Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
covery-mover.biz
|
|||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.64.1
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://atten-supporse.biz/apie
|
unknown
|
||
https://atten-supporse.biz/&&
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://crl.micro
|
unknown
|
||
zinc-sneark.biz
|
|||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f10
|
unknown
|
||
https://atten-supporse.biz/p
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://atten-supporse.biz:443/apiicrosoft
|
unknown
|
||
formy-spill.biz
|
|||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
atten-supporse.biz
|
|||
https://atten-supporse.biz:443/api
|
unknown
|
||
se-blurry.biz
|
|||
https://atten-supporse.biz/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
print-vexer.biz
|
|||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://atten-supporse.biz/apii
|
unknown
|
There are 31 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.64.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.64.1
|
atten-supporse.biz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5410000
|
direct allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
16DF000
|
heap
|
page read and write
|
||
5F4A000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
1175000
|
unkown
|
page execute and read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
16CB000
|
heap
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
CDB000
|
stack
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
36CE000
|
stack
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
5F4E000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5FFA000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
582D000
|
stack
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
554F000
|
stack
|
page read and write
|
||
5F61000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
16D3000
|
heap
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
16FE000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
16CD000
|
heap
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
16EA000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
16EF000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
5F0F000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
16F4000
|
heap
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
5F42000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5F6D000
|
trusted library allocation
|
page read and write
|
||
119D000
|
unkown
|
page execute and read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
16DF000
|
heap
|
page read and write
|
||
5F47000
|
trusted library allocation
|
page read and write
|
||
16F4000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
16FF000
|
heap
|
page read and write
|
||
3220000
|
direct allocation
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
604B000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
170B000
|
heap
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
134C000
|
unkown
|
page execute and write copy
|
||
F13000
|
unkown
|
page write copy
|
||
444F000
|
stack
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
5F0C000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
6093000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
unkown
|
page execute and read and write
|
||
572E000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
16EF000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
544B000
|
stack
|
page read and write
|
||
5F6E000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
1650000
|
heap
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
5EEE000
|
stack
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
6A0D000
|
trusted library allocation
|
page read and write
|
||
5F45000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5D3F000
|
stack
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
167E000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
5F69000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
193F000
|
stack
|
page read and write
|
||
55BF000
|
trusted library allocation
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
5F3E000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
16F2000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
5F34000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
60CB000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F47000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
F15000
|
unkown
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
6013000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5F3B000
|
trusted library allocation
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5DAD000
|
stack
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5F41000
|
trusted library allocation
|
page read and write
|
||
5F33000
|
trusted library allocation
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
5FF4000
|
trusted library allocation
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
5F2D000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
16CB000
|
heap
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
16F4000
|
heap
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
11B3000
|
unkown
|
page execute and read and write
|
||
5BEF000
|
stack
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
16C9000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
16F2000
|
heap
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
134B000
|
unkown
|
page execute and read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
5F07000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
EC1000
|
unkown
|
page execute and write copy
|
||
55ED000
|
stack
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
heap
|
page read and write
|
||
5EF3000
|
trusted library allocation
|
page read and write
|
||
5F6D000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5F94000
|
trusted library allocation
|
page read and write
|
||
170B000
|
heap
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
16DB000
|
heap
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
1704000
|
heap
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
5F6E000
|
trusted library allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
5F47000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
161A000
|
heap
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
3230000
|
direct allocation
|
page execute and read and write
|
||
16FE000
|
heap
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
11B3000
|
unkown
|
page execute and write copy
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
5EF7000
|
trusted library allocation
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
170B000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
1704000
|
heap
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
16DF000
|
heap
|
page read and write
|
||
EC1000
|
unkown
|
page execute and read and write
|
||
16FF000
|
heap
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5F0B000
|
trusted library allocation
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
||
170B000
|
heap
|
page read and write
|
||
5F3D000
|
trusted library allocation
|
page read and write
|
||
5EFD000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
167E000
|
heap
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
16EA000
|
heap
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
F02000
|
unkown
|
page execute and read and write
|
||
1764000
|
heap
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
5F63000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5FF7000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5EF1000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
5F6C000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5EF2000
|
trusted library allocation
|
page read and write
|
||
5F16000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
174C000
|
stack
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5EFF000
|
trusted library allocation
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
F13000
|
unkown
|
page write copy
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
16DB000
|
heap
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
596F000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
170B000
|
heap
|
page read and write
|
||
3247000
|
heap
|
page read and write
|
||
5F3C000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
remote allocation
|
page read and write
|
||
5EF5000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5F0B000
|
trusted library allocation
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
64F5000
|
trusted library allocation
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
5F69000
|
trusted library allocation
|
page read and write
|
||
1704000
|
heap
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
5F4A000
|
trusted library allocation
|
page read and write
|
||
60C3000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
5F35000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
5451000
|
direct allocation
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F01000
|
trusted library allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
1648000
|
heap
|
page read and write
|
||
5EFF000
|
trusted library allocation
|
page read and write
|
||
5EF5000
|
trusted library allocation
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
53F0000
|
remote allocation
|
page read and write
|
||
3220000
|
direct allocation
|
page read and write
|
||
5F0C000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
1600000
|
direct allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
unkown
|
page execute and write copy
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
5F6B000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
53F0000
|
remote allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
EC0000
|
unkown
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5F69000
|
trusted library allocation
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
16DC000
|
heap
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
16CB000
|
heap
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
109C000
|
unkown
|
page execute and read and write
|
||
16F4000
|
heap
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
170D000
|
heap
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
1764000
|
heap
|
page read and write
|
||
5F0A000
|
trusted library allocation
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
There are 498 hidden memdumps, click here to show them.