Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/api
|
188.114.97.3
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://necklacedmny.store/7
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://necklacedmny.store/apibc
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://necklacedmny.store/api#Q
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://necklacedmny.store/apiZ
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://necklacedmny.store/apis
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
There are 30 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AC1000
|
unkown
|
page execute and read and write
|
||
4C31000
|
heap
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
13AE000
|
heap
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
5CCF000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
C8C000
|
unkown
|
page execute and read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
5EB1000
|
trusted library allocation
|
page read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
5CB8000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5CC9000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5CED000
|
trusted library allocation
|
page read and write
|
||
5CA2000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
5CED000
|
trusted library allocation
|
page read and write
|
||
5CB0000
|
trusted library allocation
|
page read and write
|
||
538D000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
5BCF000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
601A000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CCB000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5BA3000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
D37000
|
unkown
|
page execute and read and write
|
||
1397000
|
heap
|
page read and write
|
||
D15000
|
unkown
|
page execute and write copy
|
||
5BA3000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
5C3F000
|
trusted library allocation
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
D0C000
|
unkown
|
page execute and write copy
|
||
39AE000
|
stack
|
page read and write
|
||
5CB7000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
D2E000
|
unkown
|
page execute and read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
unkown
|
page execute and read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
5CD5000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
1284000
|
heap
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5CAD000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
C9F000
|
unkown
|
page execute and write copy
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
D57000
|
unkown
|
page execute and read and write
|
||
2FAD000
|
heap
|
page read and write
|
||
426D000
|
stack
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
132D000
|
heap
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
unkown
|
page execute and write copy
|
||
462E000
|
stack
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
B1B000
|
unkown
|
page execute and read and write
|
||
CB4000
|
unkown
|
page execute and read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
11A0000
|
heap
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
5BD7000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
DB9000
|
unkown
|
page execute and write copy
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
5CCC000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
54CD000
|
stack
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
5CA0000
|
trusted library allocation
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
5CA3000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
5CB7000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5CA8000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
remote allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
1284000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
DA4000
|
unkown
|
page execute and write copy
|
||
68BC000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
D1F000
|
unkown
|
page execute and write copy
|
||
1284000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
1346000
|
heap
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
59FF000
|
stack
|
page read and write
|
||
1351000
|
heap
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
D2F000
|
unkown
|
page execute and write copy
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
D8F000
|
unkown
|
page execute and read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
unkown
|
page execute and read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
13B1000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
5BC4000
|
trusted library allocation
|
page read and write
|
||
DB9000
|
unkown
|
page execute and read and write
|
||
5CC9000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
AC1000
|
unkown
|
page execute and write copy
|
||
5BAD000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
5BA2000
|
trusted library allocation
|
page read and write
|
||
5CC9000
|
trusted library allocation
|
page read and write
|
||
5C1C000
|
trusted library allocation
|
page read and write
|
||
5ECA000
|
trusted library allocation
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5BB7000
|
trusted library allocation
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
35EE000
|
stack
|
page read and write
|
||
105B000
|
stack
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
5EE2000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
C7E000
|
unkown
|
page execute and write copy
|
||
1349000
|
heap
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
1304000
|
heap
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
unkown
|
page execute and write copy
|
||
1359000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
5CA8000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
5C38000
|
trusted library allocation
|
page read and write
|
||
5BD7000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
5C3A000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
51FF000
|
stack
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
D55000
|
unkown
|
page execute and write copy
|
||
CB2000
|
unkown
|
page execute and write copy
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
remote allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
unkown
|
page readonly
|
||
1284000
|
heap
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
D03000
|
unkown
|
page execute and read and write
|
||
5B6F000
|
stack
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
5C3F000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
unkown
|
page execute and read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5BC4000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
588E000
|
stack
|
page read and write
|
||
50FB000
|
stack
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
555D000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
unkown
|
page execute and write copy
|
||
D17000
|
unkown
|
page execute and read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
5A10000
|
heap
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
44EE000
|
stack
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
D77000
|
unkown
|
page execute and read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
5CA1000
|
trusted library allocation
|
page read and write
|
||
5C38000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
unkown
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
CCA000
|
unkown
|
page execute and write copy
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
13A7000
|
heap
|
page read and write
|
||
5BA5000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
unkown
|
page execute and write copy
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
D95000
|
unkown
|
page execute and write copy
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
unkown
|
page execute and read and write
|
||
30EE000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
unkown
|
page execute and write copy
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
13B1000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CC3000
|
trusted library allocation
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
DA3000
|
unkown
|
page execute and read and write
|
||
1396000
|
heap
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
D0E000
|
unkown
|
page execute and read and write
|
||
5CA7000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
50C0000
|
direct allocation
|
page read and write
|
||
578D000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5CB4000
|
trusted library allocation
|
page read and write
|
||
5CC9000
|
trusted library allocation
|
page read and write
|
||
5CBD000
|
trusted library allocation
|
page read and write
|
||
B1B000
|
unkown
|
page execute and write copy
|
||
31EF000
|
stack
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
remote allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
CDB000
|
unkown
|
page execute and read and write
|
||
1280000
|
heap
|
page read and write
|
||
524D000
|
stack
|
page read and write
|
||
554F000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
unkown
|
page execute and write copy
|
||
4C31000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
C97000
|
unkown
|
page execute and write copy
|
||
13AF000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CC5000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
unkown
|
page execute and write copy
|
||
412E000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
unkown
|
page execute and write copy
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5C38000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
DA3000
|
unkown
|
page execute and write copy
|
||
C97000
|
unkown
|
page execute and read and write
|
||
5F02000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
unkown
|
page execute and write copy
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
D23000
|
unkown
|
page execute and read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
4C31000
|
heap
|
page read and write
|
||
604D000
|
trusted library allocation
|
page read and write
|
||
115A000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
13B1000
|
heap
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
13B6000
|
heap
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
5BD7000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
B27000
|
unkown
|
page execute and write copy
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
There are 542 hidden memdumps, click here to show them.