Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6xmBUtHylU.exe
|
"C:\Users\user\Desktop\6xmBUtHylU.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://citizencenturygoodwk.shop/api=/
|
unknown
|
||
https://citizencenturygoodwk.shop/ez
|
unknown
|
||
https://citizencenturygoodwk.shop/api9(
|
unknown
|
||
radiationnopp.shop
|
|||
https://citizencenturygoodwk.shop/.
|
unknown
|
||
https://citizencenturygoodwk.shop/apiU6
|
unknown
|
||
publicitttyps.shop
|
|||
answerrsdo.shop
|
|||
https://citizencenturygoodwk.shop:443/api
|
unknown
|
||
citizencenturygoodwk.shop
|
|||
https://citizencenturygoodwk.shop/apiX
|
unknown
|
||
https://citizencenturygoodwk.shop/apie6-
|
unknown
|
||
benchillppwo.shop
|
|||
https://citizencenturygoodwk.shop/z
|
unknown
|
||
https://citizencenturygoodwk.shop/
|
unknown
|
||
bargainnykwo.shop
|
|||
bouncedgowp.shop
|
|||
https://citizencenturygoodwk.shop/api
|
188.114.96.3
|
||
bannngwko.shop
|
|||
https://citizencenturygoodwk.shop/4Y
|
unknown
|
||
https://citizencenturygoodwk.shop:443/apiK
|
unknown
|
||
affecthorsedpo.shop
|
|||
https://citizencenturygoodwk.shop/apiP
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://login.microsoftonline.com/stream
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://management.core.chinacloudapi.cnFrame
|
unknown
|
||
https://management.chinacloudapi.cnCONTINUATION
|
unknown
|
||
https://management.core.usgovcloudapi.nethttp2:
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://management.azure.cominvalid
|
unknown
|
||
https://login.chinacloudapi.cn/http2:
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
There are 32 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
citizencenturygoodwk.shop
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
citizencenturygoodwk.shop
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C0001BA000
|
direct allocation
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
7FF67F84B000
|
unkown
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
245B1FC8000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
2884000
|
heap
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
4A4C000
|
trusted library allocation
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
245B2225000
|
heap
|
page read and write
|
||
C000650000
|
direct allocation
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
trusted library allocation
|
page read and write
|
||
4A0A000
|
trusted library allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
245B1F78000
|
direct allocation
|
page read and write
|
||
288C000
|
heap
|
page read and write
|
||
4A13000
|
trusted library allocation
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
245F7371000
|
direct allocation
|
page read and write
|
||
2884000
|
heap
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
2814000
|
heap
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
E03FBFE000
|
stack
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C000144000
|
direct allocation
|
page read and write
|
||
4A9D000
|
trusted library allocation
|
page read and write
|
||
C000049000
|
direct allocation
|
page read and write
|
||
4A39000
|
trusted library allocation
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
4AA5000
|
trusted library allocation
|
page read and write
|
||
C00013A000
|
direct allocation
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
42FD000
|
stack
|
page read and write
|
||
2843000
|
heap
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4A91000
|
trusted library allocation
|
page read and write
|
||
4ABA000
|
trusted library allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
2809000
|
heap
|
page read and write
|
||
4A39000
|
trusted library allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000564000
|
direct allocation
|
page read and write
|
||
7FF67F458000
|
unkown
|
page write copy
|
||
4A43000
|
trusted library allocation
|
page read and write
|
||
E03F9FE000
|
stack
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
4A09000
|
trusted library allocation
|
page read and write
|
||
4A57000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
245F7550000
|
direct allocation
|
page read and write
|
||
C00002D000
|
direct allocation
|
page read and write
|
||
23F7000
|
heap
|
page read and write
|
||
4A03000
|
trusted library allocation
|
page read and write
|
||
7FF67F7D4000
|
unkown
|
page read and write
|
||
4A43000
|
trusted library allocation
|
page read and write
|
||
C00016A000
|
direct allocation
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
4AA3000
|
trusted library allocation
|
page read and write
|
||
7FF67F40D000
|
unkown
|
page read and write
|
||
4ADC000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
2887000
|
heap
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4A4A000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
trusted library allocation
|
page read and write
|
||
4A9A000
|
trusted library allocation
|
page read and write
|
||
4A65000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
4A14000
|
trusted library allocation
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
C000524000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
C000171000
|
direct allocation
|
page read and write
|
||
C00020C000
|
direct allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
