Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\shipment details.exe
|
"C:\Users\user\Desktop\shipment details.exe"
|
||
C:\Users\user\Desktop\shipment details.exe
|
"C:\Users\user\Desktop\shipment details.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot7556271394:AAEi7387e6n5TKFT7iFrsH4cBWT2k35v3D8/sendDocument?chat_id=2135869667&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
|
149.154.167.220
|
||
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:571345%0D%0ADate%20and%20Time:%2009/10/2024%20/%2004:32:20%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20571345%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:571345%0D%0ADate%20a
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://checkip.dyndns.org/
|
158.101.44.242
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://api.telegram.org/bot7556271394:AAEi7387e6n5TKFT7iFrsH4cBWT2k35v3D8/sendDocument?chat_id=2135
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
56.163.245.4.in-addr.arpa
|
unknown
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
158.101.44.242
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
158.101.44.242
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\shipment details_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2DA1000
|
trusted library allocation
|
page read and write
|
||
2F1D000
|
trusted library allocation
|
page read and write
|
||
3AD9000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
9160000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page execute and read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
4276000
|
trusted library allocation
|
page read and write
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
CCB000
|
trusted library allocation
|
page execute and read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
3DC9000
|
trusted library allocation
|
page read and write
|
||
3DBB000
|
trusted library allocation
|
page read and write
|
||
2E47000
|
trusted library allocation
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
2E4B000
|
trusted library allocation
|
page read and write
|
||
301C000
|
trusted library allocation
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
3E10000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
C93000
|
trusted library allocation
|
page execute and read and write
|
||
722000
|
unkown
|
page readonly
|
||
A39000
|
stack
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
3DB4000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
trusted library allocation
|
page execute and read and write
|
||
2EA9000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
6D52000
|
trusted library allocation
|
page read and write
|
||
1126000
|
heap
|
page read and write
|
||
6BBA000
|
trusted library allocation
|
page read and write
|
||
4F71000
|
trusted library allocation
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
3AD1000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
heap
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
3EB2000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
12CD000
|
trusted library allocation
|
page execute and read and write
|
||
3DC1000
|
trusted library allocation
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page execute and read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
30A5000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
CC7000
|
trusted library allocation
|
page execute and read and write
|
||
CA3000
|
trusted library allocation
|
page read and write
|
||
3E09000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page execute and read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page execute and read and write
|
||
410B000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
trusted library allocation
|
page read and write
|
||
2995000
|
trusted library allocation
|
page read and write
|
||
4125000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
4137000
|
trusted library allocation
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
3E1D000
|
trusted library allocation
|
page read and write
|
||
5503000
|
heap
|
page read and write
|
||
2E57000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
301A000
|
trusted library allocation
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
412C000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page execute and read and write
|
||
4F5B000
|
trusted library allocation
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
4148000
|
trusted library allocation
|
page read and write
|
||
41C3000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
40B6000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page execute and read and write
|
||
298F000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library section
|
page readonly
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
111A000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
308F000
|
trusted library allocation
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
2E85000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
trusted library allocation
|
page execute and read and write
|
||
409E000
|
trusted library allocation
|
page read and write
|
||
6A6F000
|
stack
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
7280000
|
heap
|
page read and write
|
||
2E1A000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page execute and read and write
|
||
30AF000
|
trusted library allocation
|
page read and write
|
||
6D26000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library section
|
page read and write
|
||
2E4F000
|
trusted library allocation
|
page read and write
|
||
686D000
|
stack
|
page read and write
|
||
70A0000
|
heap
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
2E5F000
|
trusted library allocation
|
page read and write
|
||
2E07000
|
trusted library allocation
|
page read and write
|
||
C94000
|
trusted library allocation
|
page read and write
|
||
3FC7000
|
trusted library allocation
|
page read and write
|
||
410D000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
40B4000
|
trusted library allocation
|
page read and write
|
||
2F5B000
|
trusted library allocation
|
page read and write
|
||
