Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://crisiwarny.store/api)
|
unknown
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/apire1
|
unknown
|
||
https://crisiwarny.store/Y
|
unknown
|
||
https://crisiwarny.store/api
|
172.67.170.64
|
||
necklacedmny.store
|
|||
https://crisiwarny.store/apiT
|
unknown
|
||
fadehairucw.store
|
|||
https://crisiwarny.store/apint
|
unknown
|
||
https://crisiwarny.store:443/api
|
unknown
|
||
https://crisiwarny.store:443/apihhhv.default-release/key4.dbPK
|
unknown
|
||
https://crisiwarny.store/apiF
|
unknown
|
||
navygenerayk.store
|
|||
https://crisiwarny.store/n
|
unknown
|
||
founpiuer.store
|
|||
https://crisiwarny.store/p
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
thumbystriw.store
|
|||
https://crisiwarny.store/6
|
unknown
|
||
https://crisiwarny.store/r
|
unknown
|
||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 35 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
172.67.170.64
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.170.64
|
crisiwarny.store
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AD1000
|
unkown
|
page execute and read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
A39000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
540F000
|
trusted library allocation
|
page read and write
|
||
3EA000
|
stack
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
56D2000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
CFD000
|
unkown
|
page execute and read and write
|
||
A56000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
CBE000
|
unkown
|
page execute and write copy
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
unkown
|
page execute and read and write
|
||
531F000
|
stack
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
D1C000
|
unkown
|
page execute and read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
unkown
|
page execute and read and write
|
||
A47000
|
heap
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
569A000
|
trusted library allocation
|
page read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4D31000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
B2B000
|
unkown
|
page execute and write copy
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
4CAD000
|
stack
|
page read and write
|
||
D3F000
|
unkown
|
page execute and read and write
|
||
307E000
|
stack
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
4441000
|
heap
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
9C1000
|
heap
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
B37000
|
unkown
|
page execute and write copy
|
||
CB6000
|
unkown
|
page execute and read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
4D2D000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
53B9000
|
trusted library allocation
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
C91000
|
unkown
|
page execute and read and write
|
||
506E000
|
stack
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
unkown
|
page execute and read and write
|
||
CE9000
|
unkown
|
page execute and read and write
|
||
4A00000
|
remote allocation
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
5417000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
D49000
|
unkown
|
page execute and write copy
|
||
547D000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
B2B000
|
unkown
|
page execute and read and write
|
||
443F000
|
stack
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
CE8000
|
unkown
|
page execute and write copy
|
||
A23000
|
heap
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
541E000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
unkown
|
page execute and write copy
|
||
9EB000
|
heap
|
page read and write
|
||
CB6000
|
unkown
|
page execute and write copy
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
A9B000
|
stack
|
page read and write
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
27FC000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
DBB000
|
unkown
|
page execute and write copy
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
DDF000
|
unkown
|
page execute and write copy
|
||
574A000
|
trusted library allocation
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
DC8000
|
unkown
|
page execute and write copy
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
CF4000
|
unkown
|
page execute and read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
CCE000
|
unkown
|
page execute and write copy
|
||
93E000
|
stack
|
page read and write
|
||
53C7000
|
trusted library allocation
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
5429000
|
trusted library allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
36BE000
|
stack
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
D29000
|
unkown
|
page execute and write copy
|
||
79E000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
4B6C000
|
stack
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
unkown
|
page read and write
|
||
AD1000
|
unkown
|
page execute and write copy
|
||
4441000
|
heap
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
48FC000
|
stack
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
5379000
|
trusted library allocation
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
unkown
|
page execute and write copy
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
4C2C000
|
trusted library allocation
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page execute and read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
5391000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
CF1000
|
unkown
|
page execute and write copy
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
DD1000
|
unkown
|
page execute and write copy
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
unkown
|
page execute and read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
5391000
|
trusted library allocation
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
CCF000
|
unkown
|
page execute and read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
D9D000
|
unkown
|
page execute and read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
A21000
|
heap
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
998000
|
heap
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
D5C000
|
unkown
|
page execute and read and write
|
||
A24000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
7CE000
|
stack
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
543F000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
5752000
|
trusted library allocation
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
4DEF000
|
stack
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
D3B000
|
unkown
|
page execute and read and write
|
||
D2B000
|
unkown
|
page execute and write copy
|
||
A0F000
|
heap
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
unkown
|
page execute and write copy
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
remote allocation
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
DDF000
|
unkown
|
page execute and read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
53C7000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
57EA000
|
trusted library allocation
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
540E000
|
trusted library allocation
|
page read and write
|
||
A5C000
|
heap
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
D31000
|
unkown
|
page execute and read and write
|
||
278F000
|
stack
|
page read and write
|
||
D38000
|
unkown
|
page execute and write copy
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
DD1000
|
unkown
|
page execute and write copy
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
79C000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
D12000
|
unkown
|
page execute and write copy
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
4BAD000
|
stack
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
heap
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
unkown
|
page execute and write copy
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
unkown
|
page execute and write copy
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
5413000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
remote allocation
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
4D47000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
D51000
|
unkown
|
page execute and read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
53C3000
|
trusted library allocation
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
unkown
|
page execute and write copy
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
CCB000
|
unkown
|
page execute and write copy
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
CA9000
|
unkown
|
page execute and read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
950000
|
direct allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
C93000
|
unkown
|
page execute and write copy
|
||
4D3D000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
575A000
|
trusted library allocation
|
page read and write
|
||
4A78000
|
trusted library allocation
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page execute and read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
There are 544 hidden memdumps, click here to show them.