|
heap
|
page read and write
|
||
1F4B9970000
|
trusted library allocation
|
page read and write
|
||
127FC100000
|
heap
|
page read and write
|
||
127FDD4C000
|
heap
|
page read and write
|
||
656B87E000
|
stack
|
page read and write
|
||
266237E000
|
stack
|
page read and write
|
||
C44D6FA000
|
stack
|
page read and write
|
||
127FD62C000
|
heap
|
page read and write
|
||
127FD759000
|
heap
|
page read and write
|
||
1F4B9A8F000
|
heap
|
page read and write
|
||
1F4BF2F8000
|
heap
|
page read and write
|
||
127FB7D0000
|
trusted library allocation
|
page read and write
|
||
127FD550000
|
trusted library allocation
|
page read and write
|
||
127FC397000
|
heap
|
page read and write
|
||
127FD77A000
|
heap
|
page read and write
|
||
127FD7C0000
|
heap
|
page read and write
|
||
127FD192000
|
trusted library allocation
|
page read and write
|
||
127FD1BE000
|
trusted library allocation
|
page read and write
|
||
127FB856000
|
heap
|
page read and write
|
||
127FDC4A000
|
heap
|
page read and write
|
||
127FDE00000
|
heap
|
page read and write
|
||
1F4B9A00000
|
heap
|
page read and write
|
||
127FD7FB000
|
heap
|
page read and write
|
||
1AD95713000
|
heap
|
page read and write
|
||
14EECED0000
|
heap
|
page read and write
|
||
127FC34D000
|
heap
|
page read and write
|
||
14EECFA0000
|
remote allocation
|
page read and write
|
||
22C947F0000
|
heap
|
page read and write
|
||
127FDC7A000
|
heap
|
page read and write
|
||
127FD7DA000
|
heap
|
page read and write
|
||
1F4BF322000
|
heap
|
page read and write
|
||
A19178E000
|
stack
|
page read and write
|
||
127FCA01000
|
trusted library allocation
|
page read and write
|
||
282F03F0000
|
trusted library allocation
|
page read and write
|
||
22EA6041000
|
heap
|
page read and write
|
||
127FB83C000
|
heap
|
page read and write
|
||
266217F000
|
stack
|
page read and write
|
||
1F4BED70000
|
trusted library allocation
|
page read and write
|
||
229237E000
|
stack
|
page read and write
|
||
127FDC6C000
|
heap
|
page read and write
|
||
22C94902000
|
heap
|
page read and write
|
||
127FD7F3000
|
heap
|
page read and write
|
||
127FD1D0000
|
trusted library allocation
|
page read and write
|
||
127FD602000
|
heap
|
page read and write
|
||
1F4BF200000
|
heap
|
page read and write
|
||
282F0500000
|
heap
|
page read and write
|
||
1DA34A47000
|
heap
|
page read and write
|
||
1F4BF24A000
|
heap
|
page read and write
|
||
127FDC91000
|
heap
|
page read and write
|
||
127FC3D6000
|
heap
|
page read and write
|
||
127FD310000
|
trusted library allocation
|
page read and write
|
||
127FD1CC000
|
trusted library allocation
|
page read and write
|
||
127FD7F8000
|
heap
|
page read and write
|
||
127FDC71000
|
heap
|
page read and write
|
||
127FC3A8000
|
heap
|
page read and write
|
||
127FD215000
|
trusted library allocation
|
page read and write
|
||
1F4BA200000
|
heap
|
page read and write
|
||
127FD7AF000
|
heap
|
page read and write
|
||
127FD191000
|
trusted library allocation
|
page read and write
|
||
127FDC8B000
|
heap
|
page read and write
|
||
127FDCBD000
|
heap
|
page read and write
|
||
C44D4F9000
|
stack
|
page read and write
|
||
16891E02000
|
heap
|
page read and write
|
||
127FD7FA000
|
heap
|
page read and write
|
||
127FC3A7000
|
heap
|
page read and write
|
||
656B67E000
|
stack
|
page read and write
|
||
127FDC43000
|
heap
|
page read and write
|
||
1AD95670000
|
heap
|
page read and write
|
||
2661DFC000
|
stack
|
page read and write
|
||
1F4BEED0000
|
trusted library allocation
|
page read and write
|
||
127FC015000
|
heap
|
page read and write
|
||
127FDCB0000
|
heap
|
page read and write
|
||
200D3E02000
|
heap
|
page read and write
|
||
1F4BF020000
|
trusted library allocation
|
page read and write
|
||
200D3E7B000
|
heap
|
page read and write
|
||
1E2A2A6E000
|
heap
|
page read and write
|
||
16891C60000
|
heap
|
page read and write
|
||
127FD1BC000
|
trusted library allocation
|
page read and write
|
||
127FD250000
|
trusted library allocation
|
page read and write
|
||
127FDDDB000
|
heap
|
page read and write
|
||
127FDD5E000
|
heap
|
page read and write
|
||
1DA34A41000
|
heap
|
page read and write
|
||
11A0EFC000
|
stack
|
page read and write
|
||
127FD320000
|
trusted library allocation
|
page read and write
|
||
1F4C0000000
|
heap
|
page read and write
|
||
127FC11D000
|
heap
|
page read and write
|
||
127FDC87000
|
heap
|
page read and write
|
||
1F4B9AFA000
|
heap
|
page read and write
|
||
1F4BF302000
|
heap
|
page read and write
|
||
282F0457000
|
heap
|
page read and write
|
||
127FDCA8000
|
heap
|
page read and write
|
||
127FB843000
|
heap
|
page read and write
|
||
127FBFE0000
|
trusted library allocation
|
page read and write
|
||
127FB895000
|
heap
|
page read and write
|
||
127FD72A000
|
heap
|
page read and write
|
||
1F4B9870000
|
heap
|
page read and write
|
||
1AD95626000
|
heap
|
page read and write
|
||
127FDC8D000
|
heap
|
page read and write
|
||
127FDCA4000
|
heap
|
page read and write
|
||
1DA34A6E000
|
heap
|
page read and write
|
||
127FDC74000
|
heap
|
page read and write
|
||
127FD7BF000
|
heap
|
page read and write
|
||
127FD669000
|
heap
|
page read and write
|
||
127FDD88000
|
heap
|
page read and write
|
||
127FB843000
|
heap
|
page read and write
|
||
55068FB000
|
stack
|
page read and write
|
||
282F0502000
|
heap
|
page read and write
|
||
127FD797000
|
heap
|
page read and write
|
||
55064EB000
|
stack
|
page read and write
|
||
656B8FC000
|
stack
|
page read and write
|
||
1F4BEF10000
|
trusted library allocation
|
page read and write
|
||
26620FE000
|
stack
|
page read and write
|
||
127FD7F1000
|
heap
|
page read and write
|
||
127FD32C000
|
trusted library allocation
|
page read and write
|
||
A19168B000
|
stack
|
page read and write
|
||
16891E58000
|
heap
|
page read and write
|
||
27188B13000
|
heap
|
page read and write
|
||
127FDDDC000
|
heap
|
page read and write
|
||
127FD1D2000
|
trusted library allocation
|
page read and write
|
||
127FC223000
|
heap
|
page read and write
