Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
shatterbreathepsw.shop
|
|||
https://shortsvelventysjo.shop/api
|
104.21.16.225
|
||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
alcojoldwograpciw.shop
|
|||
incredibleextedwj.shop
|
|||
liabilitynighstjsko.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://shortsvelventysjo.shop/api8
|
unknown
|
||
https://shortsvelventysjo.shop/h
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://shortsvelventysjo.shop/api=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://shortsvelventysjo.shop/8
|
unknown
|
||
https://shortsvelventysjo.shop/9
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://shortsvelventysjo.shop/E
|
unknown
|
||
https://shortsvelventysjo.shop/apiS
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://shortsvelventysjo.shop/#
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://shortsvelventysjo.shop/
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://shortsvelventysjo.shop/PDJ
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://shortsvelventysjo.shop/apiakijgnj
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://shortsvelventysjo.shop/)DC
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://shortsvelventysjo.shop/apinn
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 39 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shortsvelventysjo.shop
|
104.21.16.225
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.16.225
|
shortsvelventysjo.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B2A000
|
unkown
|
page readonly
|
||
1A0D000
|
heap
|
page read and write
|
||
1A04000
|
heap
|
page read and write
|
||
3EBB000
|
trusted library allocation
|
page read and write
|
||
3F27000
|
trusted library allocation
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
3EC5000
|
trusted library allocation
|
page read and write
|
||
3EDB000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
3EA0000
|
trusted library allocation
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
3EB3000
|
trusted library allocation
|
page read and write
|
||
3FAF000
|
trusted library allocation
|
page read and write
|
||
3ED8000
|
trusted library allocation
|
page read and write
|
||
E12000
|
unkown
|
page execute read
|
||
3EE7000
|
trusted library allocation
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
3EFE000
|
trusted library allocation
|
page read and write
|
||
3EAF000
|
trusted library allocation
|
page read and write
|
||
34FD000
|
stack
|
page read and write
|
||
1A2E000
|
heap
|
page read and write
|
||
1A04000
|
heap
|
page read and write
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
3F0B000
|
trusted library allocation
|
page read and write
|
||
1A2C000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
198F000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
4341000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
17A5000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
3ECB000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3EB3000
|
trusted library allocation
|
page read and write
|
||
19AB000
|
heap
|
page read and write
|
||
4075000
|
trusted library allocation
|
page read and write
|
||
3EDB000
|
trusted library allocation
|
page read and write
|
||
3EE1000
|
trusted library allocation
|
page read and write
|
||
3F3C000
|
trusted library allocation
|
page read and write
|
||
3EAC000
|
trusted library allocation
|
page read and write
|
||
3ED3000
|
trusted library allocation
|
page read and write
|
||
3FA1000
|
heap
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
3EA3000
|
trusted library allocation
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
3EB2000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
191D000
|
stack
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
1A1C000
|
heap
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
3EDB000
|
trusted library allocation
|
page read and write
|
||
1A2A000
|
heap
|
page read and write
|
||
3EE2000
|
trusted library allocation
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
3EF7000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
40E4000
|
trusted library allocation
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
B2D000
|
unkown
|
page read and write
|
||
3EC4000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
3EBD000
|
trusted library allocation
|
page read and write
|
||
3EA3000
|
trusted library allocation
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
3FAC000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3EBF000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3EAD000
|
trusted library allocation
|
page read and write
|
||
B38000
|
unkown
|
page execute read
|
||
196E000
|
heap
|
page read and write
|
||
13DA000
|
unkown
|
page readonly
|
||
1A41000
|
heap
|
page read and write
|
||
16F8000
|
stack
|
page read and write
|
||
1A17000
|
heap
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
3EF3000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
38BF000
|
stack
|
page read and write
|
||
3ECD000
|
trusted library allocation
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3EC9000
|
trusted library allocation
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
1996000
|
heap
|
page read and write
|
||
3EF5000
|
trusted library allocation
|
page read and write
|
||
1A1C000
|
heap
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3EC4000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
trusted library allocation
|
page read and write
|
||
E12000
|
unkown
|
page execute read
|
||
3EAA000
|
trusted library allocation
|
page read and write
|
||
1A3A000
|
heap
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
3EC7000
|
trusted library allocation
|
page read and write
|
||
3FA0000
|
heap
|
page read and write
|
||
1A0A000
|
heap
|
page read and write
|
||
3EEB000
|
trusted library allocation
|
page read and write
|
||
3EF7000
|
trusted library allocation
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
19BA000
|
heap
|
page read and write
|
||
1C5E000
|
stack
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
1A46000
|
heap
|
page read and write
|
||
3EC7000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3EAA000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
3ECF000
|
trusted library allocation
|
page read and write
|
||
404D000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3EAC000
|
trusted library allocation
|
page read and write
|
||
3ECB000
|
trusted library allocation
|
page read and write
|
||
3EA6000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
unkown
|
page execute read
|
||
19BA000
|
heap
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3ECB000
|
trusted library allocation
|
page read and write
|
||
1A2D000
|
heap
|
page read and write
|
||
3F0C000
|
trusted library allocation
|
page read and write
|
||
19AD000
|
heap
|
page read and write
|
||
3ED3000
|
trusted library allocation
|
page read and write
|
||
1A0A000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3EB8000
|
trusted library allocation
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3F1B000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3ED6000
|
trusted library allocation
|
page read and write
|
||
19B6000
|
heap
|
page read and write
|
||
3EBC000
|
trusted library allocation
|
page read and write
|
||
