Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
plaintediousidowsko.shop
|
|||
acceptabledcooeprs.shop
|
|||
zippyfinickysofwps.shop
|
|||
obsceneclassyjuwks.shop
|
|||
stiffraspyofkwsl.shop
|
|||
holicisticscrarws.shop
|
|||
boredimperissvieos.shop
|
|||
sweetsquarediaslw.shop
|
|||
miniaturefinerninewjs.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://stiffraspyofkwsl.shop/)
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://stiffraspyofkwsl.shop/
|
unknown
|
||
https://stiffraspyofkwsl.shop/api
|
172.67.189.159
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://stiffraspyofkwsl.shop/l
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://stiffraspyofkwsl.shop/-
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://stiffraspyofkwsl.shop/z
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://stiffraspyofkwsl.shop/G
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://stiffraspyofkwsl.shop/apibu4
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://stiffraspyofkwsl.shop/D
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://stiffraspyofkwsl.shop/O
|
unknown
|
||
https://imp.mt48.net/static?id=
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://stiffraspyofkwsl.shop/U
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
stiffraspyofkwsl.shop
|
172.67.189.159
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.189.159
|
stiffraspyofkwsl.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C00027C000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C0004DB000
|
direct allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
4B76000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
AE0000
|
remote allocation
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4B28000
|
trusted library allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
C000504000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
7FF6152FA000
|
unkown
|
page readonly
|
||
7FF6152B1000
|
unkown
|
page write copy
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
AE0000
|
remote allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
4B92000
|
trusted library allocation
|
page read and write
|
||
4CC2000
|
trusted library allocation
|
page read and write
|
||
882000
|
heap
|
page read and write
|
||
309000
|
stack
|
page read and write
|
||
4B1A000
|
trusted library allocation
|
page read and write
|
||
4B83000
|
trusted library allocation
|
page read and write
|
||
19546AE0000
|
direct allocation
|
page read and write
|
||
195017A0000
|
direct allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
7FF615041000
|
unkown
|
page execute read
|
||
C000140000
|
direct allocation
|
page read and write
|
||
7FF615665000
|
unkown
|
page readonly
|
||
912000
|
heap
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
4CEA000
|
trusted library allocation
|
page read and write
|
||
55AA7FF000
|
stack
|
page read and write
|
||
C000394000
|
direct allocation
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
C0004EC000
|
direct allocation
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
4B61000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
7FF61564C000
|
unkown
|
page write copy
|
||
4B7F000
|
trusted library allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C000504000
|
direct allocation
|
page read and write
|
||
4B41000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
7FF615665000
|
unkown
|
page readonly
|
||
3E0000
|
heap
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
195018C0000
|
heap
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
4B56000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
heap
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
C000500000
|
direct allocation
|
page read and write
|
||
340000
|
remote allocation
|
page execute and read and write
|
||
884000
|
heap
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
19501670000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
4B36000
|
trusted library allocation
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
4B3F000
|
trusted library allocation
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
C0004FF000
|
direct allocation
|
page read and write
|
||
C0004D7000
|
direct allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
4B58000
|
trusted library allocation
|
page read and write
|
||
4B47000
|
trusted library allocation
|
page read and write
|
||
19501840000
|
direct allocation
|
page read and write
|
||
19546C70000
|
direct allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
C0004F2000
|
direct allocation
|
page read and write
|
||
C0004F2000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
7FF6152E6000
|
unkown
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
C0004D7000
|
direct allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
7FF6152F8000
|
unkown
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
4B17000
|
trusted library allocation
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
4B37000
|
trusted library allocation
|
page read and write
|
||
C0004EE000
|
direct allocation
|
page read and write
|
||
431D000
|
stack
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4B7F000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C00007C000
|
direct allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
2CB000
|
stack
|
page read and write
|
||
4B3A000
|
trusted library allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
19546AD3000
|
direct allocation
|
page read and write
|
||
7FF615650000
|
unkown
|
page write copy
|
||
C0004EE000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
7FF615040000
|
unkown
|
page readonly
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
5A8C000
|
trusted library allocation
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
4B3D000
|
trusted library allocation
|
page read and write
|
||
4B47000
|
trusted library allocation
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
7FF6152FA000
|
unkown
|
page readonly
|
||
8E5000
|
heap
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
4B36000
|
trusted library allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
4B16000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4B47000
|
trusted library allocation
|
page read and write
|
||
1950188F000
|
direct allocation
|
page read and write
|
||
4B56000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
195017A4000
|
direct allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
19501880000
|
direct allocation
|
page read and write
|
||
91C000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4B7F000
|
trusted library allocation
|
page read and write
|
||
5578000
|
trusted library allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
4B15000
|
trusted library allocation
|
page read and write
|
||
397000
|
remote allocation
|
page execute and read and write
|
||
C0004F6000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
4B5E000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
4B3F000
|
trusted library allocation