|
||
127FD1C0000
|
trusted library allocation
|
page read and write
|
||
C44D7FB000
|
stack
|
page read and write
|
||
22C94829000
|
heap
|
page read and write
|
||
127FD74F000
|
heap
|
page read and write
|
||
127FDD8B000
|
heap
|
page read and write
|
||
1AD9568F000
|
heap
|
page read and write
|
||
1F4BA9F0000
|
trusted library section
|
page readonly
|
||
127FDC2D000
|
heap
|
page read and write
|
||
127FDD69000
|
heap
|
page read and write
|
||
14EECF40000
|
heap
|
page read and write
|
||
1DA34A78000
|
heap
|
page read and write
|
||
27188A99000
|
heap
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
127FD1FA000
|
trusted library allocation
|
page read and write
|
||
1DA34A7F000
|
heap
|
page read and write
|
||
1DA34A4F000
|
heap
|
page read and write
|
||
127FD747000
|
heap
|
page read and write
|
||
127FC3CC000
|
heap
|
page read and write
|
||
27188A13000
|
heap
|
page read and write
|
||
127FDC4D000
|
heap
|
page read and write
|
||
656B7FC000
|
stack
|
page read and write
|
||
8FF613B000
|
stack
|
page read and write
|
||
EF0410E000
|
stack
|
page read and write
|
||
127FD320000
|
trusted library allocation
|
page read and write
|
||
127FD270000
|
remote allocation
|
page read and write
|
||
27189130000
|
unkown
|
page write copy
|
||
1F4BF328000
|
heap
|
page read and write
|
||
127FD7FC000
|
heap
|
page read and write
|
||
1DA34A2E000
|
heap
|
page read and write
|
||
127FDE12000
|
heap
|
page read and write
|
||
88CF8EB000
|
stack
|
page read and write
|
||
22EA6056000
|
heap
|
page read and write
|
||
127FD65C000
|
heap
|
page read and write
|
||
127FD741000
|
heap
|
page read and write
|
||
127FC37A000
|
heap
|
page read and write
|
||
1F4BA700000
|
trusted library allocation
|
page read and write
|
||
1F4BEFF0000
|
trusted library allocation
|
page read and write
|
||
127FD1C2000
|
trusted library allocation
|
page read and write
|
||
127FDE12000
|
heap
|
page read and write
|
||
229227E000
|
stack
|
page read and write
|
||
127FC36F000
|
heap
|
page read and write
|
||
127FDC72000
|
heap
|
page read and write
|
||
127FD1C0000
|
trusted library allocation
|
page read and write
|
||
127FDC10000
|
heap
|
page read and write
|
||
1F4BF22C000
|
heap
|
page read and write
|
||
127FDCBF000
|
heap
|
page read and write
|
||
127FD2A0000
|
remote allocation
|
page read and write
|
||
127FD7F1000
|
heap
|
page read and write
|
||
EF0487F000
|
stack
|
page read and write
|
||
127FD7F6000
|
heap
|
page read and write
|
||
127FD7F6000
|
heap
|
page read and write
|
||
127FC002000
|
heap
|
page read and write
|
||
1DA34A7B000
|
heap
|
page read and write
|
||
127FD1BC000
|
trusted library allocation
|
page read and write
|
||
127FD638000
|
heap
|
page read and write
|
||
200D3C40000
|
heap
|
page read and write
|
||
127FDCC7000
|
heap
|
page read and write
|
||
127FD702000
|
heap
|
page read and write
|
||
127FDC79000
|
heap
|
page read and write
|
||
550717F000
|
stack
|
page read and write
|
||
127FD300000
|
trusted library allocation
|
page read and write
|
||
127FDD2D000
|
heap
|
page read and write
|
||
127FC391000
|
heap
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
5506D7D000
|
stack
|
page read and write
|
||
1DA34A6C000
|
heap
|
page read and write
|
||
127FDD06000
|
heap
|
page read and write
|
||
1F4BF2FC000
|
heap
|
page read and write
|
||
127FD7C7000
|
heap
|
page read and write
|
||
550707F000
|
stack
|
page read and write
|
||
127FDC2B000
|
heap
|
page read and write
|
||
1AD9567E000
|
heap
|
page read and write
|
||
127FDE0B000
|
heap
|
page read and write
|
||
127FD764000
|
heap
|
page read and write
|
||
1F4BF020000
|
trusted library allocation
|
page read and write
|
||
127FDCDA000
|
heap
|
page read and write
|
||
127FDCB8000
|
heap
|
page read and write
|
||
127FD32C000
|
trusted library allocation
|
page read and write
|
||
127FDCEF000
|
heap
|
page read and write
|
||
127FDD80000
|
heap
|
page read and write
|
||
127FDC61000
|
heap
|
page read and write
|
||
127FD070000
|
trusted library allocation
|
page read and write
|
||
127FC354000
|
heap
|
page read and write
|
||
127FDCF3000
|
heap
|
page read and write
|
||
14EED03D000
|
heap
|
page read and write
|
||
127FDD63000
|
heap
|
page read and write
|
||
1F4BF212000
|
heap
|
page read and write
|
||
1F4BA8E0000
|
trusted library allocation
|
page read and write
|
||
266150C000
|
stack
|
page read and write
|
||
1F4BF1C0000
|
trusted library allocation
|
page read and write
|
||
14EECEE0000
|
heap
|
page read and write
|
||
282F0452000
|
heap
|
page read and write
|
||
1AD95700000
|
heap
|
page read and write
|
||
127FD7EF000
|
heap
|
page read and write
|
||
127FD324000
|
trusted library allocation
|
page read and write
|
||
1DA347D0000
|
heap
|
page read and write
|
||
1F4BA9E0000
|
trusted library section
|
page readonly
|
||
944CCF7000
|
stack
|
page read and write
|
||
1F4B9A6E000
|
heap
|
page read and write
|
||
1F4BA318000
|
heap
|
page read and write
|
||
127FDD77000
|
heap
|
page read and write
|
||
1AD95651000
|
heap
|
page read and write
|
||
22C94790000
|
heap
|
page read and write
|
||
127FC258000
|
heap
|
page read and write
|
||
14EECF70000
|
trusted library allocation
|
page read and write
|
||
127FDC1F000
|
heap
|
page read and write
|
||
88CF96F000
|
stack
|
page read and write
|
||
127FDCB3000
|
heap
|
page read and write
|
||
1E2A2AE8000
|
heap
|
page read and write
|
||
14EED013000
|
heap
|
page read and write
|
||
9B36B79000
|
stack
|
page read and write
|
||
127FD655000
|
heap
|
page read and write
|
||
127FD75D000
|
heap
|
page read and write
|
||
127FCFB0000
|
trusted library section
|
page readonly
|
||
127FC1B0000
|
heap
|
page read and write
|
||
1AD9564E000
|
heap
|
page read and write
|
||
127FDE02000
|
heap
|
page read and write
|
||
127FDC0E000
|
heap
|
page read and write
|
||
1DA34A29000
|
heap
|
page read and write
|
||
127FD1B5000
|
trusted library allocation
|
page read and write
|
||
127FDC37000
|
heap
|
page read and write
|
||
127FD634000
|
heap
|
