Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
alcojoldwograpciw.shop
|
|||
incredibleextedwj.shop
|
|||
liabilitynighstjsko.shop
|
|||
https://shatterbreathepsw.shop/api
|
104.21.95.19
|
||
https://management.azure.comINVALID
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://shatterbreathepsw.shop:443/api-release/key4.dbPK
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://shatterbreathepsw.shop:443/api
|
unknown
|
||
https://shatterbreathepsw.shop/w6
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://shatterbreathepsw.shop/apii
|
unknown
|
||
https://shatterbreathepsw.shop:443/apirosoft
|
unknown
|
||
http://.css
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://shatterbreathepsw.shop/0
|
unknown
|
||
https://shatterbreathepsw.shop/apiar
|
unknown
|
||
https://shatterbreathepsw.shop/apihort
|
unknown
|
||
https://shatterbreathepsw.shop/&6
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://manage.windowsazure.us/publishsettings/indexMaximum
|
unknown
|
||
https://management.chinacloudapi.cntoo
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://shatterbreathepsw.shop/apiT
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://datalake.azure.net/https://api.loganalytics.iohttps://graph.microsoft.us/https://api.loganal
|
unknown
|
||
https://manage.windowsazure.com/publishsettings/indexnon-CONNECT
|
unknown
|
||
https://shatterbreathepsw.shop/D7
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://shatterbreathepsw.shop/?6a
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://shatterbreathepsw.shop/~6
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://shatterbreathepsw.shop/y7
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://gallery.azure.com/https://graph.windows.net/mariadb.database.azure.comhttps://storage.azure.
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://vault.azure.net/mysql.database.azure.comhttps://cosmos.azure.comjson:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://management.core.usgovcloudapi.net/https://dev.azuresynapse.usgovcloudapi.netbad
|
unknown
|
||
https://shatterbreathepsw.shop/
|
unknown
|
||
https://database.usgovcloudapi.net/unsupported
|
unknown
|
||
https://shatterbreathepsw.shop/apizen
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://protobuf.dev/reference/go/faq#namespace-conflictLZMA
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://manage.chinacloudapi.com/publishsettings/indexhttps://manage.microsoftazure.de/publishsettin
|
unknown
|
||
https://management.azure.com/https://managedhsm.azure.net/https://servicebus.azure.net/https://datab
|
unknown
|
There are 54 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shatterbreathepsw.shop
|
104.21.95.19
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.19
|
shatterbreathepsw.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C00047C000
|
direct allocation
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
2F3F000
|
heap
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
trusted library allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
2F03000
|
heap
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
2F07000
|
heap
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
2F07000
|
heap
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
2CF0000
|
remote allocation
|
page execute and read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
7FF679C38000
|
unkown
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
52D9000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
2E58000
|
heap
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
2F2B000
|
heap
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
2F1F000
|
heap
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
C0000FE000
|
direct allocation
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
remote allocation
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
2F3E000
|
heap
|
page read and write
|
||
7FF679C31000
|
unkown
|
page read and write
|
||
7FF679BB7000
|
unkown
|
page write copy
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
1E6D4DD0000
|
heap
|
page read and write
|
||
C000190000
|
direct allocation
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
5B64000
|
trusted library allocation
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
C0001CA000
|
direct allocation
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
5291000
|
trusted library allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
7FF67A12F000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
AD1A5FF000
|
stack
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
1E6D5039000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
2F49000
|
heap
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
7FF679BBE000
|
unkown
|
page read and write
|
||
7FF67A133000
|
unkown
|
page write copy
|
||
7FF679C1B000
|
unkown
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
52C1000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
AD1A3FE000
|
stack
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
C000057000
|
direct allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
7FF679C2E000
|
unkown
|
page write copy
|
||
C000112000
|
direct allocation
|
page read and write
|
||
1E6D4ED8000
|
direct allocation
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
5286000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
heap
|
page read and write
|
||
C0002EC000
|
direct allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
C0000FA000
|
direct allocation
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
4C3D000
|
stack
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
5291000
|
trusted library allocation
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
2E76000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
2F05000
|
heap
|
page read and write
|
||
2F2B000
|
heap
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
514D000
|
stack
|
page read and write
|
||
AD19FFE000
|
stack
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
2F0F000
|
heap
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
C0001C0000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
529F000
|
trusted library allocation
|
page read and write
|
||
7FF67A130000
|
unkown
|
page write copy
|
||
2F05000
|
heap
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
2F3F000
|
heap
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
trusted library allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
1E6D4D80000
|
heap
|
page read and write
|
||
1E6D5020000
|
direct allocation
|
page read and write
|
||
C0001D7000
|
direct allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
1E6D5030000
|
direct allocation
|
page read and write
|
||
7FF679810000
|
unkown
|
page readonly
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
7FF67A098000
|
unkown
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
2E76000
|
heap
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
1E6D4D60000
|
heap
|
page read and write
|
||
2F4B000
|
heap
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
52ED000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
heap
|
page read and write
|
||
C000165000
|
direct allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
2F46000
|
heap
|
page read and write
|
||
C0001C2000
|
direct allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
4B3D000
|
stack
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
7FF679C3A000
|
unkown
|
page readonly
|
||
C000086000
|
direct allocation
|
page read and write
|
||
AD19DFF000
|
stack
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
7FF679BC2000
|
unkown
|
page write copy
|
||
2F1B000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
C00042C000
|
direct allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
C00042A000
|
direct allocation
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
