Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\4W3cB5WEYH.exe
|
"C:\Users\user\Desktop\4W3cB5WEYH.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
wordyfindy.lat
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
curverpluch.lat
|
|||
slipperyloo.lat
|
|||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
tentabatte.lat
|
|||
https://observerfry.lat/api
|
104.21.36.201
|
||
http://crl.microsoft
|
unknown
|
||
manyrestro.lat
|
|||
https://observerfry.lat/p)
|
unknown
|
||
https://observerfry.lat/pi
|
unknown
|
||
shapestickyr.lat
|
|||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://observerfry.lat/
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://observerfry.lat/d
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://observerfry.lat/apit
|
unknown
|
||
talkynicer.lat
|
|||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
bashfulacid.lat
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://observerfry.lat:443/api(
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
observerfry.lat
|
|||
https://observerfry.lat/api(Win
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
observerfry.lat
|
104.21.36.201
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.36.201
|
observerfry.lat
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
BF1000
|
unkown
|
page execute and read and write
|
||
41AF000
|
stack
|
page read and write
|
||
5EDF000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
593F000
|
stack
|
page read and write
|
||
E6A000
|
unkown
|
page execute and write copy
|
||
1811000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
5DF9000
|
trusted library allocation
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
1848000
|
heap
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
E72000
|
unkown
|
page execute and read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
EDF000
|
unkown
|
page execute and write copy
|
||
179F000
|
heap
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
55BD000
|
stack
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
BF1000
|
unkown
|
page execute and write copy
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
C45000
|
unkown
|
page execute and write copy
|
||
1811000
|
heap
|
page read and write
|
||
17D5000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
5E0F000
|
trusted library allocation
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
1822000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
136A000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
C45000
|
unkown
|
page execute and read and write
|
||
1811000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
183E000
|
heap
|
page read and write
|
||
183F000
|
heap
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5DF9000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
E69000
|
unkown
|
page execute and read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
1819000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
178C000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
183F000
|
heap
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
183C000
|
heap
|
page read and write
|
||
1826000
|
heap
|
page read and write
|
||
17B7000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
1795000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page execute and write copy
|
||
63C2000
|
trusted library allocation
|
page read and write
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
E38000
|
unkown
|
page execute and read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
E48000
|
unkown
|
page execute and read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
180A000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
E51000
|
unkown
|
page execute and write copy
|
||
E33000
|
unkown
|
page execute and write copy
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
1817000
|
heap
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
unkown
|
page execute and read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
EDF000
|
unkown
|
page execute and write copy
|
||
1811000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
1846000
|
heap
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
1816000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
unkown
|
page execute and write copy
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
183F000
|
heap
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
1846000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
1846000
|
heap
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
576D000
|
trusted library allocation
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
17B7000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5DFB000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5DC8000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
17B9000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
DF6000
|
unkown
|
page execute and write copy
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
E06000
|
unkown
|
page execute and write copy
|
||
1826000
|
heap
|
page read and write
|
||
183C000
|
heap
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
E44000
|
unkown
|
page execute and write copy
|
||
56BD000
|
stack
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5960000
|
remote allocation
|
page read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
5E16000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
E86000
|
unkown
|
page execute and write copy
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
1819000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
184A000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
C51000
|
unkown
|
page execute and write copy
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5F67000
|
trusted library allocation
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
548D000
|
stack
|
page read and write
|
||
1787000
|
heap
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
5960000
|
remote allocation
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
E40000
|
unkown
|
page execute and write copy
|
||
E57000
|
unkown
|
page execute and read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5DC6000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
175A000
|
heap
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
126B000
|
stack
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
unkown
|
page execute and read and write
|
||
EED000
|
unkown
|
page execute and write copy
|
||
4E71000
|
heap
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
5960000
|
remote allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
E17000
|
unkown
|
page execute and read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
1848000
|
heap
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
68DE000
|
trusted library allocation
|
page read and write
|
||
183E000
|
heap
|
page read and write
|
||
181D000
|
heap
|
page read and write
|
||
E43000
|
unkown
|
page execute and read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5EF7000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5DF9000
|
trusted library allocation
|
page read and write
|
||
5E0E000
|
trusted library allocation
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
EC8000
|
unkown
|
page execute and write copy
|
||
E67000
|
unkown
|
page execute and write copy
|
||
1832000
|
heap
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
DC6000
|
unkown
|
page execute and read and write
|
||
184B000
|
heap
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
1826000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
EED000
|
unkown
|
page execute and read and write
|
||
356E000
|
stack
|
page read and write
|
||
177D000
|
heap
|
page read and write
|
||
1818000
|
heap
|
page read and write
|
||
5EC1000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
5EC6000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
183F000
|
heap
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
1825000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
184A000
|
heap
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
DD1000
|
unkown
|
page execute and write copy
|
||
5676000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
C35000
|
unkown
|
page execute and read and write
|
||
1747000
|
heap
|
page read and write
|
||
180D000
|
heap
|
page read and write
|
||
5344000
|
direct allocation
|
page read and write
|
||
178C000
|
heap
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
ED5000
|
unkown
|
page execute and write copy
|
||
5300000
|
direct allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
ECC000
|
unkown
|
page execute and write copy
|
||
1795000
|
heap
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
1848000
|
heap
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
DDC000
|
unkown
|
page execute and write copy
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
1811000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
5E04000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
ED8000
|
unkown
|
page execute and write copy
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
1826000
|
heap
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
1819000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5EC7000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
194F000
|
stack
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
1798000
|
heap
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E04000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1819000
|
heap
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
1823000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
1823000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
533B000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
17EC000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
181D000
|
heap
|
page read and write
|
||
5E16000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
unkown
|
page execute and read and write
|
||
DF8000
|
unkown
|
page execute and read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
E83000
|
unkown
|
page execute and write copy
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
5779000
|
trusted library allocation
|
page read and write
|
||
181A000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
17B7000
|
heap
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
17D5000
|
heap
|
page read and write
|
||
1819000
|
heap
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
183C000
|
heap
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
E87000
|
unkown
|
page execute and read and write
|
||
17B7000
|
heap
|
page read and write
|
||
175E000
|
heap
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
1826000
|
heap
|
page read and write
|
||
5E25000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
184A000
|
heap
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
17B7000
|
heap
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
16FC000
|
stack
|
page read and write
|
||
1842000
|
heap
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
174C000
|
heap
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
unkown
|
page execute and write copy
|
||
4E60000
|
direct allocation
|
page read and write
|
||
1846000
|
heap
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
E85000
|
unkown
|
page execute and read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
183F000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
5C30000
|
heap
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
ED5000
|
unkown
|
page execute and write copy
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
E60000
|
unkown
|
page execute and read and write
|
||
1845000
|
heap
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
181D000
|
heap
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
5783000
|
trusted library allocation
|
page read and write
|
||
1811000
|
heap
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5D8F000
|
stack
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
4E71000
|
heap
|
page read and write
|
||
179A000
|
heap
|
page read and write
|
||
5DC8000
|
trusted library allocation
|
page read and write
|
||
5DC6000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
unkown
|
page execute and read and write
|
||
183D000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
1832000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
1798000
|
heap
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
There are 616 hidden memdumps, click here to show them.