page read and write
|
||
127FDD1F000
|
heap
|
page read and write
|
||
127FD7AF000
|
heap
|
page read and write
|
||
C44DAFD000
|
stack
|
page read and write
|
||
1F4BAD60000
|
trusted library allocation
|
page read and write
|
||
1F4BA9D0000
|
trusted library section
|
page readonly
|
||
127FC127000
|
heap
|
page read and write
|
||
127FDC2F000
|
heap
|
page read and write
|
||
1AD95688000
|
heap
|
page read and write
|
||
127FD74E000
|
heap
|
page read and write
|
||
127FD662000
|
heap
|
page read and write
|
||
127FDCBF000
|
heap
|
page read and write
|
||
8FF657C000
|
stack
|
page read and write
|
||
EF0467E000
|
stack
|
page read and write
|
||
282F045B000
|
heap
|
page read and write
|
||
C44CD77000
|
stack
|
page read and write
|
||
127FDCE4000
|
heap
|
page read and write
|
||
127FD639000
|
heap
|
page read and write
|
||
16891E40000
|
heap
|
page read and write
|
||
22C94780000
|
heap
|
page read and write
|
||
127FD7F6000
|
heap
|
page read and write
|
||
127FDDB9000
|
heap
|
page read and write
|
||
127FDC19000
|
heap
|
page read and write
|
||
127FD7B2000
|
heap
|
page read and write
|
||
127FD1CC000
|
trusted library allocation
|
page read and write
|
||
22C94880000
|
heap
|
page read and write
|
||
22C9485D000
|
heap
|
page read and write
|
||
127FD643000
|
heap
|
page read and write
|
||
22EA603B000
|
heap
|
page read and write
|
||
282F0478000
|
heap
|
page read and write
|
||
127FD781000
|
heap
|
page read and write
|
||
282F03C0000
|
heap
|
page read and write
|
||
550656D000
|
stack
|
page read and write
|
||
127FD65F000
|
heap
|
page read and write
|
||
127FDC6A000
|
heap
|
page read and write
|
||
1F369335000
|
heap
|
page read and write
|
||
12780000000
|
trusted library allocation
|
page read and write
|
||
2291ECB000
|
stack
|
page read and write
|
||
127FD3C0000
|
trusted library allocation
|
page read and write
|
||
9B3697E000
|
stack
|
page read and write
|
||
127FD771000
|
heap
|
page read and write
|
||
127FDC83000
|
heap
|
page read and write
|
||
127FC384000
|
heap
|
page read and write
|
||
127FD7A4000
|
heap
|
page read and write
|
||
127FC3D3000
|
heap
|
page read and write
|
||
1F4BF2FE000
|
heap
|
page read and write
|
||
127FD610000
|
heap
|
page read and write
|
||
127FDC6F000
|
heap
|
page read and write
|
||
1DA34A32000
|
heap
|
page read and write
|
||
127FD626000
|
heap
|
page read and write
|
||
127FDC78000
|
heap
|
page read and write
|
||
127FDD49000
|
heap
|
page read and write
|
||
EF04777000
|
stack
|
page read and write
|
||
127FDCBB000
|
heap
|
page read and write
|
||
200D3E71000
|
heap
|
page read and write
|
||
127FD72D000
|
heap
|
page read and write
|
||
127FC3D1000
|
heap
|
page read and write
|
||
127FDD6C000
|
heap
|
page read and write
|
||
127FD430000
|
trusted library allocation
|
page read and write
|
||
A191AFC000
|
stack
|
page read and write
|
||
127FDD67000
|
heap
|
page read and write
|
||
127FC3FC000
|
heap
|
page read and write
|
||
127FD74B000
|
heap
|
page read and write
|
||
944C77F000
|
stack
|
page read and write
|
||
1F4BEFE0000
|
trusted library allocation
|
page read and write
|
||
1DA34A00000
|
heap
|
page read and write
|
||
1DA34A42000
|
heap
|
page read and write
|
||
127FDCE9000
|
heap
|
page read and write
|
||
127FDCB1000
|
heap
|
page read and write
|
||
127FDDA9000
|
heap
|
page read and write
|
||
C44D57E000
|
stack
|
page read and write
|
||
127FC191000
|
heap
|
page read and write
|
||
22925FD000
|
stack
|
page read and write
|
||
127FD1C6000
|
trusted library allocation
|
page read and write
|
||
1AD955C0000
|
trusted library allocation
|
page read and write
|
||
1F4B9A13000
|
heap
|
page read and write
|
||
EF0408B000
|
stack
|
page read and write
|
||
9B36A7E000
|
stack
|
page read and write
|
||
1E2A2A13000
|
heap
|
page read and write
|
||
1F4B9A78000
|
heap
|
page read and write
|
||
127FD230000
|
trusted library allocation
|
page read and write
|
||
127FD215000
|
trusted library allocation
|
page read and write
|
||
16891E60000
|
heap
|
page read and write
|
||
127FCC88000
|
trusted library allocation
|
page read and write
|
||
127FD72A000
|
heap
|
page read and write
|
||
C44D37E000
|
stack
|
page read and write
|
||
2661CFA000
|
stack
|
page read and write
|
||
1F4BF31A000
|
heap
|
page read and write
|
||
127FC3E4000
|
heap
|
page read and write
|
||
1E2A3100000
|
heap
|
page read and write
|
||
944CEFC000
|
stack
|
page read and write
|
||
127FD7F1000
|
heap
|
page read and write
|
||
127FD73F000
|
heap
|
page read and write
|
||
282F0482000
|
heap
|
page read and write
|
||
229267F000
|
stack
|
page read and write
|
||
266158E000
|
stack
|
page read and write
|
||
127FC3E1000
|
heap
|
page read and write
|
||
127FDCE7000
|
heap
|
page read and write
|
||
127FDC82000
|
heap
|
page read and write
|
||
22EA6000000
|
heap
|
page read and write
|
||
22EA6002000
|
heap
|
page read and write
|
||
C44CF7B000
|
stack
|
page read and write
|
||
944C6FC000
|
stack
|
page read and write
|
||
127FDDAA000
|
heap
|
page read and write
|
||
1F4BF030000
|
trusted library allocation
|
page read and write
|
||
127FD724000
|
heap
|
page read and write
|
||
1DA34A60000
|
heap
|
page read and write
|
||
127FD7E6000
|
heap
|
page read and write
|
||
127FDCAD000
|
heap
|
page read and write
|
||
1F4B9A73000
|
heap
|
page read and write
|
||
127FC3AF000
|
heap
|
page read and write
|
||
127FDCA9000
|
heap
|
page read and write
|
||
127FB88D000
|
heap
|
page read and write
|
||
16891E28000
|
heap
|
page read and write
|
||
27188990000
|
trusted library allocation
|
page read and write
|
||
127FDC50000
|
heap
|
page read and write
|
||
127FDCB6000
|
heap
|
page read and write
|
||
127FC980000
|
trusted library allocation
|
page read and write
|
||
1F4BA1E0000
|
trusted library allocation
|
page read and write
|
||
1AD95629000
|
heap
|
page read and write
|
||
127FB780000
|
heap
|
page read and write
|
||
127FDD5B000
|
heap
|
page read and write
|
||
127FDD14000
|
heap
|
page read and write
|
||
1DA34A67000
|
heap
|
