Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01
2023, length=1158936, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01
2023, length=1158936, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01
2023, length=1158936, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01
2023, length=1158936, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01
2023, length=1158936, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Wed Sep 30 06:28:28 2020, mtime=Thu Aug 10 09:45:23 2023, atime=Tue Aug 1 18:57:01
2023, length=1158936, window=hide
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB
--service-sandbox-type=none --mojo-platform-channel-handle=2812 --field-trial-handle=2588,i,4458651840048700992,7296907126945281215,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mail.sandiegofenceinstallers.com/login_up.php?success_redirect_url=%2Findex.php%2Ffalse%2Fpy1n.html%2Fdiscovercard.com%2Fdfs%2Faccounthome%2Fsummary%2F-www.schwab.com%2Fsecure.accurint.com%2Funfcu2.org%2Flogin1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://mail.sandiegofenceinstallers.com/login_up.php?success_redirect_url=%2Findex.php%2Ffalse%2Fpy1n.html%2Fdiscovercard.com%2Fdfs%2Faccounthome%2Fsummary%2F-www.schwab.com%2Fsecure.accurint.com%2Funfcu2.org%2Flogin1
|
|||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=115.0.5790.171&lang=en-GB&acceptformat=crx3,puff&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.250.203.110
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
172.217.168.77
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
google.com
|
142.250.203.110
|
||
accounts.google.com
|
172.217.168.77
|
||
www.google.com
|
172.217.168.68
|
||
clients.l.google.com
|
142.250.203.110
|
||
clients2.google.com
|
unknown
|
||
mail.sandiegofenceinstallers.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.217.168.68
|
www.google.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.168.77
|
accounts.google.com
|
United States
|
||
142.250.203.110
|
google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26BBC643000
|
heap
|
page read and write
|
||
1C165B4E000
|
heap
|
page read and write
|
||
2F118070000
|
heap
|
page read and write
|
||
1C1650CF000
|
heap
|
page read and write
|
||
186E99B0000
|
trusted library allocation
|
page read and write
|
||
F8E24FC000
|
stack
|
page read and write
|
||
25690602000
|
trusted library allocation
|
page read and write
|
||
26BBC5D0000
|
trusted library allocation
|
page read and write
|
||
1C1650F2000
|
heap
|
page read and write
|
||
2F118108000
|
heap
|
page read and write
|
||
186E9A52000
|
heap
|
page read and write
|
||
2A331900000
|
heap
|
page read and write
|
||
186E9A13000
|
heap
|
page read and write
|
||
2A331910000
|
heap
|
page read and write
|
||
AC9F7EE000
|
stack
|
page read and write
|
||
A8BF27F000
|
stack
|
page read and write
|
||
1AA36C13000
|
heap
|
page read and write
|
||
14AE925A000
|
heap
|
page read and write
|
||
F8E28FF000
|
stack
|
page read and write
|
||
26BBC643000
|
heap
|
page read and write
|
||
26BBC530000
|
heap
|
page read and write
|
||
23957849000
|
heap
|
page read and write
|
||
1C165013000
|
heap
|
page read and write
|
||
14AE9300000
|
heap
|
page read and write
