IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.96.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crl.microsoft
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://necklacedmny.store//tL
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://necklacedmny.store/api&
unknown
https://necklacedmny.store/api#
unknown
https://necklacedmny.store/?t
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/api3
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.mozilla.or
unknown
https://necklacedmny.store:443/api
unknown
https://necklacedmny.store:443/apiK
unknown
http://crl.microsoft7_6
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/api=
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/apia8&_Z
unknown
https://necklacedmny.store/apidb
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://necklacedmny.store:443/api.default-release/key4.dbPK
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/apis
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store/apik
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D1000
unkown
page execute and read and write
malicious
D93000
heap
page read and write
4681000
heap
page read and write
361F000
stack
page read and write
56E9000
trusted library allocation
page read and write
3DDE000
stack
page read and write
DDE000
heap
page read and write
58F7000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
52BE000
stack
page read and write
3B1F000
stack
page read and write
4F89000
trusted library allocation
page read and write
375F000
stack
page read and write
DB9000
heap
page read and write
2D9E000
stack
page read and write
55DC000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
2BE000
unkown
page execute and write copy
DBD000
heap
page read and write
4690000
heap
page read and write
5601000
trusted library allocation
page read and write
415F000
stack
page read and write
D7F000
heap
page read and write
55E9000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
DBD000
heap
page read and write
DDE000
heap
page read and write
56E9000
trusted library allocation
page read and write
419E000
stack
page read and write
3CB000
unkown
page execute and write copy
EB3000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
2C1F000
stack
page read and write
5602000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
DBF000
heap
page read and write
4681000
heap
page read and write
DC7000
heap
page read and write
56F9000
trusted library allocation
page read and write
D5B000
heap
page read and write
DAB000
heap
page read and write
DBF000
heap
page read and write
5632000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
2E9F000
stack
page read and write
56E9000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
3A1E000
stack
page read and write
561A000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
2AE000
unkown
page execute and write copy
56E9000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
D93000
heap
page read and write
CD0000
direct allocation
page read and write
5621000
trusted library allocation
page read and write
2C0000
unkown
page execute and write copy
56E9000
trusted library allocation
page read and write
DC4000
heap
page read and write
DAB000
heap
page read and write
315E000
stack
page read and write
441E000
stack
page read and write
32D000
unkown
page execute and read and write
DA3000
heap
page read and write
55E9000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
365000
unkown
page execute and write copy
55E9000
trusted library allocation
page read and write
D94000
heap
page read and write
561A000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
55F1000
trusted library allocation
page read and write
DBE000
heap
page read and write
56F9000
trusted library allocation
page read and write
DA3000
heap
page read and write
5601000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
3CA000
unkown
page execute and read and write
DB2000
heap
page read and write
3C9E000
stack
page read and write
56D8000
trusted library allocation
page read and write
DAB000
heap
page read and write
3B3000
unkown
page execute and read and write
55E7000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
29DD000
heap
page read and write
5604000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
56F9000
trusted library allocation
page read and write
DB7000
heap
page read and write
2B1E000
stack
page read and write
316000
unkown
page execute and write copy
55E9000
trusted library allocation
page read and write
4B10000
direct allocation
page read and write
5635000
trusted library allocation
page read and write
2D5F000
stack
page read and write
2A1000
unkown
page execute and read and write
386000
unkown
page execute and read and write
5170000
remote allocation
page read and write
55F1000
trusted library allocation
page read and write
315000
unkown
page execute and read and write
34DF000
stack
page read and write
56E9000
trusted library allocation
page read and write
562C000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
5170000
remote allocation
page read and write
D21000
heap
page read and write
3EDF000
stack
page read and write
56E9000
trusted library allocation
page read and write
4B10000
direct allocation
page read and write
DC4000
heap
page read and write
59A7000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
4681000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
32E000
unkown
page execute and write copy
DD6000
heap
page read and write
56E8000
trusted library allocation
page read and write
365E000
stack
page read and write
56D8000
trusted library allocation
page read and write
D1F000
heap
page read and write
D40000
heap
page read and write
56F9000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
3F1E000
stack
page read and write
55F1000
trusted library allocation
page read and write
288000
unkown
page execute and write copy
5652000
trusted library allocation
page read and write
DB7000
heap
page read and write
DDE000
heap
page read and write
358000
unkown
page execute and write copy
56E9000
trusted library allocation
page read and write
4F8D000
trusted library allocation
page read and write
DD8000
heap
page read and write
3C5F000
stack
page read and write
2ADF000
stack
page read and write
D96000
heap
page read and write
4B4C000
stack
page read and write
