IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://push-hook.cyou/api
172.67.161.207
malicious
https://push-hook.cyou/
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://push-hook.cyou/ul
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://push-hook.cyou:443/api
unknown
https://push-hook.cyou/m
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://push-hook.cyou:443/apiB
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://push-hook.cyou:443/apiion.txtPK
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
push-hook.cyou
172.67.161.207
malicious

IPs

IP
Domain
Country
Malicious
172.67.161.207
push-hook.cyou
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D6000
unkown
page write copy
5327000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C81000
heap
page read and write
52CC000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
A1000
unkown
page execute read
52F5000
trusted library allocation
page read and write
5337000
trusted library allocation
page read and write
4E8F000
stack
page read and write
52E6000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
2C7D000
heap
page read and write
52E7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
49CE000
stack
page read and write
52DA000
trusted library allocation
page read and write
2C97000
heap
page read and write
52CD000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
2C67000
heap
page read and write
52E6000
trusted library allocation
page read and write
A0000
unkown
page readonly
2C72000
heap
page read and write
52DA000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52FC000
trusted library allocation
page read and write
4ACD000
stack
page read and write
A0000
unkown
page readonly
52E6000
trusted library allocation
page read and write
2C76000
heap
page read and write
52CD000
trusted library allocation
page read and write
2C89000
heap
page read and write
D4000
unkown
page readonly
2C95000
heap
page read and write
A0000
unkown
page readonly
52D5000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
2BFB000
heap
page read and write
5150000
heap
page read and write
533F000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
2C73000
heap
page read and write
52CD000
trusted library allocation
page read and write
5322000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
2C7D000
heap
page read and write
2C76000
heap
page read and write
5307000
trusted library allocation
page read and write
2E9F000
stack
page read and write
52D3000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
2C7D000
heap
page read and write
52E6000
trusted library allocation
page read and write
2C5F000
heap
page read and write
5351000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
5335000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
2B90000
remote allocation
page read and write
52CD000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52F2000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
2C8F000
heap
page read and write
52DA000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
2C99000
heap
page read and write
52ED000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C83000
heap
page read and write
29EE000
stack
page read and write
D6000
unkown
page write copy
5336000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
2BD9000
heap
page read and write
531F000
trusted library allocation
page read and write
2C73000
heap
page read and write
5317000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52C5000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
488D000
stack
page read and write
2B90000
remote allocation
page read and write
52F7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
2C64000
heap
page read and write
5347000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
A1000
unkown
page execute read
52D2000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C74000
heap
page read and write
52D7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C64000
heap
page read and write
5354000
trusted library allocation
page read and write
53C0000
heap
page read and write
52E6000
trusted library allocation
page read and write
2C83000
heap
page read and write
52E6000
trusted library allocation
page read and write
2C7F000
heap
page read and write
52CF000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
2A45000
heap
page read and write
52F7000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
2C7D000
heap
page read and write
52C1000
trusted library allocation
page read and write
2C64000
heap
page read and write
52DA000
trusted library allocation
page read and write
2C77000
heap
page read and write
52D4000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
2C62000
heap
page read and write
5337000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
A0000
unkown
page readonly
2C64000
heap
page read and write
52DF000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2D0E000
stack
page read and write
52D7000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
553B000
trusted library allocation
page read and write
2C7F000
heap
page read and write
C8000
unkown
page readonly
2C72000
heap
page read and write
531A000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
2C97000
heap
page read and write
52DA000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
285B000
stack
page read and write
52C9000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
2DAE000
stack
page read and write
4FDF000
stack
page read and write
52F0000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
2A20000
heap
page read and write
52E8000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
457000
remote allocation
page execute and read and write
52D2000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
2A8C000
stack
page read and write
52DA000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
529F000
stack
page read and write
2EBA000
heap
page read and write
2C07000
heap
page read and write
2C98000
heap
page read and write
52CA000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
4C0D000
stack
page read and write
5307000
trusted library allocation
page read and write
2C72000
heap
page read and write
2C54000
heap
page read and write
2C67000
heap
page read and write
2C72000
heap
page read and write
52D2000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
511E000
stack
page read and write
52DB000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
2BE2000
heap
page read and write
5307000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
2C89000
heap
page read and write
52F1000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
52D3000
trusted library allocation
page read and write
498D000
stack
page read and write
2A40000
heap
page read and write
52CF000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C00000
heap
page read and write
53CC000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
2C95000
heap
page read and write
5403000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C8F000
heap
page read and write
52F3000
trusted library allocation
page read and write
2BCC000
heap
page read and write
52F7000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
2C85000
heap
page read and write
52CF000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
2C07000
heap
page read and write
2BDA000
heap
page read and write
5307000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
C8000
unkown
page readonly
2BC7000
heap
page read and write
