Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\tatuJHXSR4.exe
|
"C:\Users\user\Desktop\tatuJHXSR4.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
communicationgenerwo.shop
|
|||
pillowbrocccolipe.shop
|
|||
enthusiasimtitleow.shop
|
|||
worryfillvolcawoi.shop
|
|||
dismissalcylinderhostw.shop
|
|||
diskretainvigorousiw.shop
|
|||
cleartotalfisherwo.shop
|
|||
affordcharmcropwo.shop
|
|||
https://communicationgenerwo.shop/apix
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://communicationgenerwo.shop/apilJ
|
unknown
|
||
https://communicationgenerwo.shop/api
|
172.67.166.251
|
||
https://login.chinacloudapi.cn/no_standard_descript
|
unknown
|
||
https://communicationgenerwo.shop/Ri
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://protobuf.dev/reference/go/faq#namespace-conflictcorruption
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://communicationgenerwo.shop/Xi
|
unknown
|
||
http://.css
|
unknown
|
||
https://communicationgenerwo.shop/y
|
unknown
|
||
https://communicationgenerwo.shop/api/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://login.microsoftonline.us/application/x-www-for
|
unknown
|
||
https://communicationgenerwo.shop/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://communicationgenerwo.shop/api9J
|
unknown
|
||
https://login.microsoftonline.com/%s
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://communicationgenerwo.shop/apidZ
|
unknown
|
||
https://communicationgenerwo.shop/e
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
communicationgenerwo.shop
|
172.67.166.251
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.166.251
|
communicationgenerwo.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C0002D6000
|
direct allocation
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
7FF67ED05000
|
unkown
|
page read and write
|
||
4F4C000
|
trusted library allocation
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
C0004B9000
|
direct allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
5D87000
|
trusted library allocation
|
page read and write
|
||
2243F6A3000
|
direct allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4F5F000
|
trusted library allocation
|
page read and write
|
||
4FCB000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
C0004B5000
|
direct allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
5126000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
2243F4A4000
|
heap
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
7FF67ED0F000
|
unkown
|
page write copy
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
2243F400000
|
heap
|
page read and write
|
||
CC929FE000
|
stack
|
page read and write
|
||
2243F6A0000
|
direct allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
BBD000
|
stack
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
4F72000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
CF1000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
4F5D000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
7FF67E6E6000
|
unkown
|
page write copy
|
||
D20000
|
heap
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
7FF67E2A1000
|
unkown
|
page execute read
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
22464AA0000
|
direct allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
C00038A000
|
direct allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
504F000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
C00041E000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
2243F3F0000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
4F59000
|
trusted library allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000107000
|
direct allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
C00016A000
|
direct allocation
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
2243F775000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
C0004B0000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4F5D000
|
trusted library allocation
|
page read and write
|
||
4F89000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
7FF67E6E9000
|
unkown
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
CFB000
|
heap
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
7FF67E6E3000
|
unkown
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
7FF67EC77000
|
unkown
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
7FF67E2A0000
|
unkown
|
page readonly
|
||
C000262000
|
direct allocation
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
7FF67ED12000
|
unkown
|
page write copy
|
||
D11000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
22464AE6000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
CC925FD000
|
stack
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
718000
|
stack
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
2243F680000
|
direct allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
5055000
|
trusted library allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4FA7000
|
trusted library allocation
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
CC927FF000
|
stack
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
7FF67E2A1000
|
unkown
|
page execute read
|
||
C000008000
|
direct allocation
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
7FF67E6DF000
|
unkown
|
page write copy
|
||
D47000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
7FF67E756000
|
unkown
|
page readonly
|
||
D16000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4FEB000
|
trusted library allocation
|
page read and write
|
||
CC92FFC000
|
stack
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
6DB000
|
stack
|
page read and write
|
||
7FF67ED0E000
|
unkown
|
page write copy
|
||
4F69000
|
trusted library allocation
|
page read and write
|
||
4F5C000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
4F69000
|
trusted library allocation
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
7FF67E750000
|
unkown
|
page read and write
|
||
7FF67E737000
|
unkown
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C0004A0000
|
direct allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
512E000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
CC92BFF000
|
stack
|
page read and write
|
||
7FF67E752000
|
unkown
|
page write copy
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
7FF67E6E5000
|
unkown
|
page read and write
|
||
7FF67EC92000
|
unkown
|
page read and write
|
||
D1F000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
7FF67ED21000
|
unkown
|
page readonly
|
||
D2C000
|
heap
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
C73000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
2243F760000
|
direct allocation
|
page read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
2243F454000
|
direct allocation
|
page read and write
|
||
5086000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
2243F458000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C0004B0000
|
direct allocation
|
page read and write
|
||
506E000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
2243F49C000
|
heap
|
page read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
5041000
|
heap
|
page read and write
|
||
C0005FC000
|
direct allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4F5F000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
7FF67E6EA000
|
unkown
|
page write copy
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C0004B7000
|
direct allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
C0000D3000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
4F89000
|
trusted library allocation
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
7FF67E73C000
|
unkown
|
page write copy
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
7FF67ED00000
|
unkown
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
D1F000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
537A000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
CC92DFD000
|
stack
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
7FF67E756000
|
unkown
|
page readonly
|
||
D10000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
2243F499000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
4F53000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
7FF67ED21000
|
unkown
|
page readonly
|
||
D2C000
|
heap
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
4F5B000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
C00017A000
|
direct allocation
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
7FF67E74D000
|
unkown
|
page write copy
|
||
CF4000
|
heap
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
7FF67ED12000
|
unkown
|
page write copy
|
||
C000084000
|
direct allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
2243F720000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4F93000
|
trusted library allocation
|
page read and write
|
||
7FF67E6DF000
|
unkown
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
7FF67E73A000
|
unkown
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
7FF67EC99000
|
unkown
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
511E000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
51BE000
|
trusted library allocation
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
7FF67E73E000
|
unkown
|
page read and write
|
||
4F93000
|
trusted library allocation
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
4F97000
|
trusted library allocation
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
7FF67E6E4000
|
unkown
|
page write copy
|
||
D20000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
4FB1000
|
trusted library allocation
|
page read and write
|
||
7FF67ED0E000
|
unkown
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
51EC000
|
trusted library allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
796000
|
remote allocation
|
page execute and read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
7FF67E754000
|
unkown
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
2243F6E1000
|
direct allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
5877000
|
trusted library allocation
|
page read and write
|
||
7FF67E2A0000
|
unkown
|
page readonly
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
7FF67E739000
|
unkown
|
page write copy
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
CC931FF000
|
stack
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
750000
|
remote allocation
|
page execute and read and write
|
||
D19000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
C20000
|
remote allocation
|
page read and write
|
||
49FC000
|
stack
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C0004B7000
|
direct allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
C00053F000
|
direct allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
2243F450000
|
direct allocation
|
page read and write
|
||
C0004B9000
|
direct allocation
|
page read and write
|
||
2243F490000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
22464AF0000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
22464A50000
|
direct allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
2243F690000
|
direct allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
C0003D4000
|
direct allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
4FE9000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
4F4C000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
2243F420000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
50F6000
|
trusted library allocation
|
page read and write
|
||
2243F770000
|
heap
|
page read and write
|
||
2243F6EA000
|
direct allocation
|
page read and write
|
||
7FF67E6E2000
|
unkown
|
page write copy
|
||
4FBA000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
22464A50000
|
direct allocation
|
page read and write
|
There are 584 hidden memdumps, click here to show them.