Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://crisiwarny.store/api
|
104.21.95.91
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://crisiwarny.store/apii
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://crisiwarny.store/apifeM
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://crisiwarny.store/apie
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://crisiwarny.store/_y
|
unknown
|
||
https://crisiwarny.store/roxy-Authenticat
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://crisiwarny.store/=
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://crisiwarny.store/apiFT
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://crisiwarny.store/o
|
unknown
|
||
https://crisiwarny.store/apila
|
unknown
|
||
https://crisiwarny.store/apiz
|
unknown
|
||
https://crisiwarny.store/p
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://crisiwarny.store/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 35 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
crisiwarny.store
|
104.21.95.91
|
||
presticitpo.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.95.91
|
crisiwarny.store
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
491000
|
unkown
|
page execute and read and write
|
||
108B000
|
heap
|
page read and write
|
||
2BF7000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
733000
|
unkown
|
page execute and read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
unkown
|
page execute and write copy
|
||
C5B000
|
stack
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
682000
|
unkown
|
page execute and read and write
|
||
69B000
|
unkown
|
page execute and read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
remote allocation
|
page read and write
|
||
57EB000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
105F000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
6E5000
|
unkown
|
page execute and read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
1068000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
723000
|
unkown
|
page execute and write copy
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
remote allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
5947000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
6DE000
|
unkown
|
page execute and write copy
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
4F8D000
|
stack
|
page read and write
|
||
491000
|
unkown
|
page execute and write copy
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
515B000
|
trusted library allocation
|
page read and write
|
||
58A2000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
6E6000
|
unkown
|
page execute and write copy
|
||
437E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and write copy
|
||
3BFE000
|
stack
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
FDE000
|
heap
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
unkown
|
page execute and write copy
|
||
105F000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
5A11000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
55FF000
|
stack
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
732000
|
unkown
|
page execute and write copy
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
744000
|
unkown
|
page execute and read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
681000
|
unkown
|
page execute and write copy
|
||
58A8000
|
trusted library allocation
|
page read and write
|
||
5171000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
D5A000
|
stack
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
505E000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
6EE000
|
unkown
|
page execute and read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
6B5000
|
unkown
|
page execute and write copy
|
||
E74000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
65A000
|
unkown
|
page execute and write copy
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
695000
|
unkown
|
page execute and write copy
|
||
520F000
|
stack
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
5834000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
712000
|
unkown
|
page execute and read and write
|
||
1063000
|
heap
|
page read and write
|
||
FE4000
|
heap
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
6C6000
|
unkown
|
page execute and read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
776000
|
unkown
|
page execute and read and write
|
||
1061000
|
heap
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
7A5000
|
unkown
|
page execute and write copy
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
6F7000
|
unkown
|
page execute and write copy
|
||
333E000
|
stack
|
page read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
4CFB000
|
stack
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
584C000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
584C000
|
trusted library allocation
|
page read and write
|
||
724000
|
unkown
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
4CB0000
|
remote allocation
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
1087000
|
heap
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
538D000
|
stack
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
107C000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
6B2000
|
unkown
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
58C1000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
5167000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
6B1000
|
unkown
|
page execute and write copy
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
5971000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
57B3000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
FCD000
|
heap
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
5804000
|
trusted library allocation
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
FC8000
|
heap
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
658000
|
unkown
|
page execute and read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
4EB000
|
unkown
|
page execute and write copy
|
||
742000
|
unkown
|
page execute and write copy
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
4EB000
|
unkown
|
page execute and read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
68B000
|
unkown
|
page execute and write copy
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
57FF000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
7A4000
|
unkown
|
page execute and read and write
|
||
107F000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
548D000
|
stack
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
unkown
|
page execute and write copy
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
108C000
|
heap
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
583F000
|
trusted library allocation
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
77E000
|
unkown
|
page execute and write copy
|
||
36FE000
|
stack
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
106C000
|
heap
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
6AF000
|
unkown
|
page execute and read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
71A000
|
unkown
|
page execute and write copy
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
794000
|
unkown
|
page execute and write copy
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
58AC000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
70B000
|
unkown
|
page execute and write copy
|
||
68C000
|
unkown
|
page execute and read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
78C000
|
unkown
|
page execute and read and write
|
||
E74000
|
heap
|
page read and write
|
||
6FB000
|
unkown
|
page execute and read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
58A1000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
761000
|
unkown
|
page execute and read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
108B000
|
heap
|
page read and write
|
||
775000
|
unkown
|
page execute and write copy
|
||
108B000
|
heap
|
page read and write
|
||
2BAB000
|
stack
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
58F9000
|
trusted library allocation
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
675000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
128F000
|
stack
|
page read and write
|
||
78A000
|
unkown
|
page execute and write copy
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
4E9F000
|
trusted library allocation
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
57B3000
|
trusted library allocation
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
794000
|
unkown
|
page execute and write copy
|
||
78D000
|
unkown
|
page execute and write copy
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
2BFD000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
1007000
|
heap
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
1061000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
57EA000
|
trusted library allocation
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
105F000
|
heap
|
page read and write
|
||
71B000
|
unkown
|
page execute and read and write
|
||
57B7000
|
trusted library allocation
|
page read and write
|
||
50CD000
|
stack
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
There are 545 hidden memdumps, click here to show them.