Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\92s4OjHVFf.exe
|
"C:\Users\user\Desktop\92s4OjHVFf.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
towerxxuytwi.xyz
|
|||
contintnetksows.shop
|
|||
penetratedpoopp.xyz
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
potterryisiw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://foodypannyjsud.shop/api2
|
unknown
|
||
https://foodypannyjsud.shop/s
|
unknown
|
||
https://foodypannyjsud.shop/w
|
unknown
|
||
https://foodypannyjsud.shop/api:
|
unknown
|
||
https://foodypannyjsud.shop/jh4
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://foodypannyjsud.shop/raw
|
unknown
|
||
https://foodypannyjsud.shop/a
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://foodypannyjsud.shop/F9r
|
unknown
|
||
https://foodypannyjsud.shop/api
|
188.114.97.3
|
||
https://foodypannyjsud.shop/pir
|
unknown
|
||
https://foodypannyjsud.shop/piw
|
unknown
|
||
https://foodypannyjsud.shop:443/apiBrowser
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://foodypannyjsud.shop/s~
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://foodypannyjsud.shop/A
|
unknown
|
||
https://foodypannyjsud.shop/pie
|
unknown
|
||
https://foodypannyjsud.shop/pi
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://foodypannyjsud.shop/he
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://foodypannyjsud.shop/bm
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://foodypannyjsud.shop/obZ
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://foodypannyjsud.shop/ob
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://foodypannyjsud.shop/apili
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://foodypannyjsud.shop/apie
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://foodypannyjsud.shop/
|
unknown
|
||
https://foodypannyjsud.shop/apih
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://foodypannyjsud.shop/apiT
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://foodypannyjsud.shop/bu:
|
unknown
|
||
https://foodypannyjsud.shop/apiF
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 50 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
foodypannyjsud.shop
|
188.114.97.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
foodypannyjsud.shop
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CAD000
|
unkown
|
page readonly
|
||
C70000
|
unkown
|
page readonly
|
||
41D8000
|
trusted library allocation
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
45E2000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B82000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
1B14000
|
heap
|
page read and write
|
||
419F000
|
trusted library allocation
|
page read and write
|
||
41D8000
|
trusted library allocation
|
page read and write
|
||
1AD7000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page read and write
|
||
41DA000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
41C9000
|
trusted library allocation
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
4199000
|
trusted library allocation
|
page read and write
|
||
1B68000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B66000
|
heap
|
page read and write
|
||
41AB000
|
trusted library allocation
|
page read and write
|
||
41E1000
|
trusted library allocation
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
41B7000
|
trusted library allocation
|
page read and write
|
||
1584000
|
unkown
|
page readonly
|
||
1B77000
|
heap
|
page read and write
|
||
41AB000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
419F000
|
trusted library allocation
|
page read and write
|
||
1B7A000
|
heap
|
page read and write
|
||
36CD000
|
stack
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
41C0000
|
trusted library allocation
|
page read and write
|
||
41A4000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
1B56000
|
heap
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
41D3000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
4188000
|
trusted library allocation
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B66000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1AFD000
|
heap
|
page read and write
|
||
FA5000
|
unkown
|
page execute read
|
||
1B89000
|
heap
|
page read and write
|
||
1B7D000
|
heap
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
1AD7000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
420A000
|
trusted library allocation
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B61000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
41C9000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute read
|
||
1B66000
|
heap
|
page read and write
|
||
41EE000
|
trusted library allocation
|
page read and write
|
||
455A000
|
trusted library allocation
|
page read and write
|
||
4192000
|
trusted library allocation
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
41E3000
|
trusted library allocation
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
4198000
|
trusted library allocation
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
4199000
|
trusted library allocation
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B6D000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B5A000
|
heap
|
page read and write
|
||
4A5E000
|
trusted library allocation
|
page read and write
|
||
43F9000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1A57000
|
heap
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B6D000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
4186000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
1AF0000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
41B7000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B7D000
|
heap
|
page read and write
|
||
1B8F000
|
heap
|
page read and write
|
||
37ED000
|
stack
|
page read and write
|
||
4183000
|
trusted library allocation
|
page read and write
|
||
1B51000
|
heap
|
page read and write
|
||
41EC000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
41A7000
|
trusted library allocation
|
page read and write
|
||
41AF000
|
trusted library allocation
|
page read and write
|
||
41C8000
|
trusted library allocation
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
368D000
|
stack
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
41D8000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
41AF000
|
trusted library allocation
|
page read and write
|
||
406D000
|
stack
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41DE000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B81000
|
heap
|
page read and write
|
||
41B6000
|
trusted library allocation
|
page read and write
|
||
4369000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B82000
|
heap
|
page read and write
|
||
4180000
|
trusted library allocation
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
41AB000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
4187000
|
trusted library allocation
|
page read and write
|
||
1B75000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
41D2000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
1B51000
|
heap
|
page read and write
|
||
1AD7000
|
heap
|
page read and write
|
||
418F000
|
trusted library allocation
|
page read and write
|
||
1B66000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
41E5000
|
trusted library allocation
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41AB000
|
trusted library allocation
|
page read and write
|
||
169B000
|
stack
