IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/apiZf
unknown
https://property-imper.sbs:443/api
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://property-imper.sbs/api$#
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://property-imper.sbs/api
104.21.33.116
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://property-imper.sbs/apis#N
unknown
https://property-imper.sbs/lmy
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://property-imper.sbs:443/apiK
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://property-imper.sbs/apiH#
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://property-imper.sbs/4m
unknown
https://property-imper.sbs:443/api.default-release/key4.dbPK
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5581000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
F61000
heap
page read and write
5586000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
537E000
stack
page read and write
961000
unkown
page execute and write copy
55AB000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
950000
direct allocation
page read and write
55B4000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
527E000
stack
page read and write
55E4000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
FEC000
heap
page read and write
FFE000
heap
page read and write
561E000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
40CF000
stack
page read and write
55B4000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
5593000
trusted library allocation
page read and write
54EF000
stack
page read and write
45D1000
heap
page read and write
55A6000
trusted library allocation
page read and write
557D000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
3A8F000
stack
page read and write
5577000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
448F000
stack
page read and write
55B4000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
45D1000
heap
page read and write
55E7000
trusted library allocation
page read and write
F75000
heap
page read and write
5593000
trusted library allocation
page read and write
F84000
heap
page read and write
55C3000
trusted library allocation
page read and write
F60000
heap
page read and write
FE1000
heap
page read and write
FFC000
heap
page read and write
55A4000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
523F000
stack
page read and write
5594000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
B42000
unkown
page execute and read and write
FEA000
heap
page read and write
438E000
stack
page read and write
5593000
trusted library allocation
page read and write
380000
heap
page read and write
5679000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
50AF000
stack
page read and write
55B8000
trusted library allocation
page read and write
561E000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
940000
heap
page read and write
559F000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
55D7000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
FEA000
heap
page read and write
55A5000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
FEB000
heap
page read and write
558A000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
27DE000
stack
page read and write
5593000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
559E000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
390000
heap
page read and write
2B8F000
stack
page read and write
45D1000
heap
page read and write
5588000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
FFE000
heap
page read and write
55A7000
trusted library allocation
page read and write
9B9000
unkown
page execute and read and write
55BC000
trusted library allocation
page read and write
C5B000
unkown
page execute and read and write
3D4E000
stack
page read and write
55A2000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
561E000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
FEB000
heap
page read and write
380F000
stack
page read and write
55A6000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
F82000
heap
page read and write
6087000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
55CA000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
F67000
heap
page read and write
5594000
trusted library allocation
page read and write
5560000
heap
page read and write
55CA000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
55A6000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
55A4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
FFE000
heap
page read and write
5579000
trusted library allocation
page read and write
358F000
stack
page read and write
F60000
heap
page read and write
2A8E000
stack
page read and write
370E000
stack
page read and write
55E9000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
45D1000
heap
page read and write
4A5D000
stack
page read and write
55FC000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
5587000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
F6B000
heap
page read and write
55A4000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
961000
unkown
page execute and read and write
559F000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
561E000
trusted library allocation
page read and write
DF7000
unkown
page execute and write copy
5577000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
4BAF000
stack
page read and write
5581000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
2CCF000
stack
page read and write
FEB000
heap
page read and write
F84000
heap
page read and write
55A4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
2F4F000
stack
page read and write
558D000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
334E000
stack
page read and write
55B4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
55B6000
trusted library allocation
page read and write
F75000
heap
page read and write
5593000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
567D000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
FEA000
heap
page read and write
2E4E000
stack
page read and write