2BCC000
heap
page read and write
501D000
stack
page read and write
2BE2000
heap
page read and write
2C72000
heap
page read and write
D0000
unkown
page write copy
52C1000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
D0000
unkown
page write copy
52CC000
trusted library allocation
page read and write
2B5E000
stack
page read and write
52D5000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
29F0000
heap
page read and write
C8000
unkown
page readonly
2B90000
remote allocation
page read and write
52D0000
trusted library allocation
page read and write
2C43000
heap
page read and write
52D8000
trusted library allocation
page read and write
2D90000
heap
page read and write
52D5000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
2C97000
heap
page read and write
533A000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
2C99000
heap
page read and write
464E000
stack
page read and write
2C72000
heap
page read and write
52D5000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
52C6000
trusted library allocation
page read and write
2BE0000
heap
page read and write
5307000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
2C54000
heap
page read and write
2C8F000
heap
page read and write
5375000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
2A47000
heap
page read and write
4D8E000
stack
page read and write
2EBE000
heap
page read and write
A1000
unkown
page execute read
52CD000
trusted library allocation
page read and write
2C7D000
heap
page read and write
4D4F000
stack
page read and write
532E000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
D0000
unkown
page execute and read and write
5307000
trusted library allocation
page read and write
2BFB000
heap
page read and write
52D7000
trusted library allocation
page read and write
2EB0000
heap
page read and write
531F000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
2C64000
heap
page read and write
52DA000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
2B8D000
stack
page read and write
2C77000
heap
page read and write
2C97000
heap
page read and write
52DA000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C75000
heap
page read and write
5326000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
2C72000
heap
page read and write
5353000
trusted library allocation
page read and write
2C72000
heap
page read and write
5351000
trusted library allocation
page read and write
D1000
unkown
page read and write
52D0000
trusted library allocation
page read and write
D4000
unkown
page readonly
2C61000
heap
page read and write
52F7000
trusted library allocation
page read and write
2D5E000
stack
page read and write
519E000
stack
page read and write
2C72000
heap
page read and write
52D8000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C72000
heap
page read and write
5358000
trusted library allocation
page read and write
D4000
unkown
page readonly
52E6000
trusted library allocation
page read and write
2BB7000
heap
page read and write
2C7D000
heap
page read and write
52D5000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
4EDE000
stack
page read and write
4B70000
heap
page read and write
2BFB000
heap
page read and write
400000
remote allocation
page execute and read and write
C8000
unkown
page readonly
295B000
stack
page read and write
533B000
trusted library allocation
page read and write
2C9F000
heap
page read and write
52E7000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
4C4E000
stack
page read and write
2C72000
heap
page read and write
2C76000
heap
page read and write
52E6000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
2C95000
heap
page read and write
5310000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C07000
heap
page read and write
2BCF000
heap
page read and write
5363000
trusted library allocation
page read and write
2CC0000
heap
page read and write
52D0000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
52CA000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
D6000
unkown
page write copy
2C89000
heap
page read and write
52F7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
2C8D000
heap
page read and write
52F1000
trusted library allocation
page read and write
52EF000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
2C54000
heap
page read and write
2C66000
heap
page read and write
5473000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
A1000
unkown
page execute read
2BFD000
heap
page read and write
52DA000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
2C7B000
heap
page read and write
52F7000
trusted library allocation
page read and write
52F6000
trusted library allocation
page read and write
2C97000
heap
page read and write
52F2000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
5326000
trusted library allocation
page read and write
2C95000
heap
page read and write
2C98000
heap
page read and write
52CB000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
2C8F000
heap
page read and write
2C72000
heap
page read and write
5308000
trusted library allocation
page read and write
2C73000
heap
page read and write
5306000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
2C68000
heap
page read and write
2C98000
heap
page read and write
52F6000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
2CAE000
heap
page read and write
52D5000
trusted library allocation
page read and write
484F000
stack
page read and write
5EEF000
trusted library allocation
page read and write
52C9000
trusted library allocation
page read and write
2B70000
heap
page read and write
52D0000
trusted library allocation
page read and write
5423000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
D6000
unkown
page write copy
4B0D000
stack
page read and write
5307000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
556B000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
2C68000
heap
page read and write
52DA000
trusted library allocation
page read and write
2C84000
heap
page read and write
52D7000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
29A0000
heap
page read and write
2C64000
heap
page read and write
52D7000
trusted library allocation
page read and write
2C68000
heap
page read and write
D0000
unkown
page write copy
5307000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
52DA000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
2C76000
heap
page read and write
5307000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
2C85000
heap
page read and write
52E7000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
2C95000
heap
page read and write
52E7000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
52D7000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
2C46000
heap
page read and write
52E6000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
52CA000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
2C95000
heap
page read and write
52D5000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
53C1000
heap
page read and write
52F7000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
2BB0000
heap
page read and write
5307000
trusted library allocation
page read and write
D4000
unkown
page readonly
52F6000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
2C64000
heap
page read and write
2C67000
heap
page read and write
52CB000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
2BE2000
heap
page read and write
There are 545 hidden memdumps, click here to show them.