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B7B000
|
heap
|
page read and write
|
||
1AAA000
|
heap
|
page read and write
|
||
4186000
|
trusted library allocation
|
page read and write
|
||
41B6000
|
trusted library allocation
|
page read and write
|
||
1B98000
|
heap
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
41DC000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1AD2000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B62000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1A55000
|
heap
|
page read and write
|
||
4191000
|
trusted library allocation
|
page read and write
|
||
1B98000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41B8000
|
trusted library allocation
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
1B51000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1A00000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
4188000
|
trusted library allocation
|
page read and write
|
||
4188000
|
trusted library allocation
|
page read and write
|
||
1AEB000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41B3000
|
trusted library allocation
|
page read and write
|
||
41ED000
|
trusted library allocation
|
page read and write
|
||
1B62000
|
heap
|
page read and write
|
||
1B6E000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1AEB000
|
heap
|
page read and write
|
||
1B66000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
4281000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
4192000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
419A000
|
trusted library allocation
|
page read and write
|
||
1B51000
|
heap
|
page read and write
|
||
41B7000
|
trusted library allocation
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
1B8C000
|
heap
|
page read and write
|
||
1DAE000
|
stack
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
4198000
|
trusted library allocation
|
page read and write
|
||
1B6A000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41B0000
|
trusted library allocation
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41BB000
|
trusted library allocation
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
418F000
|
trusted library allocation
|
page read and write
|
||
1B7B000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
419F000
|
trusted library allocation
|
page read and write
|
||
179A000
|
stack
|
page read and write
|
||
1AEB000
|
heap
|
page read and write
|
||
4188000
|
trusted library allocation
|
page read and write
|
||
1584000
|
unkown
|
page readonly
|
||
1AEE000
|
heap
|
page read and write
|
||
419F000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1B6B000
|
heap
|
page read and write
|
||
41AF000
|
trusted library allocation
|
page read and write
|
||
41B8000
|
trusted library allocation
|
page read and write
|
||
3B80000
|
remote allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1AEB000
|
heap
|
page read and write
|
||
1EAE000
|
stack
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
41D6000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
unkown
|
page execute read
|
||
41B4000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
unkown
|
page write copy
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
41E1000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
3B80000
|
remote allocation
|
page read and write
|
||
1AD7000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
1B60000
|
heap
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
4198000
|
trusted library allocation
|
page read and write
|
||
4204000
|
trusted library allocation
|
page read and write
|
||
1B81000
|
heap
|
page read and write
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
41C8000
|
trusted library allocation
|
page read and write
|
||
1AD2000
|
heap
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
419F000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
419E000
|
trusted library allocation
|
page read and write
|
||
41AB000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B82000
|
heap
|
page read and write
|
||
428A000
|
trusted library allocation
|
page read and write
|
||
1B81000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
1AC7000
|
heap
|
page read and write
|
||
1B8C000
|
heap
|
page read and write
|
||
365C000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
1AAE000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
41EF000
|
trusted library allocation
|
page read and write
|
||
CC3000
|
unkown
|
page execute read
|
||
1B4A000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
419A000
|
trusted library allocation
|
page read and write
|
||
421D000
|
trusted library allocation
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
46F4000
|
trusted library allocation
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
41A0000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
4290000
|
trusted library allocation
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AFD000
|
heap
|
page read and write
|
||
1B68000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
4280000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
41BC000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
FA4000
|
unkown
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
4182000
|
trusted library allocation
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
1AF0000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
41C8000
|
trusted library allocation
|
page read and write
|
||
418B000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B99000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
4185000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
4361000
|
trusted library allocation
|
page read and write
|
||
1B6D000
|
heap
|
page read and write
|
||
3B80000
|
remote allocation
|
page read and write
|
||
1B7F000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B7E000
|
heap
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
41C6000
|
trusted library allocation
|
page read and write
|
||
1D6E000
|
stack
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
41B7000
|
trusted library allocation
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1AED000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
38ED000
|
stack
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B86000
|
heap
|
page read and write
|
||
1B57000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
41F1000
|
trusted library allocation
|
page read and write
|
||
1B7F000
|
heap
|
page read and write
|
||
41F0000
|
trusted library allocation
|
page read and write
|
||
1B51000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B6D000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1AEE000
|
heap
|
page read and write
|
||
1A9D000
|
stack
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
1B89000
|
heap
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
4359000
|
trusted library allocation
|
page read and write
|
||
1B8A000
|
heap
|
page read and write
|
||
41B9000
|
trusted library allocation
|
page read and write
|
||
41A9000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
1B4A000
|
heap
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1B77000
|
heap
|
page read and write
|
||
4188000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
418D000
|
trusted library allocation
|
page read and write
|
||
419D000
|
trusted library allocation
|
page read and write
|
There are 450 hidden memdumps, click here to show them.