|
||
DC686FF000
|
stack
|
page read and write
|
||
227B0A24000
|
heap
|
page read and write
|
||
A8BEBFB000
|
stack
|
page read and write
|
||
2A3319A0000
|
trusted library allocation
|
page read and write
|
||
1AA36C49000
|
heap
|
page read and write
|
||
DC6847B000
|
stack
|
page read and write
|
||
2A331B02000
|
heap
|
page read and write
|
||
2568FE42000
|
heap
|
page read and write
|
||
B74A07F000
|
stack
|
page read and write
|
||
1AA36C64000
|
heap
|
page read and write
|
||
719E9FD000
|
stack
|
page read and write
|
||
2568FE41000
|
heap
|
page read and write
|
||
80701FF000
|
stack
|
page read and write
|
||
227B0ABD000
|
heap
|
page read and write
|
||
227B0A29000
|
heap
|
page read and write
|
||
23957913000
|
heap
|
page read and write
|
||
1C165070000
|
heap
|
page read and write
|
||
23957780000
|
trusted library allocation
|
page read and write
|
||
186E9A00000
|
heap
|
page read and write
|
||
719F07F000
|
stack
|
page read and write
|
||
806FC7A000
|
stack
|
page read and write
|
||
A8BF47F000
|
stack
|
page read and write
|
||
F8E216F000
|
stack
|
page read and write
|
||
1C165B13000
|
heap
|
page read and write
|
||
23957877000
|
heap
|
page read and write
|
||
1AA36C02000
|
heap
|
page read and write
|
||
B74A0FF000
|
stack
|
page read and write
|
||
2568FE31000
|
heap
|
page read and write
|
||
2155843C000
|
heap
|
page read and write
|
||
719ED7E000
|
stack
|
page read and write
|
||
2568FE64000
|
heap
|
page read and write
|
||
807077C000
|
stack
|
page read and write
|
||
26BBC627000
|
heap
|
page read and write
|
||
23957900000
|
heap
|
page read and write
|
||
2F11804B000
|
heap
|
page read and write
|
||
26BBC7E1000
|
heap
|
page read and write
|
||
1C165A02000
|
heap
|
page read and write
|
||
1C164FD0000
|
remote allocation
|
page read and write
|
||
2A331A57000
|
heap
|
page read and write
|
||
6E4A97F000
|
stack
|
page read and write
|
||
245797D000
|
stack
|
page read and write
|
||
26BBC713000
|
heap
|
page read and write
|
||
14AE923C000
|
heap
|
page read and write
|
||
2A331B00000
|
heap
|
page read and write
|
||
26BBC540000
|
heap
|
page read and write
|
||
26BBC657000
|
heap
|
page read and write
|
||
806FB7E000
|
stack
|
page read and write
|
||
227B0A70000
|
heap
|
page read and write
|
||
B74A5FE000
|
stack
|
page read and write
|
||
A8BE79B000
|
stack
|
page read and write
|
||
1C165113000
|
heap
|
page read and write
|
||
2568FE46000
|
heap
|
page read and write
|
||
2F118102000
|
heap
|
page read and write
|
||
2A331970000
|
heap
|
page read and write
|
||
186E9B08000
|
heap
|
page read and write
|
||
2568FE3D000
|
heap
|
page read and write
|
||
2568FE30000
|
heap
|
page read and write
|
||
215583C0000
|
trusted library allocation
|
page read and write
|
||
1C16509C000
|
heap
|
page read and write
|
||
14AE9266000
|
heap
|
page read and write
|
||
AC9FD7E000
|
stack
|
page read and write
|
||
23957842000
|
heap
|
page read and write
|
||
1AA36D02000
|
heap
|
page read and write
|
||
A8BF17C000
|
stack
|
page read and write
|
||
227B0A68000
|
heap
|
page read and write
|
||
227B1532000
|
heap
|
page read and write
|
||
1C165102000
|
heap
|
page read and write
|
||
2568FE4D000
|
heap
|
page read and write
|
||
