Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\5Setup.exe
|
"C:\Users\user\Desktop\5Setup.exe"
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
|
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fashionablei.sbs
|
|||
strikebripm.sbs
|
|||
ostracizez.sbs
|
|||
offybirhtdi.sbs
|
|||
mediavelk.sbs
|
|||
definitib.sbs
|
|||
elaboretib.sbs
|
|||
activedomest.sbs
|
|||
https://fashionablei.sbs/api
|
188.114.96.3
|
||
arenbootk.sbs
|
|||
http://html4/loose.dtd
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://fashionablei.sbs/api4
|
unknown
|
||
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resourcesKind
|
unknown
|
||
https://fashionablei.sbs:443/api
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://.css
|
unknown
|
||
https://golang.org/pkg/unicode/#IsPrint.
|
unknown
|
||
https://fashionablei.sbs/
|
unknown
|
||
https://fashionablei.sbs/apiO
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://fashionablei.sbs/apiH
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://fashionablei.sbs/apib
|
unknown
|
||
https://fashionablei.sbs/api_
|
unknown
|
||
https://fashionablei.sbs/apid
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://fashionablei.sbs/apiq
|
unknown
|
||
https://fashionablei.sbs/..
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types
|
unknown
|
||
https://fashionablei.sbs/apiob
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://fashionablei.sbs/re
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://fashionablei.sbs/apibuo
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://fashionablei.sbs/ay
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://fashionablei.sbs/n
|
unknown
|
||
https://golang.org/pkg/unicode/#IsPrint.values
|
unknown
|
||
https://fashionablei.sbs/apiopK
|
unknown
|
||
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kindsThe
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-cont
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 44 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fashionablei.sbs
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
fashionablei.sbs
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20AE000
|
direct allocation
|
page read and write
|
||
2058000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2002000
|
direct allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
1730000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
1144000
|
unkown
|
page readonly
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
321D000
|
heap
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
1C2E000
|
direct allocation
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
stack
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
1D24000
|
direct allocation
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
31FA000
|
heap
|
page read and write
|
||
1D2E000
|
direct allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
21CFF000
|
stack
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
316D000
|
heap
|
page read and write
|
||
4B40000
|
remote allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
319D000
|
heap
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
5579000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
10F3000
|
unkown
|
page write copy
|
||
31EB000
|
heap
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
2158000
|
direct allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
1D18000
|
direct allocation
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
1C30000
|
direct allocation
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
3158000
|
heap
|
page read and write
|
||
171D000
|
stack
|
page read and write
|
||
3203000
|
heap
|
page read and write
|
||
1DCC000
|
direct allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
remote allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
3246000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
10AC000
|
unkown
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
1DC8000
|
direct allocation
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
320F000
|
heap
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
1C82000
|
direct allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
1D12000
|
direct allocation
|
page read and write
|
||
4B40000
|
remote allocation
|
page read and write
|
||
1C8C000
|
direct allocation
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
1E00000
|
direct allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
320B000
|
heap
|
page read and write
|
||
1029000
|
unkown
|
page write copy
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
1C08000
|
direct allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
10E4000
|
unkown
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
1DC4000
|
direct allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
1DC6000
|
direct allocation
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
1D29000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
1C91000
|
direct allocation
|
page read and write
|
||
45B000
|
remote allocation
|
page execute and read and write
|
||
1DBE000
|
direct allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
320C000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
10F4000
|
unkown
|
page readonly
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
3223000
|
heap
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
direct allocation
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
2C1000
|
unkown
|
page execute read
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2213F000
|
stack
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
3239000
|
heap
|
page read and write
|
||
14FD000
|
stack
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
2237F000
|
stack
|
page read and write
|
||
221B0000
|
direct allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
1D0C000
|
direct allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
1C40000
|
direct allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
1EFC000
|
direct allocation
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
1033000
|
unkown
|
page write copy
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
1C59000
|
direct allocation
|
page read and write
|
||
1D20000
|
direct allocation
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
1DCE000
|
direct allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
3218000
|
heap
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
4C5D000
|
stack
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
31FC000
|
heap
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
3202000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
1DE4000
|
direct allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1028000
|
unkown
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
1047000
|
unkown
|
page read and write
|
||
1C8E000
|
direct allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
22180000
|
heap