5630000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
3B2000
unkown
page execute and write copy
4681000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
55E9000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
2C4000
unkown
page execute and read and write
5647000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
38DE000
stack
page read and write
A7B000
stack
page read and write
D1F000
heap
page read and write
55E0000
trusted library allocation
page read and write
5609000
trusted library allocation
page read and write
D93000
heap
page read and write
DAB000
heap
page read and write
DB7000
heap
page read and write
563B000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
56F9000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
5609000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
CEA000
heap
page read and write
5701000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
4C4F000
stack
page read and write
5615000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
DAB000
heap
page read and write
4E91000
trusted library allocation
page read and write
562A000
trusted library allocation
page read and write
5606000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
56F9000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
5709000
trusted library allocation
page read and write
DA3000
heap
page read and write
563A000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
5652000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
DD6000
heap
page read and write
55D2000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
DD8000
heap
page read and write
4680000
heap
page read and write
55F1000
trusted library allocation
page read and write
561A000
trusted library allocation
page read and write
2D9000
unkown
page execute and write copy
4F99000
trusted library allocation
page read and write
5605000
trusted library allocation
page read and write
D9B000
heap
page read and write
DD9000
heap
page read and write
DA3000
heap
page read and write
CEE000
heap
page read and write
5647000
trusted library allocation
page read and write
4C9D000
stack
page read and write
4681000
heap
page read and write
DA4000
heap
page read and write
5652000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
DB2000
heap
page read and write
5638000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
DAB000
heap
page read and write
5602000
trusted library allocation
page read and write
3A2000
unkown
page execute and write copy
5661000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
DAB000
heap
page read and write
286000
unkown
page execute and read and write
56F9000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
BD0000
heap
page read and write
56F9000
trusted library allocation
page read and write
4681000
heap
page read and write
56F9000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
D83000
heap
page read and write
5601000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
DC7000
heap
page read and write
56F9000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
4681000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
DB6000
heap
page read and write
55EE000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
BE0000
heap
page read and write
55F1000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
564F000
trusted library allocation
page read and write
548E000
stack
page read and write
4FA2000
trusted library allocation
page read and write
542F000
stack
page read and write
56F9000
trusted library allocation
page read and write
597F000
trusted library allocation
page read and write
515E000
stack
page read and write
56E8000
trusted library allocation
page read and write
305000
unkown
page execute and write copy
5606000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
DD1000
heap
page read and write
55EE000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
DDE000
heap
page read and write
5641000
trusted library allocation
page read and write
12B000
unkown
page execute and write copy
3BB000
unkown
page execute and write copy
55ED000
trusted library allocation
page read and write
DD1000
heap
page read and write
D94000
heap
page read and write
5609000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
DAB000
heap
page read and write
55D2000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
DAB000
heap
page read and write
29E000
unkown
page execute and write copy
5601000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
D94000
heap
page read and write
5652000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
4681000
heap
page read and write
56F9000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
51BD000
stack
page read and write
55E0000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
55E3000
trusted library allocation
page read and write
379E000
stack
page read and write
561A000
trusted library allocation
page read and write
DA4000
heap
page read and write
DBD000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
311F000
stack
page read and write
298F000
stack
page read and write
55E6000
trusted library allocation
page read and write
532E000
stack
page read and write
55D0000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
DBF000
heap
page read and write
5709000
trusted library allocation
page read and write
2B3000
unkown
page execute and write copy
55E7000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
2B4000
unkown
page execute and read and write
4681000
heap
page read and write
33E000
unkown
page execute and read and write
560A000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
D82000
heap
page read and write
29D7000
heap
page read and write
C50000
heap
page read and write
55E5000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
3B4000
unkown
page execute and write copy
5603000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
D94000
heap
page read and write
335000
unkown
page execute and read and write
4681000
heap
page read and write
56E8000
trusted library allocation
page read and write
DBD000
heap
page read and write
56E9000
trusted library allocation
page read and write
D0000
unkown
page read and write
4C90000
direct allocation
page execute and read and write
5624000
trusted library allocation
page read and write
CE0000
heap
page read and write
D94000
heap
page read and write
