IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://property-imper.sbs/api$
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/apie
unknown
https://property-imper.sbs:443/api
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://property-imper.sbs/api
172.67.162.84
https://property-imper.sbs/apin
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://property-imper.sbs/bNC
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://property-imper.sbs:443/apiK
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160
unknown
https://property-imper.sbs/apiw
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://property-imper.sbs/RM
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84

IPs

IP
Domain
Country
Malicious
172.67.162.84
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5B58000
trusted library allocation
page read and write
1214000
heap
page read and write
2EB0000
heap
page read and write
5AB1000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
4B51000
heap
page read and write
5ADE000
trusted library allocation
page read and write
CFE000
unkown
page execute and read and write
5AEE000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
11EA000
heap
page read and write
5AEE000
trusted library allocation
page read and write
11E3000
heap
page read and write
B20000
unkown
page readonly
5BBE000
trusted library allocation
page read and write
4B3F000
stack
page read and write
4FE0000
direct allocation
page read and write
477F000
stack
page read and write
1206000
heap
page read and write
5B3A000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
1207000
heap
page read and write
120C000
heap
page read and write
11F7000
heap
page read and write
4FDD000
stack
page read and write
120C000
heap
page read and write
5AD0000
trusted library allocation
page read and write
1206000
heap
page read and write
5B09000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
1206000
heap
page read and write
5AFA000
trusted library allocation
page read and write
1185000
heap
page read and write
5AB6000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
121B000
heap
page read and write
5B0B000
trusted library allocation
page read and write
11F7000
heap
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
5ACE000
trusted library allocation
page read and write
65CD000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
4B60000
heap
page read and write
5AF6000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
1209000
heap
page read and write
5ADD000
trusted library allocation
page read and write
60B2000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
1212000
heap
page read and write
5ADE000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
11EA000
heap
page read and write
5AC0000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
1212000
heap
page read and write
A8B000
stack
page read and write
B20000
unkown
page read and write
5ADD000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
5C95000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
5AE2000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
39BF000
stack
page read and write
11D8000
heap
page read and write
5B0C000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
11D8000
heap
page read and write
5ADE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
4B51000
heap
page read and write
48BF000
stack
page read and write
387F000
stack
page read and write
2D3E000
stack
page read and write
5B2E000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
120C000
heap
page read and write
30FF000
stack
page read and write
5AEE000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
453E000
stack
page read and write
5AC0000
trusted library allocation
page read and write
417D000
stack
page read and write
4B51000
heap
page read and write
11F4000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
5AF2000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
337F000
stack
page read and write
4B51000
heap
page read and write
5AC2000
trusted library allocation
page read and write
1157000
heap
page read and write
5B07000
trusted library allocation
page read and write
1204000
heap
page read and write
5ABE000
trusted library allocation
page read and write
60BA000
trusted library allocation
page read and write
11D7000
heap
page read and write
4B51000
heap
page read and write
5ADD000
trusted library allocation
page read and write
11F7000
heap
page read and write
11D8000
heap
page read and write
5AC2000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
43FE000
stack
page read and write
5B5F000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
2FBF000
stack
page read and write
5ADA000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
2EBC000
heap
page read and write
5AB7000
trusted library allocation
page read and write
145D000
stack
page read and write
5C9D000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
597E000
stack
page read and write
112E000
heap
page read and write
5AD4000
trusted library allocation
page read and write
1163000
heap
page read and write
5B2B000
trusted library allocation
page read and write
1210000
heap
page read and write
5AC2000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
43BF000
stack
page read and write
5AE8000
trusted library allocation
page read and write
49FF000
stack
page read and write
AF0000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
48FE000
stack
page read and write
120C000
heap
page read and write
5AD3000
trusted library allocation
page read and write
5190000
direct allocation
page execute and read and write
5AC2000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
34BF000
stack
page read and write
4B40000
direct allocation
page read and write
4B40000
direct allocation
page read and write
5AD3000
trusted library allocation
page read and write
1213000
heap
page read and write
5B4B000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
FC2000
unkown
page execute and read and write
5AE1000
trusted library allocation
page read and write
4B50000
heap
page read and write
552E000
stack
page read and write
5AD1000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
5B15000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
4B51000
heap
page read and write
5AD3000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
11FA000
heap
page read and write
5ADF000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
11EA000
heap
page read and write
1166000