6E4A2FE000
|
stack
|
page read and write
|
||
1C165089000
|
heap
|
page read and write
|
||
806FDFB000
|
stack
|
page read and write
|
||
227B0A43000
|
heap
|
page read and write
|
||
2F11807A000
|
heap
|
page read and write
|
||
26BBD202000
|
heap
|
page read and write
|
||
807087C000
|
stack
|
page read and write
|
||
B74A37C000
|
stack
|
page read and write
|
||
B74A8FB000
|
stack
|
page read and write
|
||
807067F000
|
stack
|
page read and write
|
||
A8BF07B000
|
stack
|
page read and write
|
||
719E5AC000
|
stack
|
page read and write
|
||
227B0950000
|
heap
|
page read and write
|
||
80700FD000
|
stack
|
page read and write
|
||
14AE9224000
|
heap
|
page read and write
|
||
AC9F76B000
|
stack
|
page read and write
|
||
1C165B0A000
|
heap
|
page read and write
|
||
1C165115000
|
heap
|
page read and write
|
||
14AE9A02000
|
trusted library allocation
|
page read and write
|
||
14AE9313000
|
heap
|
page read and write
|
||
2457CF7000
|
stack
|
page read and write
|
||
DC68C7E000
|
stack
|
page read and write
|
||
B74A4FA000
|
stack
|
page read and write
|
||
2568FE69000
|
heap
|
page read and write
|
||
14AE8FE0000
|
heap
|
page read and write
|
||
2A331A79000
|
heap
|
page read and write
|
||
1C16508C000
|
heap
|
page read and write
|
||
26BBC68E000
|
heap
|
page read and write
|
||
227B1500000
|
heap
|
page read and write
|
||
2568FE54000
|
heap
|
page read and write
|
||
2F118050000
|
heap
|
page read and write
|
||
186E9A4C000
|
heap
|
page read and write
|
||
186E9A29000
|
heap
|
page read and write
|
||
26BBD17A000
|
heap
|
page read and write
|
||
21558502000
|
heap
|
page read and write
|
||
6645B3E000
|
stack
|
page read and write
|
||
2F117EB0000
|
heap
|
page read and write
|
||
719EF7C000
|
stack
|
page read and write
|
||
239576F0000
|
heap
|
page read and write
|
||
2A331A02000
|
heap
|
page read and write
|
||
1C165B00000
|
heap
|
page read and write
|
||
2568FE36000
|
heap
|
page read and write
|
||
1C1650D3000
|
heap
|
page read and write
|
||
80702FE000
|
stack
|
page read and write
|
||
215582C0000
|
heap
|
page read and write
|
||
1C1650A9000
|
heap
|
page read and write
|
||
23957802000
|
heap
|
page read and write
|
||
14AE9268000
|
heap
|
page read and write
|
||
1AA36C00000
|
heap
|
page read and write
|
||
2F11803C000
|
heap
|
page read and write
|
||
2568FE00000
|
heap
|
page read and write
|
||
1AA36C2A000
|
heap
|
page read and write
|
||
2568FE4E000
|
heap
|
page read and write
|
||
1AA36D00000
|
heap
|
page read and write
|
||
26BBD252000
|
heap
|
page read and write
|
||
26BBC68B000
|
heap
|
page read and write
|
||
24578FE000
|
stack
|
page read and write
|
||
215583F0000
|
remote allocation
|
page read and write
|
||
2F11804D000
|
heap
|
page read and write
|
||
227B0A13000
|
heap
|
page read and write
|
||
AC9FC7B000
|
stack
|
page read and write
|
||
2457B7B000
|
stack
|
page read and write
|
||
227B0B02000
|
heap
|
page read and write
|
||
719EC7F000
|
stack
|
page read and write
|
||
664607E000
|
stack
|
page read and write
|
||
186E9A55000
|
heap
|
page read and write
|
||
806FCFE000
|
stack
|
page read and write
|
||
2568FC60000
|
heap
|
page read and write
|
||
186E9A4F000
|
heap
|
page read and write
|
||
A8BF37B000