page read and write
|
||
944CDFF000
|
stack
|
page read and write
|
||
127FD324000
|
trusted library allocation
|
page read and write
|
||
127FD7A2000
|
heap
|
page read and write
|
||
127FDC4B000
|
heap
|
page read and write
|
||
27188A3C000
|
heap
|
page read and write
|
||
22C9487E000
|
heap
|
page read and write
|
||
656B3CA000
|
stack
|
page read and write
|
||
127FDDBC000
|
heap
|
page read and write
|
||
88CF9EF000
|
stack
|
page read and write
|
||
22EA5EB0000
|
heap
|
page read and write
|
||
127FD62F000
|
heap
|
page read and write
|
||
1F4BEED1000
|
trusted library allocation
|
page read and write
|
||
26622FE000
|
stack
|
page read and write
|
||
127FD3F0000
|
trusted library allocation
|
page read and write
|
||
127FDDB3000
|
heap
|
page read and write
|
||
127FCFE0000
|
trusted library section
|
page readonly
|
||
22924FF000
|
stack
|
page read and write
|
||
127FDC4D000
|
heap
|
page read and write
|
||
127FDC6E000
|
heap
|
page read and write
|
||
1F4B99E1000
|
trusted library allocation
|
page read and write
|
||
127FD700000
|
heap
|
page read and write
|
||
127FDDC0000
|
heap
|
page read and write
|
||
282F0508000
|
heap
|
page read and write
|
||
127FDD7C000
|
heap
|
page read and write
|
||
127FDC77000
|
heap
|
page read and write
|
||
127FDE19000
|
heap
|
page read and write
|
||
127FD653000
|
heap
|
page read and write
|
||
27188900000
|
heap
|
page read and write
|
||
127FDD2F000
|
heap
|
page read and write
|
||
127FB813000
|
heap
|
page read and write
|
||
127FD32C000
|
trusted library allocation
|
page read and write
|
||
1F369340000
|
heap
|
page read and write
|
||
16891E6B000
|
heap
|
page read and write
|
||
127FB720000
|
heap
|
page read and write
|
||
127FB98E000
|
heap
|
page read and write
|
||
127FDD4E000
|
heap
|
page read and write
|
||
127FD1C4000
|
trusted library allocation
|
page read and write
|
||
127FDCCF000
|
heap
|
page read and write
|
||
127FD7FC000
|
heap
|
page read and write
|
||
127FC3D4000
|
heap
|
page read and write
|
||
127FC39F000
|
heap
|
page read and write
|
||
88CFEF7000
|
stack
|
page read and write
|
||
127FDC4C000
|
heap
|
page read and write
|
||
127FDCA6000
|
heap
|
page read and write
|
||
22C94800000
|
heap
|
page read and write
|
||
8FF69FB000
|
stack
|
page read and write
|
||
1DA34A13000
|
heap
|
page read and write
|
||
1F4BF2F2000
|
heap
|
page read and write
|
||
1DA34A30000
|
heap
|
page read and write
|
||
127FD1CA000
|
trusted library allocation
|
page read and write
|
||
127FDD95000
|
heap
|
page read and write
|
||
127FD710000
|
heap
|
page read and write
|
||
1F4BEED0000
|
trusted library allocation
|
page read and write
|
||
127FDCE4000
|
heap
|
page read and write
|
||
11A167F000
|
stack
|
page read and write
|
||
127FDE19000
|
heap
|
page read and write
|
||
127FDCE1000
|
heap
|
page read and write
|
||
200D3DA0000
|
trusted library allocation
|
page read and write
|
||
127FC1C6000
|
heap
|
page read and write
|
||
127FDCD8000
|
heap
|
page read and write
|
||
127FDDAF000
|
heap
|
page read and write
|
||
127FD1C0000
|
trusted library allocation
|
page read and write
|
||
127FDCAC000
|
heap
|
page read and write
|
||
127FD72B000
|
heap
|
page read and write
|
||
127FC000000
|
heap
|
page read and write
|
||
1F4BF030000
|
remote allocation
|
page read and write
|
||
1F4B9A29000
|
heap
|
page read and write
|
||
127FC300000
|
heap
|
page read and write
|
||
200D3E13000
|
heap
|
page read and write
|
||
127FD781000
|
heap
|
page read and write
|
||
127FDD13000
|
heap
|
page read and write
|
||
127FDC4D000
|
heap
|
page read and write
|
||
944C7FE000
|
stack
|
page read and write
|
||
127FD7C0000
|
heap
|
page read and write
|
||
8FF61BE000
|
stack
|
page read and write
|
||
127FD754000
|
heap
|
page read and write
|
||
127FD320000
|
trusted library allocation
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
22EA6013000
|
heap
|
page read and write
|
||
127FB800000
|
heap
|
page read and write
|
||
127FD77D000
|
heap
|
page read and write
|
||
1F4B9AAC000
|
heap
|
page read and write
|
||
1E2A2A88000
|
heap
|
page read and write
|
||
22C94813000
|
heap
|
page read and write
|
||
C44CE7A000
|
stack
|
page read and write
|
||
127FD786000
|
heap
|
page read and write
|
||
5506A7F000
|
stack
|
page read and write
|
||
127FDC7B000
|
heap
|
page read and write
|
||
8FF697C000
|
stack
|
page read and write
|
||
1F4BF140000
|
trusted library allocation
|
page read and write
|
||
127FD62D000
|
heap
|
page read and write
|
||
1F4BEEDE000
|
trusted library allocation
|
page read and write
|
||
1F4B9A89000
|
heap
|
page read and write
|
||
127FD7E7000
|
heap
|
page read and write
|
||
16891BF0000
|
heap
|
page read and write
|
||
22EA6802000
|
trusted library allocation
|
page read and write
|
||
14EED029000
|
heap
|
page read and write
|
||
127FC16F000
|
heap
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
14EED000000
|
heap
|
page read and write
|
||
127FDC70000
|
heap
|
page read and write
|
||
22C94F50000
|
trusted library allocation
|
page read and write
|
||
127FDCC4000
|
heap
|
page read and write
|
||
1DA34A3A000
|
heap
|
page read and write
|
||
127FD7C5000
|
heap
|
page read and write
|
||
A191B7F000
|
stack
|
page read and write
|
||
127FDC89000
|
heap
|
page read and write
|
||
127FDC66000
|
heap
|
page read and write
|
||
1AD95702000
|
heap
|
page read and write
|
||
127FDC18000
|
heap
|
page read and write
|
||
1F4B9A8B000
|
heap
|
page read and write
|
||
127FDC00000
|
heap
|
page read and write
|
||
127FD2E0000
|
trusted library allocation
|
page read and write
|
||
127FD1B5000
|
trusted library allocation
|
page read and write
|
||
127FDC96000
|
heap
|
page read and write
|
||
1E2A27A0000
|
heap
|
page read and write
|
||
1F4B9800000
|
heap
|
page read and write
|
||
127FDC0E000
|
heap
|
page read and write
|
||
127FD1B8000
|
trusted library allocation
|
page read and write
|
||
127FD73A000
|
heap
|
page read and write
|
||
127FDD89000
|
heap
|
page read and write
|
||
127FDD1D000
|
heap
|