C000554000
|
direct allocation
|
page read and write
|
||
23F5000
|
heap
|
page read and write
|
||
4A4C000
|
trusted library allocation
|
page read and write
|
||
4AEB000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
7FF67F190000
|
unkown
|
page readonly
|
||
7FF67F191000
|
unkown
|
page execute read
|
||
4DB4000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
4AD6000
|
trusted library allocation
|
page read and write
|
||
C00051E000
|
direct allocation
|
page read and write
|
||
C000087000
|
direct allocation
|
page read and write
|
||
E03FFFE000
|
stack
|
page read and write
|
||
4B07000
|
trusted library allocation
|
page read and write
|
||
4ADA000
|
trusted library allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
30E000
|
stack
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
4A14000
|
trusted library allocation
|
page read and write
|
||
4AA6000
|
trusted library allocation
|
page read and write
|
||
4ACE000
|
trusted library allocation
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
7FF67F84C000
|
unkown
|
page write copy
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
245F73B0000
|
direct allocation
|
page read and write
|
||
4E7C000
|
trusted library allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
C000610000
|
direct allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4B1F000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
remote allocation
|
page read and write
|
||
7FF67F410000
|
unkown
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2884000
|
heap
|
page read and write
|
||
282E000
|
heap
|
page read and write
|
||
2875000
|
heap
|
page read and write
|
||
C0004E4000
|
direct allocation
|
page read and write
|
||
2886000
|
heap
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
27D0000
|
remote allocation
|
page read and write
|
||
C0004DA000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
4A59000
|
trusted library allocation
|
page read and write
|
||
4AD3000
|
trusted library allocation
|
page read and write
|
||
4A98000
|
trusted library allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
4A32000
|
trusted library allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
7FF67F44B000
|
unkown
|
page write copy
|
||
27FB000
|
heap
|
page read and write
|
||
7FF67F45D000
|
unkown
|
page write copy
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
4A02000
|
trusted library allocation
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
2895000
|
heap
|
page read and write
|
||
7FF67F84F000
|
unkown
|
page write copy
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A9D000
|
trusted library allocation
|
page read and write
|
||
245F7331000
|
direct allocation
|
page read and write
|
||
7FF67F7DB000
|
unkown
|
page read and write
|
||
4B01000
|
trusted library allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4B19000
|
trusted library allocation
|
page read and write
|
||
288C000
|
heap
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
245B1F74000
|
direct allocation
|
page read and write
|
||
4B01000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
trusted library allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4A0A000
|
trusted library allocation
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
4A2C000
|
trusted library allocation
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
2826000
|
heap
|
page read and write
|
||
7FF67F842000
|
unkown
|
page read and write
|
||
4A1B000
|
trusted library allocation
|
page read and write
|
||
4A21000
|
trusted library allocation
|
page read and write
|
||
4A0A000
|
trusted library allocation
|
page read and write
|
||
C000600000
|
direct allocation
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000670000
|
direct allocation
|
page read and write
|
||
2873000
|
heap
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
4A16000
|
trusted library allocation
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
E03F7FE000
|
stack
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
E03F5FF000
|
stack
|
page read and write
|
||
C00056A000
|
direct allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4AC5000
|
trusted library allocation
|
page read and write
|
||
4AC8000
|
trusted library allocation
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
2814000
|
heap
|
page read and write
|
||
4AEB000
|
trusted library allocation
|
page read and write
|
||
245F7510000
|
direct allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
245F7540000
|
direct allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
4A71000
|
trusted library allocation
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
4A48000
|
trusted library allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
4A3C000
|
trusted library allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
245B1FB0000
|
direct allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
27E8000
|
heap
|
page read and write
|
||
7FF67F461000
|
unkown
|
page readonly
|
||
4AA4000
|
trusted library allocation
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
4ACF000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
C00008D000
|
direct allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
245B1F20000
|
heap
|
page read and write
|
||
1BB000
|
stack
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
