Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/api
|
188.114.96.3
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://necklacedmny.store/apiuM
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://necklacedmny.store/CZ
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://necklacedmny.store/KZ
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://necklacedmny.s
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://necklacedmny.store/k
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://necklacedmny.store/apiu
|
unknown
|
||
https://necklacedmny.store/3Z
|
unknown
|
||
https://necklacedmny.store/sZ
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
There are 33 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.96.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
necklacedmny.store
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C71000
|
unkown
|
page execute and read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
CCB000
|
unkown
|
page execute and read and write
|
||
70C000
|
heap
|
page read and write
|
||
E64000
|
unkown
|
page execute and read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
||
8E9000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
F54000
|
unkown
|
page execute and write copy
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
5522000
|
trusted library allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
trusted library allocation
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
C71000
|
unkown
|
page execute and write copy
|
||
6CF000
|
heap
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
E5B000
|
unkown
|
page execute and write copy
|
||
310F000
|
stack
|
page read and write
|
||
4860000
|
remote allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
F57000
|
unkown
|
page execute and write copy
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
trusted library allocation
|
page read and write
|
||
E63000
|
unkown
|
page execute and write copy
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
stack
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
E4F000
|
unkown
|
page execute and read and write
|
||
43CF000
|
stack
|
page read and write
|
||
F40000
|
unkown
|
page execute and read and write
|
||
8E9000
|
trusted library allocation
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
EDA000
|
unkown
|
page execute and write copy
|
||
EAD000
|
unkown
|
page execute and write copy
|
||
400F000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
ED9000
|
unkown
|
page execute and read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
CD7000
|
unkown
|
page execute and write copy
|
||
8B8000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
76B000
|
heap
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
E50000
|
unkown
|
page execute and write copy
|
||
4D16000
|
trusted library allocation
|
page read and write
|
||
CCB000
|
unkown
|
page execute and write copy
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
E48000
|
unkown
|
page execute and read and write
|
||
54E6000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
EBE000
|
unkown
|
page execute and read and write
|
||
B2D000
|
heap
|
page read and write
|
||
8C9000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
unkown
|
page execute and read and write
|
||
6F1000
|
heap
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
4870000
|
direct allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
E7B000
|
unkown
|
page execute and read and write
|
||
43E1000
|
heap
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
unkown
|
page execute and read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
8B1000
|
trusted library allocation
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
6C3000
|
heap
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
ECD000
|
unkown
|
page execute and read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
8B9000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
8E7000
|
trusted library allocation
|
page read and write
|
||
F56000
|
unkown
|
page execute and read and write
|
||
6EA000
|
heap
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
559D000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
4870000
|
direct allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
F47000
|
unkown
|
page execute and write copy
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
77C000
|
heap
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
E51000
|
unkown
|
page execute and read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
8D7000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
unkown
|
page execute and write copy
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
746000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
4C7D000
|
stack
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
EA2000
|
unkown
|
page execute and read and write
|
||
660000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
8C9000
|
trusted library allocation
|
page read and write
|
||
F5C000
|
unkown
|
page execute and write copy
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
EA1000
|
unkown
|
page execute and write copy
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
trusted library allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
5643000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
43E0000
|
heap
|
page read and write
|
||
8B7000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
8DA000
|
trusted library allocation
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
F0A000
|
unkown
|
page execute and read and write
|
||
324F000
|
stack
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
300E000
|
stack
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
5673000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
3FA000
|
stack
|
page read and write
|
||
77F000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
E8C000
|
unkown
|
page execute and read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
338F000
|
stack
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
4870000
|
direct allocation
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
8E9000
|
trusted library allocation
|
page read and write
|
||
8E9000
|
trusted library allocation
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
4BF3000
|
trusted library allocation
|
page read and write
|
||
4A4D000
|
trusted library allocation
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
4CF2000
|
trusted library allocation
|
page read and write
|
||
518D000
|
stack
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
F5C000
|
unkown
|
page execute and write copy
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
8DF000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
8E6000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
unkown
|
page execute and write copy
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
8BD000
|
trusted library allocation
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
unkown
|
page execute and read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
EE9000
|
unkown
|
page execute and read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
8DF000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
ED4000
|
unkown
|
page execute and write copy
|
||
EAB000
|
unkown
|
page execute and write copy
|
||
3DCE000
|
stack
|
page read and write
|
||
F6C000
|
unkown
|
page execute and write copy
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
ECC000
|
unkown
|
page execute and write copy
|
||
2ACF000
|
stack
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
E4C000
|
unkown
|
page execute and write copy
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
4860000
|
remote allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
F29000
|
unkown
|
page execute and read and write
|
||
388F000
|
stack
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
C70000
|
unkown
|
page readonly
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
E48000
|
unkown
|
page execute and write copy
|
||
274B000
|
stack
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
5524000
|
trusted library allocation
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
78B000
|
heap
|
page read and write
|
||
5734000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
unkown
|
page execute and read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
F07000
|
unkown
|
page execute and write copy
|
||
75A000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
48AB000
|
stack
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
52EF000
|
stack
|
page read and write
|
||
EB0000
|
unkown
|
page execute and read and write
|
||
8E5000
|
trusted library allocation
|
page read and write
|
||
76B000
|
heap
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
6DE000
|
heap
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
4CFF000
|
trusted library allocation
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
E3C000
|
unkown
|
page execute and read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
unkown
|
page execute and write copy
|
||
49AF000
|
stack
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
4D07000
|
trusted library allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
43E1000
|
heap
|
page read and write
|
||
4EFF000
|
stack
|
page read and write
|
||
F3D000
|
unkown
|
page execute and write copy
|
||
414F000
|
stack
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
8D1000
|
trusted library allocation
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
55D3000
|
trusted library allocation
|
page read and write
|
||
EE6000
|
unkown
|
page execute and write copy
|
||
374F000
|
stack
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
E2C000
|
unkown
|
page execute and read and write
|
||
EB8000
|
unkown
|
page execute and write copy
|
||
4B3E000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4860000
|
remote allocation
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
F54000
|
unkown
|
page execute and write copy
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
789000
|
heap
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
559C000
|
trusted library allocation
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
51EE000
|
stack
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
2FB000
|
stack
|
page read and write
|
||
8B8000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
E81000
|
unkown
|
page execute and write copy
|
||
43F1000
|
heap
|
page read and write
|
||
744000
|
heap
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
C70000
|
unkown
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
8B8000
|
trusted library allocation
|
page read and write
|
||
8B8000
|
trusted library allocation
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
562B000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
8B1000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
There are 526 hidden memdumps, click here to show them.