Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.24311.29797.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.24311.29797.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
penetratedpoopp.xyz
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
willingyhollowsk.shop
|
|||
towerxxuytwi.xyz
|
|||
https://potterryisiw.shop/api
|
188.114.96.3
|
||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
contintnetksows.shop
|
|||
potterryisiw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://potterryisiw.shop/l
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://potterryisiw.shop/s.j
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://potterryisiw.shop/5
|
unknown
|
||
https://potterryisiw.shop/api9
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://potterryisiw.shop/apip
|
unknown
|
||
https://github.com/gabomdq/SDL_GameControllerDB
|
unknown
|
||
https://potterryisiw.shop/apit
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://potterryisiw.shop/L
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://potterryisiw.shop/apiRF2
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://potterryisiw.shop/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://potterryisiw.shop/Ua3
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
potterryisiw.shop
|
188.114.96.3
|
||
willingyhollowsk.shop
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
potterryisiw.shop
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000604000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
C000AF0000
|
direct allocation
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C0007E0000
|
direct allocation
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1845B279000
|
direct allocation
|
page read and write
|
||
C000A70000
|
direct allocation
|
page read and write
|
||
C000602000
|
direct allocation
|
page read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
4BFF000
|
trusted library allocation
|
page read and write
|
||
4BDA000
|
trusted library allocation
|
page read and write
|
||
2A22000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
C000990000
|
direct allocation
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
C00079C000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
C0009D0000
|
direct allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
4C1F000
|
trusted library allocation
|
page read and write
|
||
C000489000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
29C0000
|
remote allocation
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4BD5000
|
trusted library allocation
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
trusted library allocation
|
page read and write
|
||
4C5E000
|
trusted library allocation
|
page read and write
|
||
1845B0A9000
|
heap
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
2A06000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
1847FE5E000
|
direct allocation
|
page read and write
|
||
4C06000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
C0005F0000
|
direct allocation
|
page read and write
|
||
2ACD000
|
heap
|
page read and write
|
||
C0005B6000
|
direct allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
1847FE0F000
|
direct allocation
|
page read and write
|
||
C000588000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
C00058E000
|
direct allocation
|
page read and write
|
||
44BD000
|
stack
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
2AC5000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
C000B30000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
4C32000
|
trusted library allocation
|
page read and write
|
||
2A8A000
|
heap
|
page read and write
|
||
4C01000
|
trusted library allocation
|
page read and write
|
||
C000BB4000
|
direct allocation
|
page read and write
|
||
C0005D8000
|
direct allocation
|
page read and write
|
||
2A85000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000426000
|
direct allocation
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
2A8A000
|
heap
|
page read and write
|
||
C000AE0000
|
direct allocation
|
page read and write
|
||
7FF6168BA000
|
unkown
|
page read and write
|
||
C0009A0000
|
direct allocation
|
page read and write
|
||
C000582000
|
direct allocation
|
page read and write
|
||
1847FE30000
|
direct allocation
|
page read and write
|
||
2ABD000
|
heap
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
2ACA000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
25C5000
|
heap
|
page read and write
|
||
C0007B0000
|
direct allocation
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
7FF616160000
|
unkown
|
page readonly
|
||
C000A40000
|
direct allocation
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
C000600000
|
direct allocation
|
page read and write
|
||
1845B2F0000
|
direct allocation
|
page read and write
|
||
18422360000
|
direct allocation
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
C0002C6000
|
direct allocation
|
page read and write
|
||
1845B330000
|
direct allocation
|
page read and write
|
||
C0005B6000
|
direct allocation
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
C000B60000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
1845B030000
|
heap
|
page read and write
|
||
7FF61649E000
|
unkown
|
page readonly
|
||
C000A30000
|
direct allocation
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
1847FE4B000
|
direct allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
C000C00000
|
direct allocation
|
page read and write
|
||
4BFD000
|
trusted library allocation
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
4BE9000
|
trusted library allocation
|
page read and write
|
||
1845B020000
|
heap
|
page read and write
|
||
C000B40000
|
direct allocation
|
page read and write
|
||
4BF7000
|