page read and write
|
||
127FD080000
|
trusted library allocation
|
page read and write
|
||
22C94908000
|
heap
|
page read and write
|
||
5506F7F000
|
stack
|
page read and write
|
||
8FF6BFF000
|
stack
|
page read and write
|
||
127FDCA7000
|
heap
|
page read and write
|
||
127FDCAB000
|
heap
|
page read and write
|
||
127FDC31000
|
heap
|
page read and write
|
||
1F4BEF00000
|
trusted library allocation
|
page read and write
|
||
1F3691E0000
|
heap
|
page read and write
|
||
127FC1CA000
|
heap
|
page read and write
|
||
127FD75F000
|
heap
|
page read and write
|
||
22C94865000
|
heap
|
page read and write
|
||
14EECFA0000
|
remote allocation
|
page read and write
|
||
127FDD25000
|
heap
|
page read and write
|
||
127FDC16000
|
heap
|
page read and write
|
||
1F4BA300000
|
heap
|
page read and write
|
||
127FD7E4000
|
heap
|
page read and write
|
||
127FD1C4000
|
trusted library allocation
|
page read and write
|
||
127FD72E000
|
heap
|
page read and write
|
||
127FD7EF000
|
heap
|
page read and write
|
||
127FDC2D000
|
heap
|
page read and write
|
||
1F4BA1F0000
|
trusted library allocation
|
page read and write
|
||
127FDC53000
|
heap
|
page read and write
|
||
1F4BA401000
|
trusted library allocation
|
page read and write
|
||
266187E000
|
stack
|
page read and write
|
||
16891E79000
|
heap
|
page read and write
|
||
1F4B9810000
|
heap
|
page read and write
|
||
1E2A2AD2000
|
heap
|
page read and write
|
||
1DA34A6A000
|
heap
|
page read and write
|
||
14EED058000
|
heap
|
page read and write
|
||
127FC1F3000
|
heap
|
page read and write
|
||
127FDDCD000
|
heap
|
page read and write
|
||
127FC25A000
|
heap
|
page read and write
|
||
1AD954C0000
|
heap
|
page read and write
|
||
A191F7E000
|
stack
|
page read and write
|
||
127FD370000
|
trusted library allocation
|
page read and write
|
||
229287F000
|
stack
|
page read and write
|
||
127FD1B8000
|
trusted library allocation
|
page read and write
|
||
127FD310000
|
trusted library allocation
|
page read and write
|
||
127FD190000
|
trusted library allocation
|
page read and write
|
||
14EECFA0000
|
remote allocation
|
page read and write
|
||
127FD7EF000
|
heap
|
page read and write
|
||
1F4BF2F8000
|
heap
|
page read and write
|
||
127FDC23000
|
heap
|
page read and write
|
||
127FD7FC000
|
heap
|
page read and write
|
||
127FC202000
|
heap
|
page read and write
|
||
127FD75B000
|
heap
|
page read and write
|
||
C44D17B000
|
stack
|
page read and write
|
||
1F4BA1C3000
|
trusted library allocation
|
page read and write
|
||
1DA34A75000
|
heap
|
page read and write
|
||
127FD781000
|
heap
|
page read and write
|
||
127FC200000
|
heap
|
page read and write
|
||
944CBFB000
|
stack
|
page read and write
|
||
200D3E5C000
|
heap
|
page read and write
|
||
127FB86C000
|
heap
|
page read and write
|
||
22C94860000
|
heap
|
page read and write
|
||
22EA6102000
|
heap
|
page read and write
|
||
127FB710000
|
heap
|
page read and write
|
||
1F4BEF14000
|
trusted library allocation
|
page read and write
|
||
127FE010000
|
heap
|
page read and write
|
||
271889B0000
|
unkown
|
page readonly
|
||
1DA34A76000
|
heap
|
page read and write
|
||
127FC3A8000
|
heap
|
page read and write
|
||
88CFFFF000
|
stack
|
page read and write
|
||
127FDC4D000
|
heap
|
page read and write
|
||
266207F000
|
stack
|
page read and write
|
||
127FDCED000
|
heap
|
page read and write
|
||
127FDCA7000
|
heap
|
page read and write
|
||
127FC1D1000
|
heap
|
page read and write
|
||
127FD65B000
|
heap
|
page read and write
|
||
127FD7A3000
|
heap
|
page read and write
|
||
282F0427000
|
heap
|
page read and write
|
||
127FDC81000
|
heap
|
page read and write
|
||
282F0413000
|
heap
|
page read and write
|
||
EF0497F000
|
stack
|
page read and write
|
||
127FD7C5000
|
heap
|
page read and write
|
||
127FDCBD000
|
heap
|
page read and write
|
||
27188960000
|
heap
|
page read and write
|
||
9B368FF000
|
stack
|
page read and write
|
||
16891E00000
|
heap
|
page read and write
|
||
127FC3B4000
|
heap
|
page read and write
|
||
127FD310000
|
trusted library allocation
|
page read and write
|
||
1E2A2B02000
|
heap
|
page read and write
|
||
2661BF9000
|
stack
|
page read and write
|
||
127FDC7F000
|
heap
|
page read and write
|
||
127FB892000
|
heap
|
page read and write
|
||
127FDC4D000
|
heap
|
page read and write
|
||
282F043C000
|
heap
|
page read and write
|
||
1DA34B02000
|
heap
|
page read and write
|
||
127FDC37000
|
heap
|
page read and write
|
||
1DA34A39000
|
heap
|
page read and write
|
||
1F4BF262000
|
heap
|
page read and write
|
||
127FDC94000
|
heap
|
page read and write
|
||
127FD1C2000
|
trusted library allocation
|
page read and write
|
||
EF045FB000
|
stack
|
page read and write
|
||
127FDC60000
|
heap
|
page read and write
|
||
2661A7F000
|
stack
|
page read and write
|
||
127FD000000
|
trusted library allocation
|
page read and write
|
||
127FDCA0000
|
heap
|
page read and write
|
||
C44C9AD000
|
stack
|
page read and write
|
||
127FDC26000
|
heap
|
page read and write
|
||
127FDD38000
|
heap
|
page read and write
|
||
2662AFD000
|
unkown
|
page read and write
|
||
127FC158000
|
heap
|
page read and write
|
||
127FD613000
|
heap
|
page read and write
|
||
16891D60000
|
trusted library allocation
|
page read and write
|
||
22C9483C000
|
heap
|
page read and write
|
||
127FD653000
|
heap
|
page read and write
|
||
282F0462000
|
heap
|
page read and write
|
||
11A157E000
|
stack
|
page read and write
|
||
26627FE000
|
stack
|
page read and write
|
||
944CAFB000
|
stack
|
page read and write
|
||
27188B02000
|
heap
|
page read and write
|
||
88CFDFB000
|
stack
|
page read and write
|
||
1F4BEED5000
|
trusted library allocation
|
page read and write
|
||
22C95002000
|
trusted library allocation
|
page read and write
|
||
27188A8A000
|
heap
|
page read and write
|
||
127FDD35000
|
heap
|
page read and write
|
||
127FD1AC000
|
trusted library allocation
|
page read and write
|
||
127FD7F8000
|
heap
|
page read and write
|
||
127FC12C000
|
heap
|
page read and write