|
stack
|
page read and write
|
||
26BBD100000
|
heap
|
page read and write
|
||
AC9FE7E000
|
stack
|
page read and write
|
||
DC68AFD000
|
stack
|
page read and write
|
||
719EE7C000
|
stack
|
page read and write
|
||
26BBC687000
|
heap
|
page read and write
|
||
6645BBE000
|
stack
|
page read and write
|
||
6E4A87F000
|
stack
|
page read and write
|
||
1C165B62000
|
heap
|
page read and write
|
||
14AE9251000
|
heap
|
page read and write
|
||
26BBC691000
|
heap
|
page read and write
|
||
1AA36B80000
|
trusted library allocation
|
page read and write
|
||
239592B0000
|
trusted library allocation
|
page read and write
|
||
2568FE74000
|
heap
|
page read and write
|
||
2568FE29000
|
heap
|
page read and write
|
||
1C165B24000
|
heap
|
page read and write
|
||
23957902000
|
heap
|
page read and write
|
||
719EA7D000
|
stack
|
page read and write
|
||
1C16505B000
|
heap
|
page read and write
|
||
21558402000
|
heap
|
page read and write
|
||
80703FE000
|
stack
|
page read and write
|
||
719E8FE000
|
stack
|
page read and write
|
||
14AE9150000
|
trusted library allocation
|
page read and write
|
||
1AA36D08000
|
heap
|
page read and write
|
||
1C165084000
|
heap
|
page read and write
|
||
2568FF02000
|
heap
|
page read and write
|
||
2F117E40000
|
heap
|
page read and write
|
||
14AE9200000
|
heap
|
page read and write
|
||
26BBC5A0000
|
heap
|
page read and write
|
||
1C165091000
|
heap
|
page read and write
|
||
F8E27F7000
|
stack
|
page read and write
|
||
1D05EFE000
|
stack
|
page read and write
|
||
2457A7B000
|
stack
|
page read and write
|
||
1C165B06000
|
heap
|
page read and write
|
||
AC9FA7E000
|
stack
|
page read and write
|
||
2457EFF000
|
stack
|
page read and write
|
||
2568FE61000
|
heap
|
page read and write
|
||
1C165041000
|
heap
|
page read and write
|
||
1C164ED0000
|
heap
|
page read and write
|
||
B74A6FF000
|
stack
|
page read and write
|
||
2568FE4B000
|
heap
|
page read and write
|
||
239577D0000
|
remote allocation
|
page read and write
|
||
DC6877E000
|
stack
|
page read and write
|
||
6E4A777000
|
stack
|
page read and write
|
||
1AA36C3C000
|
heap
|
page read and write
|
||
A8BEEFC000
|
stack
|
page read and write
|
||
2F117E50000
|
heap
|
page read and write
|
||
2F11804F000
|
heap
|
page read and write
|
||
26BBC7B9000
|
heap
|
page read and write
|
||
26BBD213000
|
heap
|
page read and write
|
||
14AE9285000
|
heap
|
page read and write
|
||
26BBC666000
|
heap
|
page read and write
|
||
2568FE63000
|
heap
|
page read and write
|
||
14AE925C000
|
heap
|
page read and write
|
||
215583F0000
|
remote allocation
|
page read and write
|
||
2568FE13000
|
heap
|
page read and write
|
||
6645F7E000
|
stack
|
page read and write
|
||
26BBD235000
|
heap
|
page read and write
|
||
1C165093000
|
heap
|
page read and write
|
||
23957918000
|
heap
|
page read and write
|
||
80704FE000
|
stack
|
page read and write
|
||
14AE925E000
|
heap
|
page read and write
|
||
2F118013000
|
heap
|
page read and write
|
||
2A331A68000
|
heap
|
page read and write
|
||
227B0AC5000
|
heap
|
page read and write
|
||
26BBD002000
|
heap
|
page read and write
|
||
23957849000
|
heap
|
page read and write
|
||
23957750000
|
heap
|
page read and write
|
||
