Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\Downloads\0ef71b6e-a980-4dd6-9f83-df83f6561ba1.tmp
|
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\Downloads\Invoicelogo_2023-06-20_Logo_Assek_ZohoBooks240px.png (copy)
|
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\Downloads\Invoicelogo_2023-06-20_Logo_Assek_ZohoBooks240px.png.crdownload
|
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Windows\debug\WIA\wiatrace.log
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
Chrome Cache Entry: 124
|
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1996,i,13365789237839253957,2226731636364892514,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4"
|
||
C:\Windows\SysWOW64\mspaint.exe
|
mspaint.exe "C:\Users\user\Desktop\"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4
|
|||
https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4
|
204.141.42.145
|
||
http://www.gimp.org/xmp/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
books.zoho.com
|
204.141.42.145
|
||
www.google.com
|
142.250.186.164
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
204.141.42.145
|
books.zoho.com
|
United States
|
||
142.250.186.164
|
www.google.com
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4B73000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
501A000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
3155000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
30B8000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
30C8000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2E75000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
526F000
|
stack
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
52EF000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
315B000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BBD000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4B6B000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2EB9000
|
stack
|
page read and write
|
||
2F6D000
|
stack
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
3142000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
31ED000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
There are 418 hidden memdumps, click here to show them.