|
||
127FCFC0000
|
trusted library section
|
page readonly
|
||
127FD7C3000
|
heap
|
page read and write
|
||
127FDC5E000
|
heap
|
page read and write
|
||
16891F00000
|
heap
|
page read and write
|
||
C44D1FE000
|
stack
|
page read and write
|
||
9B36D7F000
|
stack
|
page read and write
|
||
127FDC6E000
|
heap
|
page read and write
|
||
1DA347C0000
|
heap
|
page read and write
|
||
127FD1CA000
|
trusted library allocation
|
page read and write
|
||
1E2A2800000
|
heap
|
page read and write
|
||
127FD1D2000
|
trusted library allocation
|
page read and write
|
||
127FDD91000
|
heap
|
page read and write
|
||
C44CC7E000
|
stack
|
page read and write
|
||
1DA34F90000
|
trusted library allocation
|
page read and write
|
||
40077FB000
|
stack
|
page read and write
|
||
127FB86E000
|
heap
|
page read and write
|
||
127FD76C000
|
heap
|
page read and write
|
||
127FD330000
|
trusted library allocation
|
page read and write
|
||
550727F000
|
stack
|
page read and write
|
||
127FB9C2000
|
heap
|
page read and write
|
||
127FDC10000
|
heap
|
page read and write
|
||
127FD7B4000
|
heap
|
page read and write
|
||
127FBFC1000
|
trusted library allocation
|
page read and write
|
||
127FB863000
|
heap
|
page read and write
|
||
127FD64D000
|
heap
|
page read and write
|
||
C44D07F000
|
stack
|
page read and write
|
||
27188A83000
|
heap
|
page read and write
|
||
127FDC65000
|
heap
|
page read and write
|
||
1DA34A61000
|
heap
|
page read and write
|
||
127FDD1B000
|
heap
|
page read and write
|
||
22C94900000
|
heap
|
page read and write
|
||
26628FF000
|
stack
|
page read and write
|
||
127FDC93000
|
heap
|
page read and write
|
||
127FD324000
|
trusted library allocation
|
page read and write
|
||
1F4BF2E1000
|
heap
|
page read and write
|
||
127FD32C000
|
trusted library allocation
|
page read and write
|
||
127FDC8F000
|
heap
|
page read and write
|
||
11A147F000
|
stack
|
page read and write
|
||
229277D000
|
stack
|
page read and write
|
||
1F4BEED8000
|
trusted library allocation
|
page read and write
|
||
1F4BA1D0000
|
trusted library allocation
|
page read and write
|
||
127FDD56000
|
heap
|
page read and write
|
||
1E2A3112000
|
heap
|
page read and write
|
||
14EED052000
|
heap
|
page read and write
|
||
1F36942E000
|
heap
|
page read and write
|
||
1F4BEEF4000
|
trusted library allocation
|
page read and write
|
||
127FC21B000
|
heap
|
page read and write
|
||
127FD1C0000
|
trusted library allocation
|
page read and write
|
||
8FF6AFD000
|
stack
|
page read and write
|
||
8FF647D000
|
stack
|
page read and write
|
||
127FDD03000
|
heap
|
page read and write
|
||
1F4BF150000
|
trusted library allocation
|
page read and write
|
||
127FD5A0000
|
trusted library allocation
|
page read and write
|
||
127FDC62000
|
heap
|
page read and write
|
||
127FDDB5000
|
heap
|
page read and write
|
||
127FDCC5000
|
heap
|
page read and write
|
||
127FD650000
|
heap
|
page read and write
|
||
9B36E7F000
|
stack
|
page read and write
|
||
1F4BF30A000
|
heap
|
page read and write
|
||
27188A00000
|
heap
|
page read and write
|
||
2661FFA000
|
stack
|
page read and write
|
||
127FDD58000
|
heap
|
page read and write
|
||
127FDC12000
|
heap
|
page read and write
|
||
C44D27F000
|
stack
|
page read and write
|
||
C44D3FE000
|
stack
|
page read and write
|
||
127FD1C6000
|
trusted library allocation
|
page read and write
|
||
16891E5B000
|
heap
|
page read and write
|
||
127FD1BE000
|
trusted library allocation
|
page read and write
|
||
282F0513000
|
heap
|
page read and write
|
||
127FD190000
|
trusted library allocation
|
page read and write
|
||
127FD63A000
|
heap
|
page read and write
|
||
1E2A2B13000
|
heap
|
page read and write
|
||
127FD776000
|
heap
|
page read and write
|
||
C44C92B000
|
stack
|
page read and write
|
||
127FD738000
|
heap
|
page read and write
|
||
127FD768000
|
heap
|
page read and write
|
||
127FE010000
|
heap
|
page read and write
|
||
1F4BEDB0000
|
trusted library allocation
|
page read and write
|
||
C44D2FE000
|
stack
|
page read and write
|
||
1F4BA313000
|
heap
|
page read and write
|
||
127FDC7C000
|
heap
|
page read and write
|
||
127FCEC0000
|
trusted library allocation
|
page read and write
|
||
26624FD000
|
stack
|
page read and write
|
||
282F0350000
|
heap
|
page read and write
|
||
1F4BF289000
|
heap
|
page read and write
|
||
1AD95460000
|
heap
|
page read and write
|
||
127FD781000
|
heap
|
page read and write
|
||
282F0460000
|
heap
|
page read and write
|
||
2291FCE000
|
stack
|
page read and write
|
||
127FD77B000
|
heap
|
page read and write
|
||
1DA34A46000
|
heap
|
page read and write
|
||
127FDCA5000
|
heap
|
page read and write
|
||
1AD95E02000
|
trusted library allocation
|
page read and write
|
||
5506C7F000
|
stack
|
page read and write
|
||
1AD9563C000
|
heap
|
page read and write
|
||
1DA34A7C000
|
heap
|
page read and write
|
||
127FD2F0000
|
trusted library allocation
|
page read and write
|
||
1F4BA9C0000
|
trusted library section
|
page readonly
|
||
266197A000
|
stack
|
page read and write
|
||
127FD310000
|
trusted library allocation
|
page read and write
|
||
127FD420000
|
trusted library allocation
|
page read and write
|
||
1E2A2A3E000
|
heap
|
page read and write
|
||
127FDCA2000
|
heap
|
page read and write
|
||
127FD7C7000
|
heap
|
page read and write
|
||
1DA34830000
|
heap
|
page read and write
|
||
127FDDCA000
|
heap
|
page read and write
|
||
127FC3CF000
|
heap
|
page read and write
|
||
127FD1FA000
|
trusted library allocation
|
page read and write
|
||
127FD3B0000
|
trusted library allocation
|
page read and write
|
||
A191D77000
|
stack
|
page read and write
|
||
1F4BEF00000
|
trusted library allocation
|
page read and write
|
||
8FF66FE000
|
stack
|
page read and write
|
||
127FD7F6000
|
heap
|
page read and write
|
||
127FDE0B000
|
heap
|
page read and write
|
||
127FCFD0000
|
trusted library section
|
page readonly
|
||
A191E7C000
|
stack
|
page read and write
|
||
22C94802000
|
heap
|
page read and write
|
||
1F4BF30B000
|
heap