2568FC00000
|
heap
|
page read and write
|
||
14AE9302000
|
heap
|
page read and write
|
||
80705FF000
|
stack
|
page read and write
|
||
B74A27E000
|
stack
|
page read and write
|
||
186E9B02000
|
heap
|
page read and write
|
||
26BBD197000
|
heap
|
page read and write
|
||
2568FE60000
|
heap
|
page read and write
|
||
806FFFF000
|
stack
|
page read and write
|
||
14AE9267000
|
heap
|
page read and write
|
||
6645ABB000
|
stack
|
page read and write
|
||
1C164FD0000
|
remote allocation
|
page read and write
|
||
AC9FF7F000
|
stack
|
page read and write
|
||
2A331B13000
|
heap
|
page read and write
|
||
21558429000
|
heap
|
page read and write
|
||
F8E20EB000
|
stack
|
page read and write
|
||
26BBC671000
|
heap
|
page read and write
|
||
227B0A8A000
|
heap
|
page read and write
|
||
2568FE47000
|
heap
|
page read and write
|
||
21558413000
|
heap
|
page read and write
|
||
186E9A71000
|
heap
|
page read and write
|
||
1AA36D13000
|
heap
|
page read and write
|
||
26BBD1EA000
|
heap
|
page read and write
|
||
23957866000
|
heap
|
page read and write
|
||
1C1650B3000
|
heap
|
page read and write
|
||
215583F0000
|
remote allocation
|
page read and write
|
||
719EB7F000
|
stack
|
page read and write
|
||
14AE925F000
|
heap
|
page read and write
|
||
26BBC65A000
|
heap
|
page read and write
|
||
2568FE44000
|
heap
|
page read and write
|
||
2A331A28000
|
heap
|
page read and write
|
||
2568FE50000
|
heap
|
page read and write
|
||
2568FE77000
|
heap
|
page read and write
|
||
DC6887F000
|
stack
|
page read and write
|
||
1D0647F000
|
stack
|
page read and write
|
||
186E9840000
|
heap
|
page read and write
|
||
664627F000
|
stack
|
page read and write
|
||
6E4A57B000
|
stack
|
page read and write
|
||
239577A0000
|
trusted library allocation
|
page read and write
|
||
23957813000
|
heap
|
page read and write
|
||
1C164F40000
|
heap
|
page read and write
|
||
2A331A00000
|
heap
|
page read and write
|
||
245787B000
|
stack
|
page read and write
|
||
2568FE66000
|
heap
|
page read and write
|
||
186E98B0000
|
heap
|
page read and write
|
||
21558C02000
|
trusted library allocation
|
page read and write
|
||
2A331A3C000
|
heap
|
page read and write
|
||
2568FE84000
|
heap
|
page read and write
|
||
1C1650B6000
|
heap
|
page read and write
|
||
2568FE7E000
|
heap
|
page read and write
|
||
2A331A63000
|
heap
|
page read and write
|
||
23957848000
|
heap
|
page read and write
|
||
23959402000
|
trusted library allocation
|
page read and write
|
||
2568FE40000
|
heap
|
page read and write
|
||
1D0637F000
|
stack
|
page read and write
|
||
DC6897D000
|
stack
|
page read and write
|
||
2F118029000
|
heap
|
page read and write
|
||
186E9B13000
|
heap
|
page read and write
|
||
26BBD102000
|
heap
|
page read and write
|
||
2155845C000
|
heap
|
page read and write
|
||
227B0980000
|
trusted library allocation
|
page read and write
|
||
2568FE45000
|
heap
|
page read and write
|
||
14AE925B000
|
heap
|
page read and write
|
||
186E9B00000
|
heap
|
page read and write
|
||
23957858000
|
heap
|
page read and write
|
||
1D06277000
|
stack
|
page read and write
|
||
1C1650F0000
|
heap
|
page read and write
|
||
1AA36C8F000
|
heap
|
page read and write
|
||
2568FE49000
|
heap
|
