Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/api
|
188.114.97.3
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
navygenerayk.store
|
|||
founpiuer.store
|
|||
thumbystriw.store
|
|||
crisiwarny.store
|
|||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://necklacedmny.store/;
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://necklacedmny.store/apiS
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://necklacedmny.store/#
|
unknown
|
||
https://necklacedmny.store/c
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://necklacedmny.store/api4
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
There are 29 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
necklacedmny.store
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
531000
|
unkown
|
page execute and read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
80A000
|
unkown
|
page execute and write copy
|
||
138A000
|
heap
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
5A28000
|
trusted library allocation
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
516D000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
6ED000
|
unkown
|
page execute and read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
53AF000
|
stack
|
page read and write
|
||
5B27000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
70441000
|
unkown
|
page execute read
|
||
4A11000
|
heap
|
page read and write
|
||
72C000
|
unkown
|
page execute and write copy
|
||
748000
|
unkown
|
page execute and read and write
|
||
12B0000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
72D000
|
unkown
|
page execute and read and write
|
||
139C000
|
heap
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
7A3000
|
unkown
|
page execute and write copy
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
822000
|
unkown
|
page execute and read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5A4A000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
5A2D000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
783000
|
unkown
|
page execute and write copy
|
||
2D10000
|
direct allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
7B5000
|
unkown
|
page execute and read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
139F000
|
heap
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
7045D000
|
unkown
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
5500000
|
remote allocation
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
5D32000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
5A3A000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
5A21000
|
trusted library allocation
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
589000
|
unkown
|
page write copy
|
||
5079000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
82B000
|
unkown
|
page execute and write copy
|
||
4EDC000
|
stack
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
57BF000
|
stack
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
58B000
|
unkown
|
page execute and write copy
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
13A2000
|
heap
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
814000
|
unkown
|
page execute and write copy
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
712000
|
unkown
|
page execute and write copy
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
589000
|
unkown
|
page write copy
|
||
1382000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
12F4000
|
heap
|
page read and write
|
||
2D2D000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
71E000
|
unkown
|
page execute and read and write
|
||
7045F000
|
unkown
|
page readonly
|
||
302F000
|
stack
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
121F000
|
stack
|
page read and write
|
||
82B000
|
unkown
|
page execute and write copy
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
80B000
|
unkown
|
page execute and read and write
|
||
530000
|
unkown
|
page read and write
|
||
743000
|
unkown
|
page execute and write copy
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
70440000
|
unkown
|
page readonly
|
||
136F000
|
heap
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
776000
|
unkown
|
page execute and write copy
|
||
729000
|
unkown
|
page execute and write copy
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
794000
|
unkown
|
page execute and write copy
|
||
137D000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
6739000
|
trusted library allocation
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
129C000
|
stack
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
5A52000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
1392000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page execute and read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
745000
|
unkown
|
page execute and write copy
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
7C8000
|
unkown
|
page execute and read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
5229000
|
trusted library allocation
|
page read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5B28000
|
trusted library allocation
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
786000
|
unkown
|
page execute and read and write
|
||
138A000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
10EE000
|
stack
|
page read and write
|
||
BFB000
|
stack
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
80C000
|
unkown
|
page execute and write copy
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
7AD000
|
unkown
|
page execute and write copy
|
||
58B000
|
unkown
|
page execute and read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
77A000
|
unkown
|
page execute and read and write
|
||
138E000
|
heap
|
page read and write
|
||
139F000
|
heap
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
839000
|
unkown
|
page execute and write copy
|
||
531000
|
unkown
|
page execute and write copy
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
822000
|
unkown
|
page execute and write copy
|
||
139C000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
712000
|
unkown
|
page execute and read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
797000
|
unkown
|
page execute and read and write
|
||
1381000
|
heap
|
page read and write
|
||
7A5000
|
unkown
|
page execute and write copy
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
749000
|
unkown
|
page execute and write copy
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
5500000
|
remote allocation
|
page read and write
|
||
5342000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
77B000
|
unkown
|
page execute and write copy
|
||
1313000
|
heap
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A34000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
6EF000
|
unkown
|
page execute and write copy
|
||
7C7000
|
unkown
|
page execute and write copy
|
||
5500000
|
remote allocation
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
758000
|
unkown
|
page execute and read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
direct allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
597000
|
unkown
|
page execute and write copy
|
||
EFA000
|
stack
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
72B000
|
unkown
|
page execute and read and write
|
||
6227000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
823000
|
unkown
|
page execute and write copy
|
||
1393000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
80E000
|
unkown
|
page execute and read and write
|
||
136D000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
7A4000
|
unkown
|
page execute and read and write
|
||
70456000
|
unkown
|
page readonly
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5A4E000
|
trusted library allocation
|
page read and write
|
||
5A32000
|
trusted library allocation
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
7B0000
|
unkown
|
page execute and read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
137D000
|
heap
|
page read and write
|
||
78D000
|
unkown
|
page execute and read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
unkown
|
page execute and read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
5E9B000
|
trusted library allocation
|
page read and write
|
||
532C000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
unkown
|
page execute and write copy
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
787000
|
unkown
|
page execute and write copy
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
5A26000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
5A45000
|
trusted library allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
7F3000
|
unkown
|
page execute and read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
839000
|
unkown
|
page execute and read and write
|
||
5A1F000
|
stack
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
526D000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2D27000
|
heap
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
708000
|
unkown
|
page execute and read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
83A000
|
unkown
|
page execute and write copy
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
744000
|
unkown
|
page execute and read and write
|
||
138A000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
5DFB000
|
trusted library allocation
|
page read and write
|
||
71D000
|
unkown
|
page execute and write copy
|
There are 510 hidden memdumps, click here to show them.