Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
plaintediousidowsko.shop
|
|||
acceptabledcooeprs.shop
|
|||
zippyfinickysofwps.shop
|
|||
obsceneclassyjuwks.shop
|
|||
holicisticscrarws.shop
|
|||
boredimperissvieos.shop
|
|||
sweetsquarediaslw.shop
|
|||
miniaturefinerninewjs.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://acceptabledcooeprs.shop/api
|
104.21.59.156
|
||
https://acceptabledcooeprs.shop/apij
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://acceptabledcooeprs.shop/3
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://protobuf.dev/reference/go/faq#namespace-conflictMpohxHrXTsWUtcYRySvTtdvgYoOzPaTLHQkyDGHWUOSc
|
unknown
|
||
https://acceptabledcooeprs.shop/apiP
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://acceptabledcooeprs.shop/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
There are 30 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
acceptabledcooeprs.shop
|
104.21.59.156
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.59.156
|
acceptabledcooeprs.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000268000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
C00046E000
|
direct allocation
|
page read and write
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
4C3D000
|
trusted library allocation
|
page read and write
|
||
1B697F80000
|
heap
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
4C68000
|
trusted library allocation
|
page read and write
|
||
522C000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
1B6DD3E4000
|
direct allocation
|
page read and write
|
||
C000099000
|
direct allocation
|
page read and write
|
||
7FF6F6CF1000
|
unkown
|
page write copy
|
||
4C4C000
|
trusted library allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
C0003EE000
|
direct allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
7FF6F7064000
|
unkown
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C12000
|
trusted library allocation
|
page read and write
|
||
502C000
|
trusted library allocation
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
4C37000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
1B6980D4000
|
direct allocation
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
7FF6F6CF4000
|
unkown
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
4C4F000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
heap
|
page read and write
|
||
4C89000
|
trusted library allocation
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
4C1A000
|
trusted library allocation
|
page read and write
|
||
4C3F000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
1B698245000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
C0004E2000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
63A000
|
stack
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
3CB000
|
stack
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
4C91000
|
trusted library allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
4C17000
|
trusted library allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
C000420000
|
direct allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
1B6DD4F0000
|
direct allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
4C5E000
|
trusted library allocation
|
page read and write
|
||
1B6DD5A3000
|
direct allocation
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
4C47000
|
trusted library allocation
|
page read and write
|
||
7ED000
|
stack
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
4C66000
|
trusted library allocation
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
7FF6F70E7000
|
unkown
|
page readonly
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4C3B000
|
trusted library allocation
|
page read and write
|
||
4C44000
|
trusted library allocation
|
page read and write
|
||
9E257FF000
|
stack
|
page read and write
|
||
1B697EA0000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
9E25FFE000
|
stack
|
page read and write
|
||
4C71000
|
trusted library allocation
|
page read and write
|
||
C0000C1000
|
direct allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
7FF6F70D8000
|
unkown
|
page write copy
|
||
8B0000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
1B6DD3E0000
|
direct allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
C000049000
|
direct allocation
|
page read and write
|
||
7FF6F6CAD000
|
unkown
|
page write copy
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
7FF6F6CA9000
|
unkown
|
page read and write
|
||
C0003A0000
|
direct allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
F0D000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
8B7000
|
heap
|
page read and write
|
||
4C41000
|
trusted library allocation
|
page read and write
|
||
7FF6F6A01000
|
unkown
|
page execute read
|
||
1B698230000
|
direct allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
1B6DD500000
|
direct allocation
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
9E25BFF000
|
stack
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
4C2F000
|
trusted library allocation
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
7FF6F6CF0000
|
unkown
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
4C2A000
|
trusted library allocation
|
page read and write
|
||
7FF6F6CB0000
|
unkown
|
page read and write
|
||
C000023000
|
direct allocation
|
page read and write
|
||
4C4B000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
7FF6F7032000
|
unkown
|
page readonly
|
||
C000122000
|
direct allocation
|
page read and write
|
||
4C1F000
|
trusted library allocation
|
page read and write
|
||
9E255FC000
|
stack
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
4C5D000
|
trusted library allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
5729000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4C39000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
4C64000
|
trusted library allocation
|
page read and write
|
||
7FF6F6CDD000
|
unkown
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
1B6980D0000
|
direct allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
4C1D000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