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
31FC000
|
heap
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
320D000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
31EB000
|
heap
|
page read and write
|
||
10B0000
|
unkown
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
1C00000
|
direct allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
1D2C000
|
direct allocation
|
page read and write
|
||
10F3000
|
unkown
|
page write copy
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
1E06000
|
direct allocation
|
page read and write
|
||
1C86000
|
direct allocation
|
page read and write
|
||
101A000
|
unkown
|
page read and write
|
||
1BBD000
|
stack
|
page read and write
|
||
4B2D000
|
stack
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
323D000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
2214D000
|
direct allocation
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
1DCA000
|
direct allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
1049000
|
unkown
|
page write copy
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
10F4000
|
unkown
|
page readonly
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1650000
|
direct allocation
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
323F000
|
heap
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
1B7F000
|
stack
|
page read and write
|
||
10AE000
|
unkown
|
page write copy
|
||
22151000
|
direct allocation
|
page read and write
|
||
1DAE000
|
direct allocation
|
page read and write
|
||
1F56000
|
direct allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
2104000
|
direct allocation
|
page read and write
|
||
1D9C000
|
direct allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
1DB2000
|
direct allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
319D000
|
heap
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
3192000
|
heap
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
320B000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
EE7000
|
heap
|
page read and write
|
||
1BFD000
|
stack
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
21FFF000
|
stack
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
1DEF000
|
direct allocation
|
page read and write
|
||
1030000
|
unkown
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
1D14000
|
direct allocation
|
page read and write
|
||
1D34000
|
direct allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
1C5E000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
stack
|
page read and write
|
||
3221000
|
heap
|
page read and write
|
||
3224000
|
heap
|
page read and write
|
||
1E08000
|
direct allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
1023000
|
unkown
|
page write copy
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
1D8A000
|
direct allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54B2000
|
trusted library allocation
|
page read and write
|
||
1C66000
|
direct allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
15EC000
|
direct allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
1C72000
|
direct allocation
|
page read and write
|
||
1019000
|
unkown
|
page write copy
|
||
319C000
|
heap
|
page read and write
|
||
1DE6000
|
direct allocation
|
page read and write
|
||
1DC2000
|
direct allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
3244000
|
heap
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
10CC000
|
unkown
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
1C70000
|
direct allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
5571000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
1027000
|
unkown
|
page write copy
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
3204000
|
heap
|
page read and write
|
||
15E0000
|
direct allocation
|
page read and write
|
||
1D08000
|
direct allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2203D000
|
stack
|
page read and write
|
||
1C44000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
1DE8000
|
direct allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
2C1000
|
unkown
|
page execute read
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
22144000
|
direct allocation
|
page read and write
|
||
1C4E000
|
direct allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
4C9D000
|
stack
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
2227D000
|
stack
|
page read and write
|
||
321C000
|
heap
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
542F000
|
stack
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
1D98000
|
direct allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
1840000
|
direct allocation
|
page read and write
|
||
22155000
|
direct allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
1C20000
|
direct allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
174C000
|
heap
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
1DBC000
|
direct allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
1DA0000
|
direct allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
15E8000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
323C000
|
heap
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
523F000
|
stack
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
118C000
|
stack
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
3237000
|
heap
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
3237000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
5474000
|
trusted library allocation
|
page read and write
|
||
1C12000
|
direct allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
2241000
|
direct allocation
|
page read and write
|
||
320F000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
1E42000
|
direct allocation
|
page read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
322B000
|
heap
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
221C0000
|
direct allocation
|
page read and write
|
||
22140000
|
direct allocation
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
1640000
|
direct allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
221E0000
|
direct allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
1144000
|
unkown
|
page readonly
|
||
1025000
|
unkown
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
21DFF000
|
stack
|
page read and write
|
||
10EB000
|
unkown
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
2C1000
|
unkown
|
page execute read
|
||
513E000
|
stack
|
page read and write
|
||
21EFE000
|
stack
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
1D36000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
1DD2000
|
direct allocation
|
page read and write
|
||
5658000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
1D96000
|
direct allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
1D00000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
1D1E000
|
direct allocation
|
page read and write
|
||
1019000
|
unkown
|
page write copy
|
There are 549 hidden memdumps, click here to show them.