Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://property-imper.sbs/api$
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/apie
|
unknown
|
||
https://property-imper.sbs:443/api
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://property-imper.sbs/api
|
172.67.162.84
|
||
https://property-imper.sbs/apin
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://property-imper.sbs/bNC
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://property-imper.sbs:443/apiK
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160
|
unknown
|
||
https://property-imper.sbs/apiw
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://property-imper.sbs/RM
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
172.67.162.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.162.84
|
property-imper.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5B58000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
unkown
|
page execute and read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
heap
|
page read and write
|
||
B20000
|
unkown
|
page readonly
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5B3A000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
4FDD000
|
stack
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
65CD000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
60B2000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
A8B000
|
stack
|
page read and write
|
||
B20000
|
unkown
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5C95000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
417D000
|
stack
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
5AE5000
|
trusted library allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
145D000
|
stack
|
page read and write
|
||
5C9D000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5C8D000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
1213000
|
heap
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
FC2000
|
unkown
|
page execute and read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5B12000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
2E7B000
|
stack
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
53AD000
|
stack
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
1171000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
5B16000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5650000
|
remote allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5CCF000
|
trusted library allocation
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
517D000
|
stack
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
57BF000
|
stack
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
2EB7000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
51B5000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
E23000
|
unkown
|
page execute and write copy
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
1171000
|
heap
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
B65000
|
unkown
|
page execute and read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5AB2000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
stack
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
unkown
|
page execute and read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5B5A000
|
trusted library allocation
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
512F000
|
stack
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B1D000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
unkown
|
page execute and read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
FC3000
|
unkown
|
page execute and write copy
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
502B000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
5BC4000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
5650000
|
remote allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5C65000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
1217000
|
heap
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5024000
|
direct allocation
|
page read and write
|
||
5930000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page read and write
|
||
57FD000
|
stack
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
10CA000
|
stack
|
page read and write
|
||
E22000
|
unkown
|
page execute and read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
B79000
|
unkown
|
page execute and read and write
|
||
1212000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5B22000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
1185000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
5ADE000
|
trusted library allocation
|
page read and write
|
||
E14000
|
unkown
|
page execute and read and write
|
||
B77000
|
unkown
|
page write copy
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute and read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
5B31000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
E22000
|
unkown
|
page execute and write copy
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
B21000
|
unkown
|
page execute and write copy
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
120F000
|
heap
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5650000
|
remote allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
141F000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
There are 608 hidden memdumps, click here to show them.