heap
page read and write
5AEE000
trusted library allocation
page read and write
1209000
heap
page read and write
5AC0000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
363E000
stack
page read and write
5ABB000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1209000
heap
page read and write
5ADD000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
2E7B000
stack
page read and write
5ADA000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
11D8000
heap
page read and write
5AC2000
trusted library allocation
page read and write
38BE000
stack
page read and write
5ACE000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
120C000
heap
page read and write
56BE000
stack
page read and write
5AEE000
trusted library allocation
page read and write
111E000
stack
page read and write
5AEE000
trusted library allocation
page read and write
4B51000
heap
page read and write
5AB2000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
1163000
heap
page read and write
5AEE000
trusted library allocation
page read and write
120C000
heap
page read and write
5AF5000
trusted library allocation
page read and write
3EBF000
stack
page read and write
53AD000
stack
page read and write
1212000
heap
page read and write
5ABB000
trusted library allocation
page read and write
54EF000
stack
page read and write
4B40000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
2E3F000
stack
page read and write
5AC2000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
1190000
heap
page read and write
5B07000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
5AC1000
trusted library allocation
page read and write
4B51000
heap
page read and write
1153000
heap
page read and write
4B51000
heap
page read and write
1171000
heap
page read and write
5AC2000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
11F8000
heap
page read and write
5AFB000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
11F5000
heap
page read and write
2FFE000
stack
page read and write
5B16000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
34FE000
stack
page read and write
5BDD000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
5AC2000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
5ACC000
trusted library allocation
page read and write
120C000
heap
page read and write
5ADD000
trusted library allocation
page read and write
5650000
remote allocation
page read and write
5ADE000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
5ADD000
trusted library allocation
page read and write
313E000
stack
page read and write
5ADE000
trusted library allocation
page read and write
5CCF000
trusted library allocation
page read and write
155E000
stack
page read and write
4B40000
direct allocation
page read and write
4B51000
heap
page read and write
11D8000
heap
page read and write
5ADE000
trusted library allocation
page read and write
120D000
heap
page read and write
5AC0000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
517D000
stack
page read and write
35FF000
stack
page read and write
57BF000
stack
page read and write
5ADE000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
2EB7000
heap
page read and write
5AC2000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
1204000
heap
page read and write
5AE0000
trusted library allocation
page read and write
B00000
heap
page read and write
5ACC000
trusted library allocation
page read and write
11F5000
heap
page read and write
3AFF000
stack
page read and write
5AED000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
377E000
stack
page read and write
5BBB000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
427F000
stack
page read and write
5AF5000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
3EFE000
stack
page read and write
3C7E000
stack
page read and write
5AF8000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
33BE000
stack
page read and write
5ADE000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
120C000
heap
page read and write
11D7000
heap
page read and write
51B5000
trusted library allocation
page read and write
4B51000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
53EE000
stack
page read and write
E23000
unkown
page execute and write copy
5B29000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
413F000
stack
page read and write
11EA000
heap
page read and write
42BE000
stack
page read and write
5AC1000
trusted library allocation
page read and write
1171000
heap
page read and write
403E000
stack
page read and write
5B18000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
11F7000
heap
page read and write
5AC5000
trusted library allocation
page read and write
1209000
heap
page read and write
5B58000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
B65000
unkown
page execute and read and write
5AB1000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
5B58000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5A7F000
stack
page read and write
5B4A000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
3C3F000
stack
page read and write
5AE4000
trusted library allocation
page read and write
467E000
stack
page read and write
5AC2000
trusted library allocation
page read and write
11D7000
heap
page read and write
11F2000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
4B51000
heap
page read and write
4B51000
heap
page read and write
5ADE000
trusted library allocation
page read and write
E0C000
unkown
page execute and read and write
5B19000
trusted library allocation
page read and write
5B5A000
trusted library allocation
page read and write
1192000
heap
page read and write
3DBE000
stack
page read and write
5ACF000
trusted library allocation
page read and write
4B51000
heap
page read and write
11EA000
heap
page read and write
1245000
heap
page read and write
5AEA000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
11FA000
heap
page read and write
1120000
heap
page read and write
44FF000
stack
page read and write
5ABE000
trusted library allocation
page read and write
1214000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
512F000
stack
page read and write
5ACE000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
1209000
heap
page read and write
5AD4000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5B1D000
trusted library allocation
page read and write
DE1000
unkown
page execute and read and write
5AD4000
trusted library allocation
page read and write
11D7000
heap
page read and write
5AC2000