2E43000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
trusted library allocation
|
page execute and read and write
|
||
4118000
|
trusted library allocation
|
page read and write
|
||
3048000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
6D04000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page execute and read and write
|
||
B37000
|
stack
|
page read and write
|
||
3F99000
|
trusted library allocation
|
page read and write
|
||
2FF2000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page execute and read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
12C3000
|
trusted library allocation
|
page execute and read and write
|
||
3FE3000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page execute and read and write
|
||
5E15000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
53C0000
|
trusted library section
|
page read and write
|
||
413E000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
heap
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page read and write
|
||
CAD000
|
trusted library allocation
|
page execute and read and write
|
||
7622000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
5286000
|
trusted library allocation
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
4143000
|
trusted library allocation
|
page read and write
|
||
528E000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page execute and read and write
|
||
418D000
|
trusted library allocation
|
page read and write
|
||
12EA000
|
trusted library allocation
|
page execute and read and write
|
||
3E2C000
|
trusted library allocation
|
page read and write
|
||
30AB000
|
trusted library allocation
|
page read and write
|
||
12F2000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
53F2000
|
trusted library allocation
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
trusted library allocation
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
6D55000
|
trusted library allocation
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
6BB6000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
trusted library allocation
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page execute and read and write
|
||
2D7C000
|
stack
|
page read and write
|
||
3EFE000
|
trusted library allocation
|
page read and write
|
||
4FD3000
|
heap
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page execute and read and write
|
||
11D3000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
12E6000
|
trusted library allocation
|
page execute and read and write
|
||
675A000
|
heap
|
page read and write
|
||
407C000
|
trusted library allocation
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
406D000
|
trusted library allocation
|
page read and write
|
||
2E0A000
|
trusted library allocation
|
page read and write
|
||
4FFA000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
heap
|
page read and write
|
||
528A000
|
trusted library allocation
|
page read and write
|
||
3E34000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
3E21000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
trusted library allocation
|
page read and write
|
||
4153000
|
trusted library allocation
|
page read and write
|
||
4057000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
heap
|
page read and write
|
||
3E2A000
|
trusted library allocation
|
page read and write
|
||
3E89000
|
trusted library allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
1183000
|
heap
|
page read and write
|
||
DC7000
|
stack
|
page read and write
|
||
12C4000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page execute and read and write
|
||
C60000
|
heap
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
12DD000
|
trusted library allocation
|
page execute and read and write
|
||
3017000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
6F2E000
|
heap
|
page read and write
|
||
79A000
|
unkown
|
page readonly
|
||
5E55000
|
heap
|
page read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
CC2000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
2F92000
|
trusted library allocation
|
page read and write
|
||
6D77000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
heap
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
5E3A000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
6730000
|
heap
|
page read and write
|
||
3FF8000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
5DDE000
|
stack
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
304D000
|
trusted library allocation
|
page read and write
|
||
6BB4000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
3E2F000
|
trusted library allocation
|
page read and write
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page execute and read and write
|
||
12F5000
|
trusted library allocation
|
page execute and read and write
|
||
3025000
|
trusted library allocation
|
page read and write
|
||
3E26000
|
trusted library allocation
|
page read and write
|
||
4272000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
675F000
|
heap
|
page read and write
|
||
3FC4000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
2EA7000
|
trusted library allocation
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
31E7000
|
trusted library allocation
|
page read and write
|
||
C9D000
|
trusted library allocation
|
page execute and read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
stack
|
page read and write
|
||
528C000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
trusted library allocation
|
page execute and read and write
|
||
3E9F000
|
trusted library allocation
|
page read and write
|
||
6BCD000
|
trusted library allocation
|
page read and write
|
||
53CE000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
heap
|
page read and write
|
||
4248000
|
trusted library allocation
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page execute and read and write
|
||
3E17000
|
trusted library allocation
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
3F86000
|
trusted library allocation
|
page read and write
|
||
3F14000
|
trusted library allocation
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
There are 309 hidden memdumps, click here to show them.