Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://atten-supporse.biz/p(
|
unknown
|
||
https://atten-supporse.biz/apiuG
|
unknown
|
||
https://atten-supporse.biz/apie
|
unknown
|
||
https://atten-supporse.biz/Cg3
|
unknown
|
||
zinc-sneark.biz
|
|||
https://atten-supporse.biz//
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://atten-supporse.biz/(/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
formy-spill.biz
|
|||
se-blurry.biz
|
|||
https://atten-supporse.biz/apis
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://atten-supporse.biz/apim
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
covery-mover.biz
|
|||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.80.1
|
||
https://atten-supporse.biz/Uidlye;
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://atten-supporse.biz/8/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
atten-supporse.biz
|
|||
https://atten-supporse.biz/api5
|
unknown
|
||
https://atten-supporse.biz/apiye;
|
unknown
|
||
https://atten-supporse.biz:443/api
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
https://atten-supporse.biz/api.
|
unknown
|
||
print-vexer.biz
|
|||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://crl.microsoftyo;
|
unknown
|
||
https://atten-supporse.biz/X/
|
unknown
|
There are 40 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.80.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.80.1
|
atten-supporse.biz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5540000
|
direct allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
60A4000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
19CD000
|
heap
|
page read and write
|
||
19DC000
|
heap
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
5D1F000
|
stack
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
557B000
|
stack
|
page read and write
|
||
609C000
|
trusted library allocation
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
609F000
|
trusted library allocation
|
page read and write
|
||
1958000
|
heap
|
page read and write
|
||
101D000
|
unkown
|
page execute and read and write
|
||
6B64000
|
trusted library allocation
|
page read and write
|
||
6079000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
6099000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page execute and write copy
|
||
19D2000
|
heap
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
19D5000
|
heap
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
5D5E000
|
stack
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
19B2000
|
heap
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
60B7000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
DB3000
|
unkown
|
page write copy
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
32FD000
|
heap
|
page read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
60A2000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
665E000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
60D9000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
19D6000
|
heap
|
page read and write
|
||
1913000
|
heap
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
61AB000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
stack
|
page read and write
|
||
6092000
|
trusted library allocation
|
page read and write
|
||
60AC000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
19C2000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
6065000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
32D0000
|
direct allocation
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
19C2000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
1ADF000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
60A8000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
60BB000
|
trusted library allocation
|
page read and write
|
||
19C1000
|
heap
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
19D6000
|
heap
|
page read and write
|
||
5520000
|
remote allocation
|
page read and write
|
||
60AC000
|
trusted library allocation
|
page read and write
|
||
60A8000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
56D0000
|
direct allocation
|
page execute and read and write
|
||
595D000
|
stack
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
60B3000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
60B4000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
19BF000
|
heap
|
page read and write
|
||
60C8000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
343C000
|
stack
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
1963000
|
heap
|
page read and write
|
||
18EE000
|
heap
|
page read and write
|
||
19AA000
|
heap
|
page read and write
|
||
1918000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
19B9000
|
heap
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
stack
|
page read and write
|
||
607C000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
60AD000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
1961000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
46FD000
|
stack
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
60A2000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
5FAF000
|
stack
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
1925000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
19D1000
|
heap
|
page read and write
|
||
60C3000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
19DC000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
19B2000
|
heap
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
1049000
|
unkown
|
page execute and read and write
|
||
19C4000
|
heap
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
105F000
|
unkown
|
page execute and read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
60F9000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
609E000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
19C5000
|
heap
|
page read and write
|
||
60B9000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
6099000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
60AE000
|
trusted library allocation
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
6073000
|
trusted library allocation
|
page read and write
|
||
60AC000
|
trusted library allocation
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
19C2000
|
heap
|
page read and write
|
||
60AC000
|
trusted library allocation
|
page read and write
|
||
6068000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
609C000
|
trusted library allocation
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
60AF000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
unkown
|
page execute and read and write
|
||
60AB000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
6173000
|