trusted library allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4CE2000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
218F5FF000
|
stack
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
2AC5000
|
heap
|
page read and write
|
||
18422390000
|
direct allocation
|
page read and write
|
||
2A3D000
|
heap
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
4BDD000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
C0005A4000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
C0005DE000
|
direct allocation
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
C000A10000
|
direct allocation
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
C00078C000
|
direct allocation
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
1845B0B3000
|
heap
|
page read and write
|
||
7FF61649A000
|
unkown
|
page write copy
|
||
2AC6000
|
heap
|
page read and write
|
||
C000BD0000
|
direct allocation
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
218F1FD000
|
stack
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
18422320000
|
direct allocation
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
C000584000
|
direct allocation
|
page read and write
|
||
C000592000
|
direct allocation
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
C000424000
|
direct allocation
|
page read and write
|
||
2A3C000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
184222B0000
|
direct allocation
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
C00058A000
|
direct allocation
|
page read and write
|
||
2A94000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
C0004D8000
|
direct allocation
|
page read and write
|
||
1845B31C000
|
direct allocation
|
page read and write
|
||
2AAD000
|
heap
|
page read and write
|
||
4BF8000
|
trusted library allocation
|
page read and write
|
||
C001000000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
C000790000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
C000B50000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C0005E6000
|
direct allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
2ADE000
|
heap
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
2AAD000
|
heap
|
page read and write
|
||
2A92000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C0005F8000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
1845B2B0000
|
direct allocation
|
page read and write
|
||
4C07000
|
trusted library allocation
|
page read and write
|
||
C000483000
|
direct allocation
|
page read and write
|
||
2A0C000
|
heap
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
7FF61649C000
|
unkown
|
page read and write
|
||
4C67000
|
trusted library allocation
|
page read and write
|
||
1847FF70000
|
heap
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
7FF6163DE000
|
unkown
|
page write copy
|
||
C0005E0000
|
direct allocation
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
2A3D000
|
heap
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
C000804000
|
direct allocation
|
page read and write
|
||
4BD7000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4BEE000
|
trusted library allocation
|
page read and write
|
||
4C32000
|
trusted library allocation
|
page read and write
|
||
4C06000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
heap
|
page read and write
|
||
2A24000
|
heap
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
C000592000
|
direct allocation
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C0009C0000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
C000584000
|
direct allocation
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
7FF616161000
|
unkown
|
page execute read
|
||
C0005E0000
|
direct allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
2A3D000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
C000538000
|
direct allocation
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C000AD0000
|
direct allocation
|
page read and write
|
||
4C3E000
|
trusted library allocation
|
page read and write
|
||
7FF616160000
|
unkown
|
page readonly
|
||
4C07000
|
trusted library allocation
|
page read and write
|
||
1845B2D0000
|
direct allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
C0005F0000
|
direct allocation
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1845B2FF000
|
direct allocation
|
page read and write
|
||
C000930000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
7FF6163D7000
|
unkown
|
page read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
C0005DC000
|
direct allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
7FF6163E0000
|
unkown
|
page write copy
|
||
2AAC000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
C000BC0000
|
direct allocation
|
page read and write
|
||
4C07000
|
trusted library allocation
|
page read and write
|
||
C0005B8000
|
direct allocation
|
page read and write
|
||
2A07000
|
heap
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
7FF61649E000
|
unkown
|
page readonly
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
C0004CE000
|
direct allocation
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
heap
|
page read and write
|
||
C000554000
|
direct allocation
|
page read and write
|
||
C000558000
|
direct allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
4CDC000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
1847FE1C000
|
direct allocation
|
page read and write
|
||
C0005E6000
|
direct allocation
|
page read and write
|
||
7FF6168BA000
|
unkown
|
page write copy
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
7FF616485000
|
unkown
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
heap
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
C000940000
|
direct allocation
|
page read and write
|
||
C0009B0000
|
direct allocation
|
page read and write
|
||
C0007C0000
|
direct allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C000B00000
