Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe
|
"C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe"
|
||
C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe
|
"C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs:443/apiicrosoft
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://property-imper.sbs/apij
|
unknown
|
||
http://147.45.47.81/
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://147.45.47.81/conhost.exe
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://147.45.47.81/conhost.exeZ
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://147.45.47.81/conhost.exec
|
unknown
|
||
http://147.45.47.81/4
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://property-imper.sbs/a
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://property-imper.sbs/accoC7
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://147.45.47.81:80/conhost.exeK
|
unknown
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.33.116
|
property-imper.sbs
|
United States
|
||
147.45.47.81
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5CED000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
38B000
|
unkown
|
page write copy
|
||
359C000
|
heap
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
3587000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
5CC4000
|
trusted library allocation
|
page read and write
|
||
3578000
|
heap
|
page read and write
|
||
5CF3000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
3514000
|
heap
|
page read and write
|
||
3564000
|
heap
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5CDB000
|
trusted library allocation
|
page read and write
|
||
68DB000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
5CB6000
|
trusted library allocation
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
5E6F000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
5CC3000
|
trusted library allocation
|
page read and write
|
||
38B000
|
unkown
|
page execute and read and write
|
||
558E000
|
stack
|
page read and write
|
||
357C000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
568F000
|
stack
|
page read and write
|
||
36C0000
|
remote allocation
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
347E000
|
stack
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
5CB4000
|
trusted library allocation
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
383000
|
unkown
|
page readonly
|
||
35AE000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5DBF000
|
trusted library allocation
|
page read and write
|
||
5CAF000
|
stack
|
page read and write
|
||
38F000
|
unkown
|
page readonly
|
||
35A8000
|
heap
|
page read and write
|
||
38B000
|
unkown
|
page write copy
|
||
591F000
|
stack
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
540D000
|
stack
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5CB5000
|
trusted library allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
25DC000
|
stack
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
5CB2000
|
trusted library allocation
|
page read and write
|
||
3589000
|
heap
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
298D000
|
stack
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
357A000
|
heap
|
page read and write
|
||
5D2E000
|
trusted library allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
391000
|
unkown
|
page write copy
|
||
5CCF000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
remote allocation
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
38B000
|
unkown
|
page write copy
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
35AE000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CCD000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
361000
|
unkown
|
page execute read
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5D2F000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
56CD000
|
stack
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
5CC3000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
355B000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
5CB1000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
5EBB000
|
trusted library allocation
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
383000
|
unkown
|
page readonly
|
||
361000
|
unkown
|
page execute read
|
||
32FA000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
34BA000
|
heap
|
page read and write
|
||
34FE000
|
heap
|
page read and write
|
||
35A4000
|
heap
|
page read and write
|
||
391000
|
unkown
|
page write copy
|
||
5D08000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
391000
|
unkown
|
page write copy
|
||
38F000
|
unkown
|
page readonly
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
3587000
|
heap
|
page read and write
|
||
3594000
|
heap
|
page read and write
|
||
5CDB000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
5FC4000
|
trusted library allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
5CDE000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
38F000
|
unkown
|
page readonly
|
||
3564000
|
heap
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
3514000
|
heap
|
page read and write
|
||
5CCF000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
391000
|
unkown
|
page write copy
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
3575000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
5CDD000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
383000
|
unkown
|
page readonly
|
||
3510000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D32000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
38C000
|
unkown
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
3568000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
34D3000
|
heap
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
34E4000
|
heap
|
page read and write
|
||
383000
|
unkown
|
page readonly
|
||
3587000
|
heap
|
page read and write
|
||
35A3000
|
heap
|
page read and write
|
||
5CDB000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
5CC4000
|
trusted library allocation
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
3587000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
357C000
|
heap
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
5CBF000
|
trusted library allocation
|
page read and write
|
||
38F000
|
unkown
|
page readonly
|
||
5CDC000
|
trusted library allocation
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
24DC000
|
stack
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
5F0C000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
357C000
|
heap
|
page read and write
|
||
5CCB000
|
trusted library allocation
|
page read and write
|
||
3589000
|
heap
|
page read and write
|
||
3559000
|
heap
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
5CC4000
|
trusted library allocation
|
page read and write
|
||
29D3000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
5ED4000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
||
5CD6000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
5D11000
|
trusted library allocation
|
page read and write
|
||
5CBF000
|
trusted library allocation
|
page read and write
|
||
457000
|
remote allocation
|
page execute and read and write
|
||
34E0000
|
heap
|
page read and write
|
||
3592000
|
heap
|
page read and write
|
||
5CDC000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
5CC4000
|
trusted library allocation
|
page read and write
|
||
3577000
|
heap
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
3591000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
36C0000
|
remote allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
5CC1000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
36E6000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
3587000
|
heap
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5D32000
|
trusted library allocation
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
5D32000
|
trusted library allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
35AB000
|
heap
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
heap
|
page read and write
|
||
3594000
|
heap
|
page read and write
|
||
35A3000
|
heap
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5CBF000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
5CB0000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
3573000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
63BF000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
5CB3000
|
trusted library allocation
|
page read and write
|
||
43FD000
|
stack
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5CB6000
|
trusted library allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
35A3000
|
heap
|
page read and write
|
||
2F7B000
|
stack
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
3572000
|
heap
|
page read and write
|
||
5F94000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
35A5000
|
heap
|
page read and write
|
There are 380 hidden memdumps, click here to show them.