7FF67F408000
|
unkown
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
245F737A000
|
direct allocation
|
page read and write
|
||
4AEB000
|
trusted library allocation
|
page read and write
|
||
C000620000
|
direct allocation
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
4FB4000
|
trusted library allocation
|
page read and write
|
||
4B37000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
4ACE000
|
trusted library allocation
|
page read and write
|
||
4A6A000
|
trusted library allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
4D2C000
|
trusted library allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C000534000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C0005F6000
|
direct allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
remote allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
2893000
|
heap
|
page read and write
|
||
4AA9000
|
trusted library allocation
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
4B01000
|
trusted library allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
245B2220000
|
heap
|
page read and write
|
||
4AEB000
|
trusted library allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
4A09000
|
trusted library allocation
|
page read and write
|
||
7FF67F408000
|
unkown
|
page write copy
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
7FF67F896000
|
unkown
|
page readonly
|
||
C000014000
|
direct allocation
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
C00008B000
|
direct allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
C000630000
|
direct allocation
|
page read and write
|
||
4A3C000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
2884000
|
heap
|
page read and write
|
||
4A9D000
|
trusted library allocation
|
page read and write
|
||
4A39000
|
trusted library allocation
|
page read and write
|
||
4B01000
|
trusted library allocation
|
page read and write
|
||
C000156000
|
direct allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
4A98000
|
trusted library allocation
|
page read and write
|
||
4A2C000
|
trusted library allocation
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
4A21000
|
trusted library allocation
|
page read and write
|
||
4A0A000
|
trusted library allocation
|
page read and write
|
||
4A3B000
|
trusted library allocation
|
page read and write
|
||
7FF67F45F000
|
unkown
|
page read and write
|
||
2895000
|
heap
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
245B21F0000
|
direct allocation
|
page read and write
|
||
C00016E000
|
direct allocation
|
page read and write
|
||
4B2F000
|
trusted library allocation
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
4A65000
|
trusted library allocation
|
page read and write
|
||
4A0D000
|
trusted library allocation
|
page read and write
|
||
4AB6000
|
trusted library allocation
|
page read and write
|
||
4ABA000
|
trusted library allocation
|
page read and write
|
||
4ACB000
|
trusted library allocation
|
page read and write
|
||
7FF67F190000
|
unkown
|
page readonly
|
||
2871000
|
heap
|
page read and write
|
||
C000640000
|
direct allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
C00056A000
|
direct allocation
|
page read and write
|
||
245B1F40000
|
heap
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
4A0F000
|
trusted library allocation
|
page read and write
|
||
4ED9000
|
trusted library allocation
|
page read and write
|
||
4A09000
|
trusted library allocation
|
page read and write
|
||
7FF67F45B000
|
unkown
|
page read and write
|
||
C00007C000
|
direct allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
4A2C000
|
trusted library allocation
|
page read and write
|
||
2825000
|
heap
|
page read and write
|
||
4A3F000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A43000
|
trusted library allocation
|
page read and write
|
||
4A9F000
|
trusted library allocation
|
page read and write
|
||
7FF67F411000
|
unkown
|
page write copy
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4ADD000
|
trusted library allocation
|
page read and write
|
||
289C000
|
heap
|
page read and write
|
||
7FF67F191000
|
unkown
|
page execute read
|
||
E03FDFC000
|
stack
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
trusted library allocation
|
page read and write
|
||
7FF67F40E000
|
unkown
|
page write copy
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
7FF67F461000
|
unkown
|
page readonly
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
4A14000
|
trusted library allocation
|
page read and write
|
||
4AF3000
|
trusted library allocation
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
4A09000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
4A98000
|
trusted library allocation
|
page read and write
|
||
4A16000
|
trusted library allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
7FF67F84F000
|
unkown
|
page write copy
|
||
4AD6000
|
trusted library allocation
|
page read and write
|
||
4A1B000
|
trusted library allocation
|
page read and write
|
||
245B2200000
|
direct allocation
|
page read and write
|
||
4A49000
|
trusted library allocation
|
page read and write
|
||
4A9A000
|
trusted library allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
288E000
|
heap
|
page read and write
|
||
447D000
|
stack
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