|
page read and write
|
||
7FF615040000
|
unkown
|
page readonly
|
||
8ED000
|
heap
|
page read and write
|
||
195017A9000
|
direct allocation
|
page read and write
|
||
19501570000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4B44000
|
trusted library allocation
|
page read and write
|
||
7FF61560E000
|
unkown
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
195018C5000
|
heap
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
8E9000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
55A9BFC000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
931000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
8A3000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
4B89000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
C0004DD000
|
direct allocation
|
page read and write
|
||
4B49000
|
trusted library allocation
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
55AA3FF000
|
stack
|
page read and write
|
||
19501804000
|
direct allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
55A9DFE000
|
stack
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
8E9000
|
heap
|
page read and write
|
||
C000506000
|
direct allocation
|
page read and write
|
||
C0005BF000
|
direct allocation
|
page read and write
|
||
92F000
|
heap
|
page read and write
|
||
19501770000
|
heap
|
page read and write
|
||
19546C10000
|
direct allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
C0004F6000
|
direct allocation
|
page read and write
|
||
7FF6152B6000
|
unkown
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
7FF61564C000
|
unkown
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
7FF615650000
|
unkown
|
page write copy
|
||
C000158000
|
direct allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
4B5E000
|
trusted library allocation
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
4B17000
|
trusted library allocation
|
page read and write
|
||
55AA1FE000
|
stack
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
4B52000
|
trusted library allocation
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
7FF6155E7000
|
unkown
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
4B4F000
|
trusted library allocation
|
page read and write
|
||
7FF6152F6000
|
unkown
|
page write copy
|
||
4B92000
|
trusted library allocation
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
7FF61563C000
|
unkown
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
19501800000
|
direct allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
C0001C8000
|
direct allocation
|
page read and write
|
||
7FF6152B5000
|
unkown
|
page write copy
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
7FF615041000
|
unkown
|
page execute read
|
||
4A0F000
|
stack
|
page read and write
|
||
4F23000
|
trusted library allocation
|
page read and write
|
||
7FF6152E4000
|
unkown
|
page read and write
|
||
19546CB0000
|
direct allocation
|
page read and write
|
||
4EEF000
|
stack
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
7FF6152B7000
|
unkown
|
page write copy
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
19546AF0000
|
direct allocation
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
19501810000
|
direct allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
4B4A000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
44CC000
|
stack
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
7FF61564D000
|
unkown
|
page write copy
|
||
4B71000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
4B4B000
|
trusted library allocation
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
7FF6152E5000
|
unkown
|
page write copy
|
||
8EA000
|
heap
|
page read and write
|
||
7FF6152B1000
|
unkown
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
C0004E4000
|
direct allocation
|
page read and write
|
||
19501650000
|
heap
|
page read and write
|
||
7FF6152F4000
|
unkown
|
page read and write
|
||
4B5E000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
4CF2000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
4B47000
|
trusted library allocation
|
page read and write
|
||
4B56000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4B63000
|
trusted library allocation
|
page read and write
|
||
19546C67000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
19501678000
|
heap
|
page read and write
|
||
4B18000
|
trusted library allocation
|
page read and write
|
||
C00050A000
|
direct allocation
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
C0004DB000
|
direct allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
5073000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
45CD000
|
stack
|
page read and write
|
||
AE0000
|
remote allocation
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
C0004EA000
|
direct allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
4C72000
|
trusted library allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
19501820000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
7FF615640000
|
unkown
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
912000
|
heap
|
page read and write
|
||
55AA5FE000
|
stack
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
4B3B000
|
trusted library allocation
|
page read and write
|
||
C0004DE000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
4B3B000
|
trusted library allocation
|
page read and write
|
||
7FF615614000
|
unkown
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
C000506000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
C00004C000
|
direct allocation
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
C0004DD000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page read and write
|
||
19501830000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
7FF6152F2000
|
unkown
|
page write copy
|
||
C0004EA000
|
direct allocation
|
page read and write
|
||
4B91000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
4B1D000
|
trusted library allocation
|
page read and write
|
||
7FF6152B9000
|
unkown
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
4C1B000
|
trusted library allocation
|
page read and write
|
||
C00050A000
|
direct allocation
|
page read and write
|
||
4B11000
|
trusted library allocation
|
page read and write
|
||
C0004EC000
|
direct allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
4B92000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
trusted library allocation
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
19546C70000
|
direct allocation
|
page read and write
|
||
55A9FFE000
|
stack
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4B5D000
|
trusted library allocation
|
page read and write
|
||
C0004CC000
|
direct allocation
|
page read and write
|
||
4B2F000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
4B14000
|
trusted library allocation
|
page read and write
|
||
7FF6152BA000
|
unkown
|
page write copy
|
||
1950188D000
|
direct allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
There are 481 hidden memdumps, click here to show them.