trusted library allocation
page read and write
FC3000
unkown
page execute and write copy
5AD3000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
4A3E000
stack
page read and write
4B40000
direct allocation
page read and write
5B05000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
502B000
stack
page read and write
4B40000
direct allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1214000
heap
page read and write
5AC2000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
47BE000
stack
page read and write
5ADD000
trusted library allocation
page read and write
463F000
stack
page read and write
11E1000
heap
page read and write
5BC4000
trusted library allocation
page read and write
4B51000
heap
page read and write
120F000
heap
page read and write
5AD5000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
323F000
stack
page read and write
5B58000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
1212000
heap
page read and write
5AE3000
trusted library allocation
page read and write
1166000
heap
page read and write
2E80000
heap
page read and write
1205000
heap
page read and write
5650000
remote allocation
page read and write
5ADE000
trusted library allocation
page read and write
4B51000
heap
page read and write
5AC9000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
11EA000
heap
page read and write
5AC5000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
1209000
heap
page read and write
120C000
heap
page read and write
1209000
heap
page read and write
5AC2000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
1192000
heap
page read and write
120C000
heap
page read and write
5C65000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
1217000
heap
page read and write
5AD5000
trusted library allocation
page read and write
1206000
heap
page read and write
5AED000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
5AEE000
trusted library allocation
page read and write
4B51000
heap
page read and write
5024000
direct allocation
page read and write
5930000
heap
page read and write
5ADE000
trusted library allocation
page read and write
1209000
heap
page read and write
B77000
unkown
page read and write
57FD000
stack
page read and write
4B40000
direct allocation
page read and write
5AD4000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
1209000
heap
page read and write
112A000
heap
page read and write
11D7000
heap
page read and write
5ADE000
trusted library allocation
page read and write
58FE000
stack
page read and write
3FFF000
stack
page read and write
5140000
direct allocation
page execute and read and write
5AEE000
trusted library allocation
page read and write
3D7F000
stack
page read and write
4FE0000
direct allocation
page read and write
5AC2000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
11F7000
heap
page read and write
4B51000
heap
page read and write
10CA000
stack
page read and write
E22000
unkown
page execute and read and write
5B09000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
4B51000
heap
page read and write
1206000
heap
page read and write
5AD0000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1204000
heap
page read and write
120C000
heap
page read and write
5AFA000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
327E000
stack
page read and write
5AC2000
trusted library allocation
page read and write
4B40000
direct allocation
page read and write
1192000
heap
page read and write
5AEB000
trusted library allocation
page read and write
1212000
heap
page read and write
11D8000
heap
page read and write
4B51000
heap
page read and write
B79000
unkown
page execute and read and write
1212000
heap
page read and write
120C000
heap
page read and write
5AC2000
trusted library allocation
page read and write
1204000
heap
page read and write
5B2B000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
120C000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
1204000
heap
page read and write
4B40000
direct allocation
page read and write
5ADE000
trusted library allocation
page read and write
1157000
heap
page read and write
5B2F000
trusted library allocation
page read and write
3B3E000
stack
page read and write
5AC9000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
1185000
heap
page read and write
5180000
direct allocation
page execute and read and write
5ADE000
trusted library allocation
page read and write
E14000
unkown
page execute and read and write
B77000
unkown
page write copy
5AD9000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
52AD000
stack
page read and write
5B07000
trusted library allocation
page read and write
B21000
unkown
page execute and read and write
5AC5000
trusted library allocation
page read and write
118E000
heap
page read and write
5ACE000
trusted library allocation
page read and write
5B15000
trusted library allocation
page read and write
4B51000
heap
page read and write
5B31000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
120C000
heap
page read and write
5B01000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
373F000
stack
page read and write
39FE000
stack
page read and write
1209000
heap
page read and write
5B11000
trusted library allocation
page read and write
1204000
heap
page read and write
5B5F000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
E22000
unkown
page execute and write copy
5AFD000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
120C000
heap
page read and write
562F000
stack
page read and write
5AE9000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
1240000
heap
page read and write
B21000
unkown
page execute and write copy
5AC2000
trusted library allocation
page read and write
1207000
heap
page read and write
5170000
direct allocation
page execute and read and write
120F000
heap
page read and write
5AF8000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5650000
remote allocation
page read and write
5AC2000
trusted library allocation
page read and write
2E90000
heap
page read and write
5AD4000
trusted library allocation
page read and write
141F000
stack
page read and write
5AC2000
trusted library allocation
page read and write
11EA000
heap
page read and write
5B05000
trusted library allocation
page read and write
1209000
heap
page read and write
5B4A000
trusted library allocation
page read and write
1207000
heap
page read and write
5AEE000
trusted library allocation
page read and write
There are 608 hidden memdumps, click here to show them.