7FF67F7BB000
|
unkown
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
4A18000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
C000023000
|
direct allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
4AC8000
|
trusted library allocation
|
page read and write
|
||
230000
|
remote allocation
|
page execute and read and write
|
||
245B1E40000
|
heap
|
page read and write
|
||
2899000
|
heap
|
page read and write
|
||
245F7333000
|
direct allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
E03F3FD000
|
stack
|
page read and write
|
||
C00015A000
|
direct allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
4DEC000
|
trusted library allocation
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
283E000
|
heap
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
4A0A000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4A33000
|
trusted library allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
4A15000
|
trusted library allocation
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
4B2F000
|
trusted library allocation
|
page read and write
|
||
287E000
|
heap
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
C000680000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
4A0A000
|
trusted library allocation
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
4AA7000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000660000
|
direct allocation
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
1FA000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
280E000
|
heap
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
2884000
|
heap
|
page read and write
|
||
4B2B000
|
trusted library allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
4AA5000
|
trusted library allocation
|
page read and write
|
||
4A9A000
|
trusted library allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
C000544000
|
direct allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
4B27000
|
trusted library allocation
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
stack
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
7FF67F44C000
|
unkown
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
4B31000
|
trusted library allocation
|
page read and write
|
||
C00033A000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
4A47000
|
trusted library allocation
|
page read and write
|
||
C000374000
|
direct allocation
|
page read and write
|
||
4A14000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
4B0D000
|
trusted library allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
245B1FC0000
|
heap
|
page read and write
|
||
4A99000
|
trusted library allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
7FF67F847000
|
unkown
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4AA5000
|
trusted library allocation
|
page read and write
|
||
245F7501000
|
direct allocation
|
page read and write
|
||
4A9A000
|
trusted library allocation
|
page read and write
|
||
4AC3000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
2871000
|
heap
|
page read and write
|
||
4A18000
|
trusted library allocation
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
4A13000
|
trusted library allocation
|
page read and write
|
||
4A13000
|
trusted library allocation
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
310000
|
heap
|
page read and write
|
||
7FF67F84B000
|
unkown
|
page write copy
|
||
281000
|
remote allocation
|
page execute and read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
4B39000
|
trusted library allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
239E000
|
stack
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
C000166000
|
direct allocation
|
page read and write
|
||
4D13000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
7FF67F449000
|
unkown
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
2831000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
4A1B000
|
trusted library allocation
|
page read and write
|
||
2807000
|
heap
|
page read and write
|
||
4A05000
|
trusted library allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
245F74B0000
|
direct allocation
|
page read and write
|
||
4A23000
|
trusted library allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
4A13000
|
trusted library allocation
|
page read and write
|
||
2896000
|
heap
|
page read and write
|
||
4A03000
|
trusted library allocation
|
page read and write
|
||
2814000
|
heap
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
245B1F70000
|
direct allocation
|
page read and write
|
||
4A6A000
|
trusted library allocation
|
page read and write
|
||
4DE4000
|
trusted library allocation
|
page read and write
|
||
4A36000
|
trusted library allocation
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
2814000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4D0D000
|
trusted library allocation
|
page read and write
|
||
2895000
|
heap
|
page read and write
|
||
4ABA000
|
trusted library allocation
|
page read and write
|
||
7FF67F896000
|
unkown
|
page readonly
|
||
C000152000
|
direct allocation
|
page read and write
|
||
4A34000
|
trusted library allocation
|
page read and write
|
||
4A44000
|
trusted library allocation
|
page read and write
|
||
7FF67F40C000
|
unkown
|
page write copy
|
There are 535 hidden memdumps, click here to show them.