Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
plaintediousidowsko.shop
|
|||
acceptabledcooeprs.shop
|
|||
zippyfinickysofwps.shop
|
|||
https://greetclassifytalk.shop/api
|
104.21.51.78
|
||
obsceneclassyjuwks.shop
|
|||
holicisticscrarws.shop
|
|||
greetclassifytalk.shop
|
|||
boredimperissvieos.shop
|
|||
sweetsquarediaslw.shop
|
|||
miniaturefinerninewjs.shop
|
|||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8z
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.sandbox.midtrans.comtimestamp
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.midtrans.cominvalid
|
unknown
|
||
https://greetclassifytalk.shop/l
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://protobuf.dev/reference/go/faq#
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://greetclassifytalk.shop/apiE=
|
unknown
|
||
https://greetclassifytalk.shop/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://protobuf.dev/reference/go/faq#namespace-conflictMpohxHrXTsWUtcYRySvTtdvgYoOzPaTLHQkyDGHWUOSc
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://fastcopy.jpF
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://greetclassifytalk.shop/apio
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://greetclassifytalk.shop/K
|
unknown
|
||
https://fastcopy.jp
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://greetclassifytalk.shop/apiu
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://greetclassifytalk.shop:443/api6
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
greetclassifytalk.shop
|
104.21.51.78
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.51.78
|
greetclassifytalk.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C839B22000
|
direct allocation
|
page read and write
|
||
53B9000
|
trusted library allocation
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
7FF663222000
|
unkown
|
page write copy
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
1C839A90000
|
heap
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
4A209FF000
|
stack
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C0004DF000
|
direct allocation
|
page read and write
|
||
5532000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
1C839ACB000
|
direct allocation
|
page read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
C000148000
|
direct allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
1C839B58000
|
heap
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
3087000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
7FF663228000
|
unkown
|
page write copy
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
7FF663679000
|
unkown
|
page write copy
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
2F49000
|
heap
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
7FF663675000
|
unkown
|
page write copy
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
B40000
|
remote allocation
|
page execute and read and write
|
||
5597000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
1C839AC0000
|
direct allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
1C839AC9000
|
direct allocation
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
B09000
|
stack
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
7FF66325E000
|
unkown
|
page write copy
|
||
2F40000
|
heap
|
page read and write
|
||
5421000
|
heap
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
5347000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
521F000
|
stack
|
page read and write
|
||
7FF663676000
|
unkown
|
page write copy
|
||
2F61000
|
heap
|
page read and write
|
||
4A203FE000
|
stack
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
1C839B30000
|
direct allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
C0000F8000
|
direct allocation
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
7FF663222000
|
unkown
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
7FF663225000
|
unkown
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
540F000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
2FCA000
|
heap
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
4A1FBFD000
|
stack
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C0000FE000
|
direct allocation
|
page read and write
|
||
1C839AC4000
|
direct allocation
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
4A1FDFE000
|
stack
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
C000366000
|
direct allocation
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
C000462000
|
direct allocation
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
7FF662F31000
|
unkown
|
page execute read
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
C000029000
|
direct allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
heap
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
4A1FFFE000
|
stack
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
1C839D70000
|
direct allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
C0001FC000
|
direct allocation
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
C0004D4000
|
direct allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
4A201FC000
|
stack
|
page read and write
|
||
2F00000
|
remote allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
7FF66366B000
|
unkown
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
53C1000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
5559000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
B97000
|
remote allocation
|
page execute and read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
1C87F030000
|
direct allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
1C87F087000
|
direct allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
2F65000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
535F000
|
trusted library allocation
|
page read and write
|
||
C000063000
|
direct allocation
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
C00053F000
|
direct allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
3085000
|
heap
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
7FF663262000
|
unkown
|
page readonly
|
||
5322000
|
trusted library allocation
|
page read and write
|
||
2FC4000
|
heap
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
1C87EE99000
|
direct allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
1C87EE94000
|
direct allocation
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
2FBA000
|
heap
|
page read and write
|
||
2FCA000
|
heap
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
1C87EED0000
|
direct allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
1C839A70000
|
heap
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
1C839D80000
|
heap
|
page read and write
|
||
5990000
|
heap
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
7FF66368E000
|
unkown
|
page readonly
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
remote allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
2F55000
|
heap
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
7FF663675000
|
unkown
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
1C87EFF1000
|
direct allocation
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
7FF663226000
|
unkown
|
page write copy
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
5327000
|
trusted library allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
7FF663260000
|
unkown
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
1C87EE90000
|
direct allocation
|
page read and write
|
||
7FF663616000
|
unkown
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
2F65000
|
heap
|
page read and write
|
||
1C839B40000
|
direct allocation
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
7FF662F31000
|
unkown
|
page execute read
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
7FF662F30000
|
unkown
|
page readonly
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
7FF66368E000
|
unkown
|
page readonly
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
63B4000
|
trusted library allocation
|
page read and write
|
||
5528000
|
trusted library allocation
|
page read and write
|
||
2F65000
|
heap
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
7FF663670000
|
unkown
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
4A205FF000
|
stack
|
page read and write
|
||
1C87F090000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
7FF663644000
|
unkown
|
page read and write
|
||
C000480000
|
direct allocation
|
page read and write
|
||
7FF663224000
|
unkown
|
page write copy
|
||
2FC1000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
1C87F090000
|
direct allocation
|
page read and write
|
||
1C839990000
|
heap
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
7FF66363D000
|
unkown
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
5325000
|
trusted library allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
2F5F000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
1C839B20000
|
direct allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
2F6C000
|
heap
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
7FF663679000
|
unkown
|
page write copy
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
5327000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
C00045D000
|
direct allocation
|
page read and write
|
||
5337000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
heap
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
4DDD000
|
stack
|
page read and write
|
||
2F5F000
|
heap
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
stack
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
2FB2000
|
heap
|
page read and write
|
||
7FF662F30000
|
unkown
|
page readonly
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
1C839D50000
|
direct allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
remote allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
7FF663227000
|
unkown
|
page read and write
|
||
1C839B50000
|
heap
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C000061000
|
direct allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
4C3D000
|
stack
|
page read and write
|
||
7FF663262000
|
unkown
|
page readonly
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
5EA2000
|
trusted library allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
C000454000
|
direct allocation
|
page read and write
|
||
53D9000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
4A207FE000
|
stack
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
7FF66324E000
|
unkown
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
C0000FA000
|
direct allocation
|
page read and write
|
||
C000069000
|
direct allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
C0000EE000
|
direct allocation
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
538F000
|
trusted library allocation
|
page read and write
|
||
1C87F0D0000
|
direct allocation
|
page read and write
|
||
1C839D85000
|
heap
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
5322000
|
trusted library allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C00005F000
|
direct allocation
|
page read and write
|
||
2F28000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
5383000
|
trusted library allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
There are 467 hidden memdumps, click here to show them.