5593000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
FEF000
heap
page read and write
5587000
trusted library allocation
page read and write
3D0E000
stack
page read and write
55B9000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5746000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
FCB000
heap
page read and write
5579000
trusted library allocation
page read and write
348E000
stack
page read and write
55A4000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
EFE000
stack
page read and write
5586000
trusted library allocation
page read and write
FF5000
heap
page read and write
FFE000
heap
page read and write
5591000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55BF000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
FD8000
heap
page read and write
55CA000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
45D1000
heap
page read and write
FCE000
heap
page read and write
31B000
stack
page read and write
45D1000
heap
page read and write
F0E000
heap
page read and write
F45000
heap
page read and write
55A6000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
5588000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
290D000
heap
page read and write
308F000
stack
page read and write
55B4000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55F9000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
825000
heap
page read and write
4C39000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
FEE000
heap
page read and write
FEA000
heap
page read and write
558B000
trusted library allocation
page read and write
4F6F000
stack
page read and write
55A4000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
55A2000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
950000
direct allocation
page read and write
53EE000
stack
page read and write
5582000
trusted library allocation
page read and write
55AC000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
FF7000
heap
page read and write
92E000
stack
page read and write
F00000
heap
page read and write
55A4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
FA9000
heap
page read and write
5593000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
FE7000
heap
page read and write
FE5000
heap
page read and write
55E9000
trusted library allocation
page read and write
FFE000
heap
page read and write
55A4000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
5587000
trusted library allocation
page read and write
FF2000
heap
page read and write
5575000
trusted library allocation
page read and write
45D1000
heap
page read and write
3BCF000
stack
page read and write
5B76000
trusted library allocation
page read and write
FD8000
heap
page read and write
55B4000
trusted library allocation
page read and write
C4C000
unkown
page execute and read and write
45D1000
heap
page read and write
4A10000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
C45000
unkown
page execute and read and write
44CE000
stack
page read and write
5577000
trusted library allocation
page read and write
F84000
heap
page read and write
55E9000
trusted library allocation
page read and write
45D0000
heap
page read and write
5593000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
950000
direct allocation
page read and write
384E000
stack
page read and write
55D0000
trusted library allocation
page read and write
4E2D000
stack
page read and write
55A4000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
2900000
heap
page read and write
55B0000
trusted library allocation
page read and write
45D1000
heap
page read and write
55A7000
trusted library allocation
page read and write
3E8E000
stack
page read and write
5594000
trusted library allocation
page read and write
410E000
stack
page read and write
398E000
stack
page read and write
2BCE000
stack
page read and write
5593000
trusted library allocation
page read and write
30CE000
stack
page read and write
3E4F000
stack
page read and write
C18000
unkown
page execute and read and write
FF7000
heap
page read and write
55A4000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
9B7000
unkown
page write copy
574E000
trusted library allocation
page read and write
FD8000
heap
page read and write
5593000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
FFC000
heap
page read and write
950000
direct allocation
page read and write
950000
direct allocation
page read and write
FA9000
heap
page read and write
55A9000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
294C000
stack
page read and write
FFE000
heap
page read and write
5593000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
45D1000
heap
page read and write
55AC000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
950000
direct allocation
page read and write
5587000
trusted library allocation
page read and write
F75000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
820000
heap
page read and write
45E1000
heap
page read and write
55A4000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
2F8E000
stack
page read and write
F7E000
heap
page read and write
558D000
trusted library allocation
page read and write
320E000
stack
page read and write
960000
unkown
page read and write
4A60000
direct allocation
page read and write
F69000
heap
page read and write
5571000
trusted library allocation
page read and write
35CE000
stack
page read and write
950000
direct allocation
page read and write
558A000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
9B7000
unkown
page read and write
55A4000
trusted library allocation
page read and write
2A4F000
stack
page read and write
55B4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
394F000
stack
page read and write
3FE000
stack
page read and write
F37000
heap
page read and write
424E000
stack
page read and write
5593000
trusted library allocation
page read and write
950000
direct allocation
page read and write
FE5000
heap
page read and write
55A4000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
559E000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
3ACE000
stack
page read and write
55B4000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