|
page read and write
|
||
1F4B9B13000
|
heap
|
page read and write
|
||
200D3E29000
|
heap
|
page read and write
|
||
EF0418E000
|
stack
|
page read and write
|
||
127FD7B2000
|
heap
|
page read and write
|
||
27188A29000
|
heap
|
page read and write
|
||
127FC3CE000
|
heap
|
page read and write
|
||
1E2A2AE2000
|
heap
|
page read and write
|
||
127FD23C000
|
trusted library allocation
|
page read and write
|
||
16891E13000
|
heap
|
page read and write
|
||
127FC3C2000
|
heap
|
page read and write
|
||
550697E000
|
stack
|
page read and write
|
||
127FDC5D000
|
heap
|
page read and write
|
||
127FC3D7000
|
heap
|
page read and write
|
||
127FDDAD000
|
heap
|
page read and write
|
||
1F4BF308000
|
heap
|
page read and write
|
||
271888F0000
|
heap
|
page read and write
|
||
1DA34A40000
|
heap
|
page read and write
|
||
26626FE000
|
stack
|
page read and write
|
||
127FC3F0000
|
heap
|
page read and write
|
||
127FDC97000
|
heap
|
page read and write
|
||
1DA34A39000
|
heap
|
page read and write
|
||
1DA34A3D000
|
heap
|
page read and write
|
||
2291F4E000
|
stack
|
page read and write
|
||
1F4BF2DB000
|
heap
|
page read and write
|
||
127FDC94000
|
heap
|
page read and write
|
||
127FDC9F000
|
heap
|
page read and write
|
||
656B778000
|
stack
|
page read and write
|
||
22C94913000
|
heap
|
page read and write
|
||
127FD1D0000
|
trusted library allocation
|
page read and write
|
||
127FD7E9000
|
heap
|
page read and write
|
||
1F4BA318000
|
heap
|
page read and write
|
||
127FDD8D000
|
heap
|
page read and write
|
||
127FDC7E000
|
heap
|
page read and write
|
||
1F4BA302000
|
heap
|
page read and write
|
||
26629FD000
|
stack
|
page read and write
|
||
1F4BF2B0000
|
heap
|
page read and write
|
||
127FDCE5000
|
heap
|
page read and write
|
||
88CFCFB000
|
stack
|
page read and write
|
||
282F0C02000
|
trusted library allocation
|
page read and write
|
||
1F4BF030000
|
remote allocation
|
page read and write
|
||
200D3CA0000
|
heap
|
page read and write
|
||
127FDC93000
|
heap
|
page read and write
|
||
127FBFF0000
|
trusted library allocation
|
page read and write
|
||
127FDC21000
|
heap
|
page read and write
|
||
127FD764000
|
heap
|
page read and write
|
||
127FDC31000
|
heap
|
page read and write
|
||
11A0F7E000
|
stack
|
page read and write
|
||
127FC1CF000
|
heap
|
page read and write
|
||
200D3E61000
|
heap
|
page read and write
|
||
127FDC29000
|
heap
|
page read and write
|
||
127FB7B0000
|
trusted library allocation
|
page read and write
|
||
127FD324000
|
trusted library allocation
|
page read and write
|
||
1DA34A62000
|
heap
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
40073EE000
|
stack
|
page read and write
|
||
200D3E61000
|
heap
|
page read and write
|
||
22EA603E000
|
heap
|
page read and write
|
||
127FCC90000
|
trusted library allocation
|
page read and write
|
||
127FD1C0000
|
trusted library allocation
|
page read and write
|
||
127FDCC1000
|
heap
|
page read and write
|
||
127FCFF0000
|
trusted library section
|
page readonly
|
||
A19207A000
|
stack
|
page read and write
|
||
200D3E3F000
|
heap
|
page read and write
|
||
127FD63F000
|
heap
|
page read and write
|
||
127FC3EF000
|
heap
|
page read and write
|
||
127FD360000
|
trusted library allocation
|
page read and write
|
||
127FD656000
|
heap
|
page read and write
|
||
127FDC1B000
|
heap
|
page read and write
|
||
127FC11D000
|
heap
|
page read and write
|
||
1F4BF317000
|
heap
|
page read and write
|
||
26623FF000
|
stack
|
page read and write
|
||
127FD300000
|
trusted library allocation
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
22EA6047000
|
heap
|
page read and write
|
||
127FD7B1000
|
heap
|
page read and write
|
||
127FD7F1000
|
heap
|
page read and write
|
||
127FC3AF000
|
heap
|
page read and write
|
||
127FCC80000
|
trusted library allocation
|
page read and write
|
||
127FD1CC000
|
trusted library allocation
|
page read and write
|
||
127FDD46000
|
heap
|
page read and write
|
||
127FB9EB000
|
heap
|
page read and write
|
||
1F4BEEF1000
|
trusted library allocation
|
page read and write
|
||
127FD658000
|
heap
|
page read and write
|
||
22EA6029000
|
heap
|
page read and write
|
||
16891F13000
|
heap
|
page read and write
|
||
127FD1B0000
|
trusted library allocation
|
page read and write
|
||
127FD712000
|
heap
|
page read and write
|
||
127FDD1A000
|
heap
|
page read and write
|
||
127FC3D9000
|
heap
|
page read and write
|
||
2661B7C000
|
stack
|
page read and write
|
||
127FD3B0000
|
trusted library allocation
|
page read and write
|
||
127FB913000
|
heap
|
page read and write
|
||
127FD637000
|
heap
|
page read and write
|
||
127FDCC3000
|
heap
|
page read and write
|
||
22EA6670000
|
trusted library allocation
|
page read and write
|
||
127FDE0B000
|
heap
|
page read and write
|
||
C44D5FF000
|
stack
|
page read and write
|
||
127FDC76000
|
heap
|
page read and write
|
||
1F4BEDC0000
|
trusted library allocation
|
page read and write
|
||
127FC102000
|
heap
|
page read and write
|
||
1E2A2A00000
|
heap
|
page read and write
|
||
127FDDBE000
|
heap
|
page read and write
|
||
200D3E00000
|
heap
|
page read and write
|
||
200D3E6B000
|
heap
|
page read and write
|
||
1DA35002000
|
trusted library allocation
|
page read and write
|
||
127FD1FE000
|
trusted library allocation
|
page read and write
|
||
127FDCB4000
|
heap
|
page read and write
|
||
127FDDCB000
|
heap
|
page read and write
|
||
282F045D000
|
heap
|
page read and write
|
||
1DA34A4E000
|
heap
|
page read and write
|
||
127FDD3C000
|
heap
|
page read and write
|
||
127FDCC1000
|
heap
|
page read and write
|
||
127FD440000
|
trusted library allocation
|
page read and write
|
||
9B3687B000
|
stack
|
page read and write
|
||
127FD324000
|
trusted library allocation
|
page read and write
|
||
127FD7EF000
|
heap
|
page read and write
|
||
1DA34A48000
|
heap
|
page read and write
|
||
127FD324000
|
trusted library allocation
|
page read and write
|
||
127FD310000
|
trusted library allocation
|
page read and write
|
||