|
direct allocation
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
C0005FC000
|
direct allocation
|
page read and write
|
||
C000B80000
|
direct allocation
|
page read and write
|
||
C00004C000
|
direct allocation
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
29C0000
|
remote allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
2AB1000
|
heap
|
page read and write
|
||
C0005F8000
|
direct allocation
|
page read and write
|
||
C000536000
|
direct allocation
|
page read and write
|
||
2AB5000
|
heap
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4BD7000
|
trusted library allocation
|
page read and write
|
||
C0007D0000
|
direct allocation
|
page read and write
|
||
4E4B000
|
trusted library allocation
|
page read and write
|
||
C0005D8000
|
direct allocation
|
page read and write
|
||
7FF616161000
|
unkown
|
page execute read
|
||
2A92000
|
heap
|
page read and write
|
||
218F9FE000
|
stack
|
page read and write
|
||
4DAB000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
C000918000
|
direct allocation
|
page read and write
|
||
1847FE54000
|
direct allocation
|
page read and write
|
||
C0005EA000
|
direct allocation
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
C0004F4000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
4BE9000
|
trusted library allocation
|
page read and write
|
||
C0009F0000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
218E7FC000
|
stack
|
page read and write
|
||
4E8C000
|
trusted library allocation
|
page read and write
|
||
C000604000
|
direct allocation
|
page read and write
|
||
1845B30E000
|
direct allocation
|
page read and write
|
||
C000BE0000
|
direct allocation
|
page read and write
|
||
7FF6168C3000
|
unkown
|
page readonly
|
||
218F7FD000
|
stack
|
page read and write
|
||
2A22000
|
heap
|
page read and write
|
||
447D000
|
stack
|
page read and write
|
||
C000602000
|
direct allocation
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
C0005D4000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4C06000
|
trusted library allocation
|
page read and write
|
||
C0005DE000
|
direct allocation
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
1845B3A5000
|
heap
|
page read and write
|
||
C0004FC000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
2AAD000
|
heap
|
page read and write
|
||
C00076C000
|
direct allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
C000B70000
|
direct allocation
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
C00041C000
|
direct allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
C0005E8000
|
direct allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
7FF6168C3000
|
unkown
|
page readonly
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C000AB0000
|
direct allocation
|
page read and write
|
||
C000A60000
|
direct allocation
|
page read and write
|
||
C000421000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
4BEF000
|
trusted library allocation
|
page read and write
|
||
4C26000
|
trusted library allocation
|
page read and write
|
||
C000980000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
C0007A0000
|
direct allocation
|
page read and write
|
||
C00070C000
|
direct allocation
|
page read and write
|
||
7FF616495000
|
unkown
|
page write copy
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
C0005D4000
|
direct allocation
|
page read and write
|
||
29BD000
|
stack
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
trusted library allocation
|
page read and write
|
||
C000B90000
|
direct allocation
|
page read and write
|
||
2AB5000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
C0009E0000
|
direct allocation
|
page read and write
|
||
C000AC0000
|
direct allocation
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
7FF6163DD000
|
unkown
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
1845B3A0000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
3AA000
|
stack
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2A92000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
C00077C000
|
direct allocation
|
page read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
7FF61685A000
|
unkown
|
page read and write
|
||
C000950000
|
direct allocation
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
2A92000
|
heap
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
4C12000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4BD4000
|
trusted library allocation
|
page read and write
|
||
2AC5000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
1847FCB0000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
7FF616883000
|
unkown
|
page read and write
|
||
4BE8000
|
trusted library allocation
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
C000A80000
|
direct allocation
|
page read and write
|
||
C0005B8000
|
direct allocation
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
1845B340000
|
direct allocation
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
7FF6168BE000
|
unkown
|
page write copy
|
||
2AC0000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
4C3D000
|
trusted library allocation
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
C000487000
|
direct allocation
|
page read and write
|
||
4BE1000
|
trusted library allocation
|
page read and write
|
||
C000600000
|
direct allocation
|
page read and write
|
||
C000A90000
|
direct allocation
|
page read and write
|
||
4C0E000
|
trusted library allocation
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
2AAC000
|
heap
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
C0005F2000
|
direct allocation
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
2A23000
|
heap
|
page read and write
|
||
4C1A000
|
trusted library allocation
|
page read and write
|
||
4BE9000
|
trusted library allocation
|