7FF6F6A00000
|
unkown
|
page readonly
|
||
4DEF000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
1B6DD4B0000
|
direct allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C000412000
|
direct allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
4DBF000
|
trusted library allocation
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
1B6980A0000
|
heap
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
4E87000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
C000418000
|
direct allocation
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
7FF6F70D4000
|
unkown
|
page read and write
|
||
1B6DD363000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C000087000
|
direct allocation
|
page read and write
|
||
7FF6F6CEC000
|
unkown
|
page write copy
|
||
8E6000
|
heap
|
page read and write
|
||
C0001F4000
|
direct allocation
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
7FF6F6CAE000
|
unkown
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
F20000
|
remote allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
C000042000
|
direct allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
4D4F000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
7FF6F6CB1000
|
unkown
|
page write copy
|
||
ECD000
|
stack
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
9E25DFE000
|
stack
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
7FF6F7044000
|
unkown
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
1B6980D8000
|
direct allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
4C84000
|
trusted library allocation
|
page read and write
|
||
C000414000
|
direct allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
7FF6F6CDB000
|
unkown
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
4C12000
|
trusted library allocation
|
page read and write
|
||
C00041A000
|
direct allocation
|
page read and write
|
||
C00002D000
|
direct allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
7FF6F6CAF000
|
unkown
|
page write copy
|
||
8BB000
|
heap
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
4C17000
|
trusted library allocation
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
1B697F88000
|
heap
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
7FF6F70D8000
|
unkown
|
page write copy
|
||
4C15000
|
trusted library allocation
|
page read and write
|
||
C0003F8000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
1B6DD3A1000
|
direct allocation
|
page read and write
|
||
693000
|
remote allocation
|
page execute and read and write
|
||
8B9000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
7FF6F6CF6000
|
unkown
|
page readonly
|
||
7FF6F6CDC000
|
unkown
|
page write copy
|
||
C000076000
|
direct allocation
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
4C48000
|
trusted library allocation
|
page read and write
|
||
7FF6F6CA9000
|
unkown
|
page write copy
|
||
8E1000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
7FF6F6A00000
|
unkown
|
page readonly
|
||
8B9000
|
heap
|
page read and write
|
||
7FF6F70D4000
|
unkown
|
page write copy
|
||
8B4000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
4C36000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
C000410000
|
direct allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
4C31000
|
trusted library allocation
|
page read and write
|
||
7FF6F7032000
|
unkown
|
page readonly
|
||
8C7000
|
heap
|
page read and write
|
||
8B7000
|
heap
|
page read and write
|
||
7FF6F70CF000
|
unkown
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
C0003F0000
|
direct allocation
|
page read and write
|
||
7FF6F70D5000
|
unkown
|
page write copy
|
||
8DE000
|
heap
|
page read and write
|
||
4C7D000
|
trusted library allocation
|
page read and write
|
||
C00007C000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
9E261FF000
|
stack
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4C2E000
|
trusted library allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
1B6DD350000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
7FF6F6CDF000
|
unkown
|
page read and write
|
||
C0003F4000
|
direct allocation
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4C39000
|
trusted library allocation
|
page read and write
|
||
7FF6F6A01000
|
unkown
|
page execute read
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
C00041E000
|
direct allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
4C3F000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
4D6F000
|
trusted library allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
1B6DD550000
|
direct allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
461D000
|
stack
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
4C3B000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
7FF6F70E7000
|
unkown
|
page readonly
|
||
C000126000
|
direct allocation
|
page read and write
|
||
9E259FE000
|
stack
|
page read and write
|
||
7FF6F6CF6000
|
unkown
|
page readonly
|
||
1B6DD360000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
7FF6F6CDE000
|
unkown
|
page write copy
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
1B698080000
|
heap
|
page read and write
|
||
1B698240000
|
heap
|
page read and write
|
||
4C37000
|
trusted library allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C000641000
|
direct allocation
|
page read and write
|
||
7FF6F705D000
|
unkown
|
page read and write
|
||
8B1000
|
heap
|
page read and write
|
||
50B1000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
trusted library allocation
|
page read and write
|
||
4DF7000
|
trusted library allocation
|
page read and write
|
||
640000
|
remote allocation
|
page execute and read and write
|
||
7FF6F70CB000
|
unkown
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
C00008B000
|
direct allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
4D37000
|
trusted library allocation
|
page read and write
|
||
4C58000
|
trusted library allocation
|
page read and write
|
||
4C47000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
There are 413 hidden memdumps, click here to show them.