trusted library allocation
|
page read and write
|
||
1954000
|
heap
|
page read and write
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
18EA000
|
heap
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
19BE000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
unkown
|
page execute and read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
19BF000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page read and write
|
||
5680000
|
direct allocation
|
page execute and read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
6097000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
heap
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
60A8000
|
trusted library allocation
|
page read and write
|
||
1051000
|
unkown
|
page execute and read and write
|
||
32BE000
|
stack
|
page read and write
|
||
19DE000
|
heap
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
195D000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5581000
|
direct allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
19AC000
|
heap
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
19DA000
|
heap
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
5520000
|
remote allocation
|
page read and write
|
||
6064000
|
trusted library allocation
|
page read and write
|
||
6065000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
605B000
|
trusted library allocation
|
page read and write
|
||
60CE000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
60A4000
|
trusted library allocation
|
page read and write
|
||
195D000
|
heap
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
32E0000
|
direct allocation
|
page execute and read and write
|
||
47FF000
|
stack
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
60B2000
|
trusted library allocation
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
19B2000
|
heap
|
page read and write
|
||
6295000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
5E5E000
|
stack
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
60CD000
|
trusted library allocation
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
60A9000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
606C000
|
trusted library allocation
|
page read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
6065000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
1918000
|
heap
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
6154000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
6065000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
19A8000
|
heap
|
page read and write
|
||
19AE000
|
heap
|
page read and write
|
||
192E000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
618B000
|
trusted library allocation
|
page read and write
|
||
19D6000
|
heap
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
19B9000
|
heap
|
page read and write
|
||
6064000
|
trusted library allocation
|
page read and write
|
||
32F7000
|
heap
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
6223000
|
trusted library allocation
|
page read and write
|
||
19B7000
|
heap
|
page read and write
|
||
5520000
|
remote allocation
|
page read and write
|
||
19B4000
|
heap
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
605A000
|
trusted library allocation
|
page read and write
|
||
1941000
|
heap
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
19C1000
|
heap
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
1944000
|
heap
|
page read and write
|
||
19BE000
|
heap
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
62C3000
|
trusted library allocation
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
1961000
|
heap
|
page read and write
|
||
606F000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
direct allocation
|
page read and write
|
||
195D000
|
heap
|
page read and write
|
||
6064000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
609E000
|
trusted library allocation
|
page read and write
|
||
19C4000
|
heap
|
page read and write
|
||
1060000
|
unkown
|
page execute and write copy
|
||
19D6000
|
heap
|
page read and write
|
||
11FE000
|
unkown
|
page execute and write copy
|
||
38FF000
|
stack
|
page read and write
|
||
1925000
|
heap
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
139B000
|
stack
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
1941000
|
heap
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
F43000
|
unkown
|
page execute and read and write
|
||
50C1000
|
heap
|
page read and write
|
||
6073000
|
trusted library allocation
|
page read and write
|
||
6099000
|
trusted library allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
19DC000
|
heap
|
page read and write
|
||
60A1000
|
trusted library allocation
|
page read and write
|
||
1923000
|
heap
|
page read and write
|
||
DA2000
|
unkown
|
page execute and read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
571D000
|
stack
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
19BE000
|
heap
|
page read and write
|
||
19DE000
|
heap
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
60ED000
|
trusted library allocation
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
direct allocation
|
page execute and read and write
|
||
129B000
|
stack
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
19B9000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
19C9000
|
heap
|
page read and write
|
||
195F000
|
heap
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
192E000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
direct allocation
|
page read and write
|
||
609F000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
60B4000
|
trusted library allocation
|
page read and write
|
||
6074000
|
trusted library allocation
|
page read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
609D000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
19BE000
|
heap
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
19B2000
|
heap
|
page read and write
|
||
19DE000
|
heap
|
page read and write
|
||
DB3000
|
unkown
|
page write copy
|
||
105F000
|
unkown
|
page execute and write copy
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
19C9000
|
heap
|
page read and write
|
||
195D000
|
heap
|
page read and write
|
||
1999000
|
heap
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
1961000
|
heap
|
page read and write
|
||
5690000
|
direct allocation
|
page execute and read and write
|
||
60CC000
|
trusted library allocation
|
page read and write
|
||
607D000
|
trusted library allocation
|
page read and write
|
||
195D000
|
heap
|
page read and write
|
||
61FB000
|
trusted library allocation
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
There are 529 hidden memdumps, click here to show them.