1A2C000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
4D5F000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3EA3000
|
trusted library allocation
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
1A19000
|
heap
|
page read and write
|
||
3F2F000
|
trusted library allocation
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
3EE0000
|
trusted library allocation
|
page read and write
|
||
3F03000
|
trusted library allocation
|
page read and write
|
||
3F1C000
|
trusted library allocation
|
page read and write
|
||
423A000
|
trusted library allocation
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3EA5000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
3ECD000
|
trusted library allocation
|
page read and write
|
||
3EE5000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
AAB000
|
stack
|
page read and write
|
||
3EA6000
|
trusted library allocation
|
page read and write
|
||
3EED000
|
trusted library allocation
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
3EDD000
|
trusted library allocation
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
1A38000
|
heap
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
3ECA000
|
trusted library allocation
|
page read and write
|
||
3EEA000
|
trusted library allocation
|
page read and write
|
||
407D000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
19CE000
|
heap
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
4841000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
3EC0000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
19BA000
|
heap
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
1B5F000
|
stack
|
page read and write
|
||
3EDB000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
3EDD000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
3FC5000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
3EAF000
|
trusted library allocation
|
page read and write
|
||
195D000
|
stack
|
page read and write
|
||
3ECA000
|
trusted library allocation
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3EBB000
|
trusted library allocation
|
page read and write
|
||
4051000
|
trusted library allocation
|
page read and write
|
||
3ED3000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3EC2000
|
trusted library allocation
|
page read and write
|
||
19BA000
|
heap
|
page read and write
|
||
3F23000
|
trusted library allocation
|
page read and write
|
||
3EAF000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
196A000
|
heap
|
page read and write
|
||
1A17000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
3ED6000
|
trusted library allocation
|
page read and write
|
||
1A1F000
|
heap
|
page read and write
|
||
3F04000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
199B000
|
heap
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
3ECD000
|
trusted library allocation
|
page read and write
|
||
35C5000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
3EE3000
|
trusted library allocation
|
page read and write
|
||
36BC000
|
stack
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
3F1E000
|
trusted library allocation
|
page read and write
|
||
3EA3000
|
trusted library allocation
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3EAA000
|
trusted library allocation
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3ED7000
|
trusted library allocation
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
3EF3000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3ED9000
|
trusted library allocation
|
page read and write
|
||
3ED8000
|
trusted library allocation
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
3ECE000
|
trusted library allocation
|
page read and write
|
||
3EC7000
|
trusted library allocation
|
page read and write
|
||
4115000
|
trusted library allocation
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
3EED000
|
trusted library allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
1996000
|
heap
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
1A05000
|
heap
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
3EAB000
|
trusted library allocation
|
page read and write
|
||
19BA000
|
heap
|
page read and write
|
||
3EEB000
|
trusted library allocation
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
3EC1000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3ED2000
|
trusted library allocation
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
1A43000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
3F03000
|
trusted library allocation
|
page read and write
|
||
3590000
|
remote allocation
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
3EEA000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
3EAC000
|
trusted library allocation
|
page read and write
|
||
3EF2000
|
trusted library allocation
|
page read and write
|
||
3FA6000
|
trusted library allocation
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3EAF000
|
trusted library allocation
|
page read and write
|
||
3EA5000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3EC1000
|
trusted library allocation
|
page read and write
|
||
3FDD000
|
trusted library allocation
|
page read and write
|
||
1990000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3ED6000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
3ED3000
|
trusted library allocation
|
page read and write
|
||
1A1F000
|
heap
|
page read and write
|
||
1A0A000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
1A52000
|
heap
|
page read and write
|
||
1A18000
|
heap
|
page read and write
|
||
3F27000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
1A16000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
1A47000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
1A1F000
|
heap
|
page read and write
|
||
4453000
|
trusted library allocation
|
page read and write
|
||
3F1C000
|
trusted library allocation
|
page read and write
|
||
1A31000
|
heap
|
page read and write
|
||
3EAF000
|
trusted library allocation
|
page read and write
|
||
1A1A000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
19CD000
|
heap
|
page read and write
|
||
1996000
|
heap
|
page read and write
|
||
4085000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3EC0000
|
trusted library allocation
|
page read and write
|
||
3EA5000
|
trusted library allocation
|
page read and write
|
||
13DA000
|
unkown
|
page readonly
|
||
3ECB000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
1A1C000
|
heap
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
198F000
|
heap
|
page read and write
|
||
1A28000
|
heap
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3EA7000
|
trusted library allocation
|
page read and write
|
||
17A7000
|
heap
|
page read and write
|
||
19AB000
|
heap
|
page read and write
|
||
3EEE000
|
trusted library allocation
|
page read and write
|
||
3D8D000
|
stack
|
page read and write
|
||
1A15000
|
heap
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
1A3B000
|
heap
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
3ED9000
|
trusted library allocation
|
page read and write
|
||
3FFD000
|
trusted library allocation
|
page read and write
|
||
1A33000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3EB2000
|
trusted library allocation
|
page read and write
|
||
3EA1000
|
trusted library allocation
|
page read and write
|
There are 365 hidden memdumps, click here to show them.