page read and write
|
||
2568FE39000
|
heap
|
page read and write
|
||
2568FE62000
|
heap
|
page read and write
|
||
2F118086000
|
heap
|
page read and write
|
||
227B1402000
|
heap
|
page read and write
|
||
DC689FE000
|
stack
|
page read and write
|
||
719F17E000
|
stack
|
page read and write
|
||
26BBD1F0000
|
heap
|
page read and write
|
||
B74A17E000
|
stack
|
page read and write
|
||
227B0AE2000
|
heap
|
page read and write
|
||
239577D0000
|
remote allocation
|
page read and write
|
||
227B08E0000
|
heap
|
page read and write
|
||
2F118000000
|
heap
|
page read and write
|
||
2F118802000
|
trusted library allocation
|
page read and write
|
||
1AA36C59000
|
heap
|
page read and write
|
||
2568FBF0000
|
heap
|
page read and write
|
||
14AE9278000
|
heap
|
page read and write
|
||
1C165B41000
|
heap
|
page read and write
|
||
26BBC63C000
|
heap
|
page read and write
|
||
26BBD1BB000
|
heap
|
page read and write
|
||
719E87E000
|
stack
|
page read and write
|
||
6E4A27B000
|
stack
|
page read and write
|
||
23957800000
|
heap
|
page read and write
|
||
1C165066000
|
heap
|
page read and write
|
||
1C164FD0000
|
remote allocation
|
page read and write
|
||
1C165B11000
|
heap
|
page read and write
|
||
26BBCE70000
|
trusted library allocation
|
page read and write
|
||
DC68BFF000
|
stack
|
page read and write
|
||
227B0ACE000
|
heap
|
page read and write
|
||
1AA36C5F000
|
heap
|
page read and write
|
||
186E9A02000
|
heap
|
page read and write
|
||
227B0B13000
|
heap
|
page read and write
|
||
26BBC629000
|
heap
|
page read and write
|
||
2568FE6B000
|
heap
|
page read and write
|
||
F8E29FF000
|
stack
|
page read and write
|
||
26BBD163000
|
heap
|
page read and write
|
||
186E9A7E000
|
heap
|
page read and write
|
||
21558250000
|
heap
|
page read and write
|
||
1C1650F0000
|
heap
|
page read and write
|
||
2457DFF000
|
stack
|
page read and write
|
||
23957859000
|
heap
|
page read and write
|
||
23957859000
|
heap
|
page read and write
|
||
2A332402000
|
trusted library allocation
|
page read and write
|
||
F8E25FB000
|
stack
|
page read and write
|
||
1C165096000
|
heap
|
page read and write
|
||
1C165102000
|
heap
|
page read and write
|
||
1C165000000
|
heap
|
page read and write
|
||
A8BEA7E000
|
stack
|
page read and write
|
||
806FA7C000
|
stack
|
page read and write
|
||
26BBD128000
|
heap
|
page read and write
|
||
186E9A54000
|
heap
|
page read and write
|
||
26BBD24A000
|
heap
|
page read and write
|
||
2568FE7B000
|
heap
|
page read and write
|
||
1C164F70000
|
trusted library allocation
|
page read and write
|
||
1C1650CE000
|
heap
|
page read and write
|
||
26BBC66F000
|
heap
|
page read and write
|
||
6E4A47C000
|
stack
|
page read and write
|
||
1C164EE0000
|
heap
|
page read and write
|
||
2395782A000
|
heap
|
page read and write
|
||
A8BEAFD000
|
stack
|
page read and write
|
||
F8E21EF000
|
stack
|
page read and write
|
||
186E9A88000
|
heap
|
page read and write
|
||
B749D1E000
|
stack
|
page read and write
|
||
2F117FB0000
|
trusted library allocation
|
page read and write
|
||
21558400000
|
heap
|
page read and write
|
||
26BBC78C000
|
heap
|
page read and write
|
||
14AE9308000
|
heap
|
page read and write
|
||
26BBD14E000
|
heap
|