page read and write
|
||
C000A20000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
7FF6163D7000
|
unkown
|
page write copy
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
4C2D000
|
trusted library allocation
|
page read and write
|
||
C000588000
|
direct allocation
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
36B000
|
stack
|
page read and write
|
||
C000960000
|
direct allocation
|
page read and write
|
||
2A8A000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
2A94000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
C00059C000
|
direct allocation
|
page read and write
|
||
4CFB000
|
trusted library allocation
|
page read and write
|
||
C0005E2000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
7FF6168B5000
|
unkown
|
page read and write
|
||
2AAD000
|
heap
|
page read and write
|
||
4BD2000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2ADB000
|
heap
|
page read and write
|
||
C00048E000
|
direct allocation
|
page read and write
|
||
1845B332000
|
direct allocation
|
page read and write
|
||
C0005A2000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2483000
|
remote allocation
|
page execute and read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
1845B350000
|
direct allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
7FF616497000
|
unkown
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
C000920000
|
direct allocation
|
page read and write
|
||
25C7000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
218EBFF000
|
stack
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
7FF6163DC000
|
unkown
|
page write copy
|
||
4C25000
|
trusted library allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000A00000
|
direct allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2A22000
|
heap
|
page read and write
|
||
1845B390000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
1847FE65000
|
direct allocation
|
page read and write
|
||
18422230000
|
direct allocation
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
C000BA0000
|
direct allocation
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
2AB6000
|
heap
|
page read and write
|
||
2A9F000
|
heap
|
page read and write
|
||
1845B274000
|
direct allocation
|
page read and write
|
||
C0007F0000
|
direct allocation
|
page read and write
|
||
4D13000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
218EFFE000
|
stack
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2ADE000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
C000480000
|
direct allocation
|
page read and write
|
||
C000A50000
|
direct allocation
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
C0005FE000
|
direct allocation
|
page read and write
|
||
7FF616889000
|
unkown
|
page read and write
|
||
7FF6168BB000
|
unkown
|
page write copy
|
||
2AA8000
|
heap
|
page read and write
|
||
7FF6163DF000
|
unkown
|
page read and write
|
||
C000B20000
|
direct allocation
|
page read and write
|
||
7FF6168B1000
|
unkown
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
1845B050000
|
heap
|
page read and write
|
||
C000AA0000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4D33000
|
trusted library allocation
|
page read and write
|
||
18422313000
|
direct allocation
|
page read and write
|
||
2AA6000
|
heap
|
page read and write
|
||
2A8A000
|
heap
|
page read and write
|
||
44FD000
|
stack
|
page read and write
|
||
4C32000
|
trusted library allocation
|
page read and write
|
||
C0005F2000
|
direct allocation
|
page read and write
|
||
4C67000
|
trusted library allocation
|
page read and write
|
||
C0005A2000
|
direct allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
1845B0A0000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
C000B10000
|
direct allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
218F3FE000
|
stack
|
page read and write
|
||
4D83000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
C00058C000
|
direct allocation
|
page read and write
|
||
4C67000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
C000580000
|
direct allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
29C0000
|
remote allocation
|
page read and write
|
||
C0005FE000
|
direct allocation
|
page read and write
|
||
C000970000
|
direct allocation
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2AA6000
|
heap
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
2A83000
|
heap
|
page read and write
|
||
18422250000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C0002EC000
|
direct allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
4BE9000
|
trusted library allocation
|
page read and write
|
||
C000BA4000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
7FF6168BE000
|
unkown
|
page write copy
|
||
2A07000
|
heap
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
2AB3000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
4BD8000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
218E9FE000
|
stack
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
2A92000
|
heap
|
page read and write
|
||
218EDFE000
|
stack
|
page read and write
|
||
4BF6000
|
trusted library allocation
|
page read and write
|
||
4BD7000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2AAF000
|
heap
|
page read and write
|
||
C0005FC000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
C000BF0000
|
direct allocation
|
page read and write
|
||
2430000
|
remote allocation
|
page execute and read and write
|
||
1845B270000
|
direct allocation
|
page read and write
|
||
2A96000
|
heap
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
184222C0000
|
direct allocation
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
2AB5000
|
heap
|
page read and write
|
||
2A95000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
There are 665 hidden memdumps, click here to show them.