Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/api
|
188.114.97.3
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
https://necklacedmny.store/apie
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://necklacedmny.store/apiY
|
unknown
|
||
navygenerayk.store
|
|||
https://necklacedmny.store/apis
|
unknown
|
||
founpiuer.store
|
|||
thumbystriw.store
|
|||
https://necklacedmny.store/api-
|
unknown
|
||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
911000
|
unkown
|
page execute and read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
unkown
|
page execute and read and write
|
||
5B31000
|
trusted library allocation
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
B14000
|
unkown
|
page execute and write copy
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
55AF000
|
stack
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
B0B000
|
unkown
|
page execute and write copy
|
||
513B000
|
trusted library allocation
|
page read and write
|
||
B55000
|
unkown
|
page execute and read and write
|
||
11AA000
|
heap
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
4F60000
|
direct allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
5F41000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
5B84000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
C1D000
|
unkown
|
page execute and read and write
|
||
396E000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
B00000
|
unkown
|
page execute and read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
2E6C000
|
heap
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
B31000
|
unkown
|
page execute and write copy
|
||
10CE000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
5AE5000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5EB1000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
96B000
|
unkown
|
page execute and write copy
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
B16000
|
unkown
|
page execute and read and write
|
||
11B8000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
unkown
|
page execute and read and write
|
||
5B83000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
unkown
|
page execute and write copy
|
||
110E000
|
heap
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
C08000
|
unkown
|
page execute and write copy
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
unkown
|
page execute and write copy
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
911000
|
unkown
|
page execute and write copy
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
5B1A000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
910000
|
unkown
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
AD7000
|
unkown
|
page execute and write copy
|
||
2E50000
|
direct allocation
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
direct allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
unkown
|
page execute and read and write
|
||
B5F000
|
unkown
|
page execute and read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
B56000
|
unkown
|
page execute and write copy
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
5ED3000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
unkown
|
page execute and write copy
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
AEC000
|
unkown
|
page execute and read and write
|
||
119B000
|
heap
|
page read and write
|
||
522C000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
53EF000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
560D000
|
stack
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
509F000
|
stack
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
96B000
|
unkown
|
page execute and read and write
|
||
486E000
|
stack
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
B70000
|
unkown
|
page execute and read and write
|
||
2E60000
|
heap
|
page read and write
|
||
113F000
|
heap
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5B83000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page execute and write copy
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
B7B000
|
unkown
|
page execute and write copy
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
52F2000
|
trusted library allocation
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
BB2000
|
unkown
|
page execute and read and write
|
||
B81000
|
unkown
|
page execute and read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
AFA000
|
unkown
|
page execute and read and write
|
||
11A7000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
40ED000
|
stack
|
page read and write
|
||
55C0000
|
remote allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5B7B000
|
trusted library allocation
|
page read and write
|
||
5B3A000
|
trusted library allocation
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
2E67000
|
heap
|
page read and write
|
||
B6E000
|
unkown
|
page execute and write copy
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
5B35000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
unkown
|
page execute and write copy
|
||
11B2000
|
heap
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
5B7B000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
5AE5000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
5F61000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5B95000
|
trusted library allocation
|
page read and write
|
||
5C65000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
119E000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
118F000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
B93000
|
unkown
|
page execute and read and write
|
||
306F000
|
stack
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
C04000
|
unkown
|
page execute and write copy
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
969000
|
unkown
|
page write copy
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
BB1000
|
unkown
|
page execute and write copy
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
5BE9000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
unkown
|
page execute and write copy
|
||
30AE000
|
stack
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
55C0000
|
remote allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
63D4000
|
trusted library allocation
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
11B8000
|
heap
|
page read and write
|
||
5B86000
|
trusted library allocation
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
5B25000
|
trusted library allocation
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
C07000
|
unkown
|
page execute and read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5B7B000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
CBB000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
4F60000
|
direct allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
C04000
|
unkown
|
page execute and write copy
|
||
DBA000
|
stack
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5ECE000
|
stack
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5B84000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
BF8000
|
unkown
|
page execute and write copy
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5AF9000
|
trusted library allocation
|
page read and write
|
||
B7D000
|
unkown
|
page execute and write copy
|
||
55C0000
|
remote allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
unkown
|
page execute and read and write
|
||
B7C000
|
unkown
|
page execute and read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
unkown
|
page execute and write copy
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
B89000
|
unkown
|
page execute and read and write
|
||
50ED000
|
stack
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
532D000
|
stack
|
page read and write
|
||
5EA1000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
4AD1000
|
heap
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
B7A000
|
unkown
|
page execute and read and write
|
||
C1D000
|
unkown
|
page execute and write copy
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
unkown
|
page execute and read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
977000
|
unkown
|
page execute and write copy
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
B54000
|
unkown
|
page execute and write copy
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
unkown
|
page execute and write copy
|
||
4AD1000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
unkown
|
page execute and write copy
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
unkown
|
page execute and write copy
|
||
577E000
|
stack
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
11BC000
|
heap
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
unkown
|
page execute and read and write
|
||
382E000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
969000
|
unkown
|
page write copy
|
||
5B83000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
4F9B000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
5BD7000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
11B8000
|
heap
|
page read and write
|
||
B82000
|
unkown
|
page execute and write copy
|
||
11C5000
|
heap
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
1199000
|
heap
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
68EE000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
570D000
|
stack
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
4AD1000
|
heap
|
page read and write
|
||
AD5000
|
unkown
|
page execute and read and write
|
||
53F1000
|
trusted library allocation
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
5B14000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
11BA000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
B79000
|
unkown
|
page execute and write copy
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5B84000
|
trusted library allocation
|
page read and write
|
||
119B000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
There are 519 hidden memdumps, click here to show them.