page read and write
|
||
186E9A4A000
|
heap
|
page read and write
|
||
2A331A13000
|
heap
|
page read and write
|
||
2568FE6D000
|
heap
|
page read and write
|
||
2568FE7A000
|
heap
|
page read and write
|
||
1C165065000
|
heap
|
page read and write
|
||
1AA36AF0000
|
heap
|
page read and write
|
||
B74A7FE000
|
stack
|
page read and write
|
||
14AE9264000
|
heap
|
page read and write
|
||
A8BEE7E000
|
stack
|
page read and write
|
||
14AE9213000
|
heap
|
page read and write
|
||
B74A3F9000
|
stack
|
page read and write
|
||
2F118100000
|
heap
|
page read and write
|
||
A8BED7F000
|
stack
|
page read and write
|
||
23959270000
|
trusted library allocation
|
page read and write
|
||
26BBC600000
|
heap
|
page read and write
|
||
2F118052000
|
heap
|
page read and write
|
||
2568FE5F000
|
heap
|
page read and write
|
||
DC684FE000
|
stack
|
page read and write
|
||
186E9A3C000
|
heap
|
page read and write
|
||
26BBD1DE000
|
heap
|
page read and write
|
||
186EA202000
|
trusted library allocation
|
page read and write
|
||
1AA36AE0000
|
heap
|
page read and write
|
||
1AA37602000
|
trusted library allocation
|
page read and write
|
||
1C1650D1000
|
heap
|
page read and write
|
||
2A331A5F000
|
heap
|
page read and write
|
||
1AA36C5C000
|
heap
|
page read and write
|
||
26BBD128000
|
heap
|
page read and write
|
||
1C165B80000
|
heap
|
page read and write
|
||
2568FE48000
|
heap
|
page read and write
|
||
186E9850000
|
heap
|
page read and write
|
||
14AE9050000
|
heap
|
page read and write
|
||
2568FE67000
|
heap
|
page read and write
|
||
2F118113000
|
heap
|
page read and write
|
||
26BBC613000
|
heap
|
page read and write
|
||
1D0617B000
|
stack
|
page read and write
|
||
806FAFD000
|
stack
|
page read and write
|
||
239576E0000
|
heap
|
page read and write
|
||
227B0A00000
|
heap
|
page read and write
|
||
1AA36B50000
|
heap
|
page read and write
|
||
A8BEFFD000
|
stack
|
page read and write
|
||
1D05F7E000
|
stack
|
page read and write
|
||
2A331A25000
|
heap
|
page read and write
|
||
1AA36C7B000
|
heap
|
page read and write
|
||
2568FD60000
|
trusted library allocation
|
page read and write
|
||
26BBD200000
|
heap
|
page read and write
|
||
1D05E7C000
|
stack
|
page read and write
|
||
B749C9C000
|
stack
|
page read and write
|
||
2457BFF000
|
stack
|
page read and write
|
||
806FEFC000
|
stack
|
page read and write
|
||
1C16502A000
|
heap
|
page read and write
|
||
664617E000
|
stack
|
page read and write
|
||
14AE9261000
|
heap
|
page read and write
|
||
6E4A67F000
|
stack
|
page read and write
|
||
26BBD254000
|
heap
|
page read and write
|
||
6E4A37F000
|
stack
|
page read and write
|
||
239577D0000
|
remote allocation
|
page read and write
|
||
F8E26FD000
|
stack
|
page read and write
|
||
2568FE75000
|
heap
|
page read and write
|
||
DC6857E000
|
stack
|
page read and write
|
||
1AA36C55000
|
heap
|
page read and write
|
||
B749D9E000
|
stack
|
page read and write
|
||
14AE8FF0000
|
heap
|
page read and write
|
||
21558260000
|
heap
|
page read and write
|
||
1AA36C86000
|
heap
|
page read and write
|
||
1D0607B000
|
stack
|
page read and write
|
||
227B08F0000
|
heap
|
page read and write
|
There are 420 hidden memdumps, click here to show them.