1DA34A2D000
|
heap
|
page read and write
|
||
22C94852000
|
heap
|
page read and write
|
||
1DA34A44000
|
heap
|
page read and write
|
||
282F0429000
|
heap
|
page read and write
|
||
1AD95654000
|
heap
|
page read and write
|
||
127FD1AC000
|
trusted library allocation
|
page read and write
|
||
8FF67FF000
|
stack
|
page read and write
|
||
1F4B9A3F000
|
heap
|
page read and write
|
||
1F4BEFA0000
|
trusted library allocation
|
page read and write
|
||
400736E000
|
stack
|
page read and write
|
||
8FF687C000
|
stack
|
page read and write
|
||
944CFFE000
|
stack
|
page read and write
|
||
127FDC2F000
|
heap
|
page read and write
|
||
1F4BF2B3000
|
heap
|
page read and write
|
||
1F4BF308000
|
heap
|
page read and write
|
||
127FDC76000
|
heap
|
page read and write
|
||
1DA34A49000
|
heap
|
page read and write
|
||
127FD320000
|
trusted library allocation
|
page read and write
|
||
127FDCA0000
|
heap
|
page read and write
|
||
127FD390000
|
trusted library allocation
|
page read and write
|
||
9B36C7C000
|
stack
|
page read and write
|
||
27189202000
|
trusted library allocation
|
page read and write
|
||
127FD74C000
|
heap
|
page read and write
|
||
22923FE000
|
stack
|
page read and write
|
||
1F4BAA00000
|
trusted library section
|
page readonly
|
||
40072EB000
|
stack
|
page read and write
|
||
A19170F000
|
stack
|
page read and write
|
||
5506E7F000
|
stack
|
page read and write
|
||
127FDD61000
|
heap
|
page read and write
|
||
1F4BF23D000
|
heap
|
page read and write
|
||
5506B7B000
|
stack
|
page read and write
|
||
127FD738000
|
heap
|
page read and write
|
||
1F4BF300000
|
heap
|
page read and write
|
||
1F4BF302000
|
heap
|
page read and write
|
||
1F4BA202000
|
heap
|
page read and write
|
||
1DA34A45000
|
heap
|
page read and write
|
||
127FD1FE000
|
trusted library allocation
|
page read and write
|
||
127FD320000
|
trusted library allocation
|
page read and write
|
||
8FF6DFE000
|
stack
|
page read and write
|
||
127FD190000
|
trusted library allocation
|
page read and write
|
||
14EED102000
|
heap
|
page read and write
|
||
1F4B9A75000
|
heap
|
page read and write
|
||
200D4602000
|
trusted library allocation
|
page read and write
|
||
127FDDCF000
|
heap
|
page read and write
|
||
1F4BA481000
|
trusted library allocation
|
page read and write
|
||
127FC1AD000
|
heap
|
page read and write
|
||
127FDDB7000
|
heap
|
page read and write
|
||
1E2A2A29000
|
heap
|
page read and write
|
||
127FD648000
|
heap
|
page read and write
|
||
127FDD65000
|
heap
|
page read and write
|
||
16891F02000
|
heap
|
page read and write
|
||
127FD1C8000
|
trusted library allocation
|
page read and write
|
||
200D3F13000
|
heap
|
page read and write
|
||
127FDD29000
|
heap
|
page read and write
|
||
127FDC74000
|
heap
|
page read and write
|
||
1F369431000
|
heap
|
page read and write
|
||
127FDC64000
|
heap
|
page read and write
|
||
127FDC14000
|
heap
|
page read and write
|
||
127FD7A1000
|
heap
|
page read and write
|
||
8FF6CFC000
|
stack
|
page read and write
|
||
55065EE000
|
stack
|
page read and write
|
||
127FD774000
|
heap
|
page read and write
|
||
1F4B9980000
|
trusted library section
|
page read and write
|
||
1F4B9A57000
|
heap
|
page read and write
|
||
1AD95708000
|
heap
|
page read and write
|
||
1F369310000
|
heap
|
page read and write
|
||
127FC3C9000
|
heap
|
page read and write
|
||
22C9485A000
|
heap
|
page read and write
|
||
127FD310000
|
trusted library allocation
|
page read and write
|
||
127FB888000
|
heap
|
page read and write
|
||
1E2A2790000
|
heap
|
page read and write
|
||
127FDC85000
|
heap
|
page read and write
|
||
127FC3DF000
|
heap
|
page read and write
|
||
1E2A2AD0000
|
heap
|
page read and write
|
||
14EED802000
|
trusted library allocation
|
page read and write
|
||
88D00FF000
|
stack
|
page read and write
|
||
127FDCA2000
|
heap
|
page read and write
|
||
127FC3AF000
|
heap
|
page read and write
|
||
C44D8FC000
|
stack
|
page read and write
|
||
1F369330000
|
heap
|
page read and write
|
||
1F36940B000
|
heap
|
page read and write
|
||
26625F5000
|
stack
|
page read and write
|
||
127FDC98000
|
heap
|
page read and write
|
||
1F4BA318000
|
heap
|
page read and write
|
||
127FC20A000
|
heap
|
page read and write
|
||
16891C00000
|
heap
|
page read and write
|
||
27188B00000
|
heap
|
page read and write
|
||
127FDD3E000
|
heap
|
page read and write
|
||
127FDCE5000
|
heap
|
page read and write
|
||
127FDD02000
|
heap
|
page read and write
|
||
127FB82A000
|
heap
|
page read and write
|
||
1F369400000
|
heap
|
page read and write
|
||
1E2A29D0000
|
trusted library allocation
|
page read and write
|
||
127FDD16000
|
heap
|
page read and write
|
||
127FD380000
|
trusted library allocation
|
page read and write
|
||
1F4B9B02000
|
heap
|
page read and write
|
||
16892602000
|
trusted library allocation
|
page read and write
|
||
127FD7E7000
|
heap
|
page read and write
|
||
127FD7C3000
|
heap
|
page read and write
|
||
127FDC5D000
|
heap
|
page read and write
|
||
1F4BF21E000
|
heap
|
page read and write
|
||
1F4BF010000
|
trusted library allocation
|
page read and write
|
||
127FB85D000
|
heap
|
page read and write
|
||
11A0FFE000
|
stack
|
page read and write
|
||
22EA5EC0000
|
heap
|
page read and write
|
||
C44D9FE000
|
stack
|
page read and write
|
||
127FDCB9000
|
heap
|
page read and write
|
||
1DA34A32000
|
heap
|
page read and write
|
||
127FDCB9000
|
heap
|
page read and write
|
||
127FDC68000
|
heap
|
page read and write
|
||
127FDD41000
|
heap
|
page read and write
|
||
127FDC1F000
|
heap
|
page read and write
|
||
1F4B9A9D000
|
heap
|
page read and write
|
||
1F4B9A9B000
|
heap
|
page read and write
|
||
127FDD00000
|
heap
|
page read and write
|
||
200D3F02000
|
heap
|
page read and write
|
||
127FDC16000
|
heap
|
page read and write
|
||
127FD400000
|
trusted library allocation
|
page read and write
|
||
127FDC9A000
|
heap
|
page read and write
|
||
1AD95450000
|
heap
|
page read and write
|
There are 1035 hidden memdumps, click here to show them.