C0000C1000
|
direct allocation
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
1E6D50C0000
|
heap
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
7FF679811000
|
unkown
|
page execute read
|
||
2E82000
|
heap
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
52E1000
|
trusted library allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
5267000
|
trusted library allocation
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
7FF679C34000
|
unkown
|
page write copy
|
||
52A8000
|
trusted library allocation
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
AD197FF000
|
stack
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
7FF679C18000
|
unkown
|
page read and write
|
||
1E6D5045000
|
direct allocation
|
page read and write
|
||
1E6FB970000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
2F3E000
|
heap
|
page read and write
|
||
C0005AB000
|
direct allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
5291000
|
trusted library allocation
|
page read and write
|
||
7FF679BBC000
|
unkown
|
page write copy
|
||
C000052000
|
direct allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
7FF67A133000
|
unkown
|
page write copy
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
7FF67A127000
|
unkown
|
page read and write
|
||
C0001D1000
|
direct allocation
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
7FF67A122000
|
unkown
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
7FF679BC1000
|
unkown
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
AD195FD000
|
stack
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
7FF67A12F000
|
unkown
|
page write copy
|
||
2F03000
|
heap
|
page read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2D97000
|
heap
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
2F11000
|
heap
|
page read and write
|
||
7FF679C3A000
|
unkown
|
page readonly
|
||
C79000
|
stack
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
2F11000
|
heap
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
1E6D4DD8000
|
heap
|
page read and write
|
||
7FF679BB7000
|
unkown
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
4C60000
|
remote allocation
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
C000480000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
1E6FBA50000
|
direct allocation
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
52AD000
|
trusted library allocation
|
page read and write
|
||
2F13000
|
heap
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
2F17000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
528A000
|
trusted library allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
heap
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
heap
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
2F17000
|
heap
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
1E6D4C80000
|
heap
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
C0001D5000
|
direct allocation
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
C3B000
|
stack
|
page read and write
|
||
553C000
|
trusted library allocation
|
page read and write
|
||
C00040A000
|
direct allocation
|
page read and write
|
||
7FF67A138000
|
unkown
|
page readonly
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
C000167000
|
direct allocation
|
page read and write
|
||
2F0C000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
2F0B000
|
heap
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
AD199FE000
|
stack
|
page read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
4C60000
|
remote allocation
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
C0005AB000
|
direct allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
2F3B000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
C000196000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
2F16000
|
heap
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
526C000
|
trusted library allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
7FF679BBF000
|
unkown
|
page write copy
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
52B4000
|
trusted library allocation
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
1E6FBAA0000
|
direct allocation
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
C000031000
|
direct allocation
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
2F11000
|
heap
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
C000326000
|
direct allocation
|
page read and write
|
||
52AE000
|
trusted library allocation
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
7FF679C1A000
|
unkown
|
page write copy
|
||
1E6D50C5000
|
heap
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
1E6D4EDD000
|
direct allocation
|
page read and write
|
||
C0001C4000
|
direct allocation
|
page read and write
|
||
2F49000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
1E6FBB00000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
5267000
|
trusted library allocation
|
page read and write
|
||
52CD000
|
trusted library allocation
|
page read and write
|
||
1E6FBAF5000
|
direct allocation
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
526A000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
1E6D5010000
|
direct allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
49FD000
|
stack
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
5361000
|
heap
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
7FF679C14000
|
unkown
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
C0001AA000
|
direct allocation
|
page read and write
|
||
2F05000
|
heap
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
2F01000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
2F01000
|
heap
|
page read and write
|
||
7FF67A138000
|
unkown
|
page readonly
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
1E6D4ED0000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
4AFD000
|
stack
|
page read and write
|
||
52CD000
|
trusted library allocation
|
page read and write
|
||
C0001A8000
|
direct allocation
|
page read and write
|
||
C000024000
|
direct allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
527F000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
7FF67A0B3000
|
unkown
|
page read and write
|
||
52AE000
|
trusted library allocation
|
page read and write
|
||
1E6D5033000
|
direct allocation
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
2F09000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
AD1A1FE000
|
stack
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
2F41000
|
heap
|
page read and write
|
||
2F11000
|
heap
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
2E7B000
|
heap
|
page read and write
|
||
1E6FBA50000
|
direct allocation
|
page read and write
|
||
7FF67A0BA000
|
unkown
|
page read and write
|
||
2F11000
|
heap
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
528C000
|
trusted library allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
2EAE000
|
heap
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
2F0F000
|
heap
|
page read and write
|
||
5537000
|
trusted library allocation
|
page read and write
|
||
7FF679C17000
|
unkown
|
page write copy
|
||
7FF67A080000
|
unkown
|
page readonly
|
||
7FF679810000
|
unkown
|
page readonly
|
||
1E6D4ED4000
|
direct allocation
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
7FF679811000
|
unkown
|
page execute read
|
||
2F32000
|
heap
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
2D45000
|
remote allocation
|
page execute and read and write
|
||
AD19BFC000
|
stack
|
page read and write
|
||
2F0E000
|
heap
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
7FF67A080000
|
unkown
|
page readonly
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
2F3A000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
5267000
|
trusted library allocation
|
page read and write
|
There are 503 hidden memdumps, click here to show them.