45D1000
heap
page read and write
4D2E000
stack
page read and write
FDD000
heap
page read and write
950000
direct allocation
page read and write
FF5000
heap
page read and write
3C0D000
stack
page read and write
55B4000
trusted library allocation
page read and write
FEA000
heap
page read and write
55A4000
trusted library allocation
page read and write
45D1000
heap
page read and write
FEB000
heap
page read and write
5593000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
FC8000
heap
page read and write
55B4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
FF5000
heap
page read and write
45D1000
heap
page read and write
6FB000
stack
page read and write
5587000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
55B4000
trusted library allocation
page read and write
FA9000
heap
page read and write
950000
direct allocation
page read and write
55A4000
trusted library allocation
page read and write
55AD000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
FF3000
heap
page read and write
FF2000
heap
page read and write
950000
direct allocation
page read and write
5598000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
9A5000
unkown
page execute and read and write
55AF000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
4AAC000
stack
page read and write
55A6000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
F67000
heap
page read and write
4BFD000
stack
page read and write
45D1000
heap
page read and write
55B4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
4AA4000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
FE4000
heap
page read and write
FE4000
heap
page read and write
5593000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
45CF000
stack
page read and write
5587000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
950000
direct allocation
page read and write
36CF000
stack
page read and write
55A4000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55B1000
trusted library allocation
page read and write
45D1000
heap
page read and write
5587000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
45D1000
heap
page read and write
5582000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
344F000
stack
page read and write
5587000
trusted library allocation
page read and write
28E0000
heap
page read and write
55BD000
trusted library allocation
page read and write
559A000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
434F000
stack
page read and write
55B7000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
F84000
heap
page read and write
55C0000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
561E000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
FEF000
heap
page read and write
55E9000
trusted library allocation
page read and write
4E6E000
stack
page read and write
80E000
stack
page read and write
5571000
trusted library allocation
page read and write
45D1000
heap
page read and write
FDF000
heap
page read and write
DF6000
unkown
page execute and read and write
3FCE000
stack
page read and write
55E3000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
55B0000
trusted library allocation
page read and write
F75000
heap
page read and write
55B6000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
FCF000
heap
page read and write
F60000
heap
page read and write
5587000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
F51000
heap
page read and write
55A4000
trusted library allocation
page read and write
C5C000
unkown
page execute and write copy
2E0F000
stack
page read and write
55E0000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
55B9000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
960000
unkown
page readonly
5593000
trusted library allocation
page read and write
330F000
stack
page read and write
55DD000
trusted library allocation
page read and write
2D0E000
stack
page read and write
45D1000
heap
page read and write
5595000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
28DF000
stack
page read and write
5611000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
420F000
stack
page read and write
55F1000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
558B000
trusted library allocation
page read and write
950000
direct allocation
page read and write
FFE000
heap
page read and write
55A4000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
950000
direct allocation
page read and write
5580000
trusted library allocation
page read and write
55AD000
trusted library allocation
page read and write
4FAE000
stack
page read and write
55B4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
F0A000
heap
page read and write
45D1000
heap
page read and write
557E000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
513E000
stack
page read and write
3F8F000
stack
page read and write
55B4000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
F67000
heap
page read and write
5593000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
F67000
heap
page read and write
55C3000
trusted library allocation
page read and write
FA9000
heap
page read and write
FF5000
heap
page read and write
4A60000
direct allocation
page read and write
55A4000
trusted library allocation
page read and write
F47000
heap
page read and write
55D8000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
55A4000
trusted library allocation
page read and write
FF2000
heap
page read and write
55A4000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
C5B000
unkown
page execute and write copy
5593000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
FEA000
heap
page read and write
55F1000
trusted library allocation
page read and write
45D1000
heap
page read and write
45D1000
heap
page read and write
FE5000
heap
page read and write
45D1000
heap
page read and write
4C00000
direct allocation
page execute and read and write
2907000
heap
page read and write
55A4000
trusted library allocation
page read and write
557A000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
31CF000
stack
page read and write
There are 650 hidden memdumps, click here to show them.