Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\injector V2.4.exe
|
"C:\Users\user\Desktop\injector V2.4.exe"
|
||
C:\Users\user\Desktop\injector V2.4.exe
|
"C:\Users\user\Desktop\injector V2.4.exe"
|
||
C:\Users\user\Desktop\injector V2.4.exe
|
"C:\Users\user\Desktop\injector V2.4.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fumblingactor.cyou
|
|||
https://fumblingactor.cyou/api
|
172.67.219.199
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://fumblingactor.cyou/apig
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
|
unknown
|
||
https://fumblingactor.cyou/s
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://fumblingactor.cyou/apiY
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://fumblingactor.cyou:443/api
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
peepburry828.sbs
|
|||
https://fumblingactor.cyou/apiM
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
|
unknown
|
||
https://fumblingactor.cyou:443/apiTlZT
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://fumblingactor.cyou/apiq
|
unknown
|
||
p10tgrace.sbs
|
|||
https://fumblingactor.cyou/#
|
unknown
|
||
https://fumblingactor.cyou/apik
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
processhol.sbs
|
|||
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://fumblingactor.cyou/3
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://fumblingactor.cyou:443/apiicrosoft
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
p3ar11fter.sbs
|
|||
https://fumblingactor.cyou/
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://fumblingactor.cyou/K
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
|
unknown
|
||
https://fumblingactor.cyou/api;
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 39 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fumblingactor.cyou
|
172.67.219.199
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.219.199
|
fumblingactor.cyou
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
999000
|
heap
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
4F0C000
|
trusted library allocation
|
page read and write
|
||
5768000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4164000
|
trusted library allocation
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4F35000
|
trusted library allocation
|
page read and write
|
||
4F0F000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4F99000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
unkown
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4E67000
|
trusted library allocation
|
page read and write
|
||
1CB000
|
stack
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
4F0C000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
unkown
|
page write copy
|
||
4160000
|
heap
|
page read and write
|
||
4E94000
|
trusted library allocation
|
page read and write
|
||
4F04000
|
trusted library allocation
|
page read and write
|
||
4ED5000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page read and write
|
||
4EDF000
|
trusted library allocation
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
4F35000
|
trusted library allocation
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
526000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F0A000
|
trusted library allocation
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
4E7D000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
536000
|
heap
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
89E000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
5C73000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4E8C000
|
trusted library allocation
|
page read and write
|
||
4E9B000
|
trusted library allocation
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
4F6D000
|
trusted library allocation
|
page read and write
|
||
4F0B000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4EDD000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F0A000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4E6B000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
458000
|
remote allocation
|
page execute and read and write
|
||
4EDC000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
4F07000
|
trusted library allocation
|
page read and write
|
||
4EE6000
|
trusted library allocation
|
page read and write
|
||
5215000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4EE8000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
trusted library allocation
|
page read and write
|
||
516E000
|
trusted library allocation
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4EF5000
|
trusted library allocation
|
page read and write
|
||
502000
|
heap
|
page read and write
|
||
4EF5000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F0B000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
4EDF000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4F15000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
52F000
|
heap
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
4E89000
|
trusted library allocation
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4B5F000
|
stack
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
2CBF000
|
stack
|
page read and write
|
||
4E6B000
|
trusted library allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
4F0B000
|
trusted library allocation
|
page read and write
|
||
4B2000
|
heap
|
page read and write
|
||
4F29000
|
trusted library allocation
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4E65000
|
trusted library allocation
|
page read and write
|
||
4E76000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
502000
|
heap
|
page read and write
|
||
51A5000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4EF2000
|
trusted library allocation
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
B20000
|
unkown
|
page readonly
|
||
4E7D000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
720000
|
heap
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
trusted library allocation
|
page read and write
|
||
4E99000
|
trusted library allocation
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
4E67000
|
trusted library allocation
|
page read and write
|
||
4E8C000
|
trusted library allocation
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
8ED000
|
stack
|
page read and write
|
||
4E98000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page read and write
|
||
52FA000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4F0C000
|
trusted library allocation
|
page read and write
|
||
4EDC000
|
trusted library allocation
|
page read and write
|
||
4E65000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4E6B000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F13000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4EDC000
|
trusted library allocation
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
523D000
|
trusted library allocation
|
page read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
464D000
|
stack
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
53D000
|
heap
|
page read and write
|
||
4EE8000
|
trusted library allocation
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
unkown
|
page write copy
|
||
4E65000
|
trusted library allocation
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
trusted library allocation
|
page read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
4EE6000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
stack
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
4F15000
|
trusted library allocation
|
page read and write
|
||
4F18000
|
trusted library allocation
|
page read and write
|
||
4EA2000
|
trusted library allocation
|
page read and write
|
||
4EF5000
|
trusted library allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
unkown
|
page write copy
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
542000
|
heap
|
page read and write
|
||
4ED8000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
5269000
|
trusted library allocation
|
page read and write
|
||
4E99000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
unkown
|
page write copy
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F97000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
42C0000
|
heap
|
page read and write
|
||
488000
|
heap
|
page read and write
|
||
4C9000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4C9E000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
5174000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
3BD000
|
stack
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4EFF000
|
trusted library allocation
|
page read and write
|
||
4E89000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
534000
|
heap
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
4F1B000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
4F04000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
4E66000
|
trusted library allocation
|
page read and write
|
||
4E98000
|
trusted library allocation
|
page read and write
|
||
4F04000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
4E63000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
7ED000
|
stack
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
4E93000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4F99000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4EA2000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4EDC000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
4E6A000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
526000
|
heap
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
51C5000
|
trusted library allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
4E99000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
trusted library allocation
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
remote allocation
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
4F0F000
|
trusted library allocation
|
page read and write
|
||
4F0F000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
509C000
|
trusted library allocation
|
page read and write
|
||
524D000
|
trusted library allocation
|
page read and write
|
||
500C000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
4E6C000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
4EFE000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
4EDF000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
533000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute read
|
||
B63000
|
unkown
|
page write copy
|
||
4F02000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
526000
|
heap
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
537000
|
heap
|
page read and write
|
||
4B2000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
52C000
|
heap
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
4EED000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
CB000
|
stack
|
page read and write
|
||
4EE6000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
498000
|
heap
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
4F03000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
4EE5000
|
trusted library allocation
|
page read and write
|
||
4F2B000
|
trusted library allocation
|
page read and write
|
||
4F0F000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
518D000
|
trusted library allocation
|
page read and write
|
||
4F08000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
4E5F000
|
stack
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
B5D000
|
unkown
|
page write copy
|
||
6FD000
|
stack
|
page read and write
|
||
4EE5000
|
trusted library allocation
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
49F0000
|
remote allocation
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
49F0000
|
remote allocation
|
page read and write
|
||
4E6D000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
unkown
|
page execute and read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4E8C000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
4E89000
|
trusted library allocation
|
page read and write
|
||
4EDA000
|
trusted library allocation
|
page read and write
|
||
4C9000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4EDC000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
474D000
|
stack
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4F0A000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
4F1C000
|
trusted library allocation
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
4E89000
|
trusted library allocation
|
page read and write
|
||
4F0B000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
4E93000
|
trusted library allocation
|
page read and write
|
||
4EDF000
|
trusted library allocation
|
page read and write
|
||
52DD000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4E6C000
|
trusted library allocation
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
4F0A000
|
trusted library allocation
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
4EE7000
|
trusted library allocation
|
page read and write
|
||
4EDF000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
There are 437 hidden memdumps, click here to show them.