Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://property-imper.sbs/apib
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/apif
|
unknown
|
||
https://property-imper.sbs:443/api
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://property-imper.sbs:443/apil
|
unknown
|
||
https://property-imper.sbs/api
|
172.67.162.84
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://property-imper.sbs/apiD
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
172.67.162.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.162.84
|
property-imper.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5D09000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
14F9000
|
heap
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
EB4000
|
unkown
|
page execute and write copy
|
||
73CF1000
|
unkown
|
page execute read
|
||
C07000
|
unkown
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
51EC000
|
stack
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
5810000
|
remote allocation
|
page read and write
|
||
5810000
|
remote allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
59BD000
|
stack
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
5EE1000
|
trusted library allocation
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D96000
|
trusted library allocation
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
5DB5000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
unkown
|
page execute and read and write
|
||
168E000
|
stack
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
6AFB000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
37DF000
|
stack
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
5EDE000
|
stack
|
page read and write
|
||
5D17000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
149A000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
A4B000
|
stack
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
5CF6000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
5F01000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
unkown
|
page execute and read and write
|
||
5D9C000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1052000
|
unkown
|
page execute and read and write
|
||
1490000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
stack
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
1575000
|
heap
|
page read and write
|
||
51F4000
|
direct allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5D17000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
369F000
|
stack
|
page read and write
|
||
5DB3000
|
trusted library allocation
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
1553000
|
heap
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
61B8000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
52EF000
|
stack
|
page read and write
|
||
C07000
|
unkown
|
page write copy
|
||
155F000
|
heap
|
page read and write
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5EE0000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
5D82000
|
trusted library allocation
|
page read and write
|
||
306C000
|
stack
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
381E000
|
stack
|
page read and write
|
||
D9C000
|
unkown
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
EB5000
|
unkown
|
page execute and write copy
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
556D000
|
stack
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
6108000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
5DBF000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
5B9D000
|
stack
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
14C9000
|
heap
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
4D30000
|
heap
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
C09000
|
unkown
|
page execute and read and write
|
||
5810000
|
remote allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
587E000
|
stack
|
page read and write
|
||
3117000
|
heap
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
E74000
|
unkown
|
page execute and read and write
|
||
4D21000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
5CDF000
|
stack
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
5DA1000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
EA6000
|
unkown
|
page execute and read and write
|
||
BB1000
|
unkown
|
page execute and write copy
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
60EF000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
5D94000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
BB1000
|
unkown
|
page execute and read and write
|
||
4D20000
|
heap
|
page read and write
|
||
5DB6000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
154D000
|
heap
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
1053000
|
unkown
|
page execute and write copy
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
E9B000
|
unkown
|
page execute and read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
311D000
|
heap
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
5EE1000
|
trusted library allocation
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
519D000
|
stack
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
597F000
|
stack
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page read and write
|
There are 434 hidden memdumps, click here to show them.