4CE9000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
2EC000
unkown
page execute and read and write
43DF000
stack
page read and write
D43000
heap
page read and write
DD1000
heap
page read and write
55E9000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
3A6000
unkown
page execute and write copy
55B0000
heap
page read and write
4F1E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
56D9000
trusted library allocation
page read and write
58DE000
trusted library allocation
page read and write
CC0000
heap
page read and write
55E9000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
369000
unkown
page execute and read and write
4681000
heap
page read and write
4681000
heap
page read and write
56D0000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
D0000
unkown
page readonly
565D000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
42DE000
stack
page read and write
505E000
stack
page read and write
5601000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
401F000
stack
page read and write
DBF000
heap
page read and write
351E000
stack
page read and write
561B000
trusted library allocation
page read and write
DAB000
heap
page read and write
4681000
heap
page read and write
56E9000
trusted library allocation
page read and write
DD6000
heap
page read and write
5652000
trusted library allocation
page read and write
558F000
stack
page read and write
29CB000
stack
page read and write
3B2000
unkown
page execute and write copy
55E9000
trusted library allocation
page read and write
5627000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
12B000
unkown
page execute and write copy
56DD000
trusted library allocation
page read and write
D94000
heap
page read and write
5601000
trusted library allocation
page read and write
DAB000
heap
page read and write
DAB000
heap
page read and write
55F1000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
DAB000
heap
page read and write
DB1000
heap
page read and write
D94000
heap
page read and write
3B5E000
stack
page read and write
2AA000
unkown
page execute and read and write
325F000
stack
page read and write
56F9000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
56F9000
trusted library allocation
page read and write
5661000
trusted library allocation
page read and write
301E000
stack
page read and write
CD0000
direct allocation
page read and write
4AFD000
stack
page read and write
5609000
trusted library allocation
page read and write
DAB000
heap
page read and write
451F000
stack
page read and write
56F9000
trusted library allocation
page read and write
D40000
heap
page read and write
4681000
heap
page read and write
D13000
heap
page read and write
4681000
heap
page read and write
5601000
trusted library allocation
page read and write
2BC000
unkown
page execute and write copy
561E000
trusted library allocation
page read and write
4B10000
direct allocation
page read and write
4DDD000
stack
page read and write
D17000
heap
page read and write
55E3000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
465F000
stack
page read and write
D2E000
heap
page read and write
565D000
trusted library allocation
page read and write
4681000
heap
page read and write
561A000
trusted library allocation
page read and write
4681000
heap
page read and write
4660000
heap
page read and write
56E9000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
3D9F000
stack
page read and write
D2E000
heap
page read and write
2BF000
unkown
page execute and read and write
CD0000
direct allocation
page read and write
5635000
trusted library allocation
page read and write
D17000
heap
page read and write
5635000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
56E7000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
DC0000
heap
page read and write
DDC000
heap
page read and write
4EDD000
stack
page read and write
DDE000
heap
page read and write
55D7000
trusted library allocation
page read and write
D95000
heap
page read and write
DAB000
heap
page read and write
56F9000
trusted library allocation
page read and write
2C5E000
stack
page read and write
5170000
remote allocation
page read and write
56E1000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
29D000
unkown
page execute and read and write
55F1000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
2B1000
unkown
page execute and read and write
55EE000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
DB8000
heap
page read and write
5647000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
DBF000
heap
page read and write
5601000
trusted library allocation
page read and write
347000
unkown
page execute and read and write
5619000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
DD6000
heap
page read and write
5635000
trusted library allocation
page read and write
DAB000
heap
page read and write
5613000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
DC6000
heap
page read and write
55F1000
trusted library allocation
page read and write
5609000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
2FDF000
stack
page read and write
DDE000
heap
page read and write
55F3000
trusted library allocation
page read and write
F47000
trusted library allocation
page read and write
DC9000
heap
page read and write
29D0000
heap
page read and write
4681000
heap
page read and write
56F9000
trusted library allocation
page read and write
339F000
stack
page read and write
137000
unkown
page execute and write copy
C55000
heap
page read and write
405E000
stack
page read and write
55E3000
trusted library allocation
page read and write
32C000
unkown
page execute and write copy
33DE000
stack
page read and write
5636000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
DB2000
heap
page read and write
DAB000
heap
page read and write
55EE000
trusted library allocation
page read and write
359000
unkown
page execute and read and write
D25000
heap
page read and write
DBF000
heap
page read and write
565D000
trusted library allocation
page read and write
D82000
heap
page read and write
5602000
trusted library allocation
page read and write
B7A000
stack
page read and write
3BB000
unkown
page execute and write copy
58DA000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
DB7000
heap
page read and write
56F9000
trusted library allocation
page read and write
429F000
stack
page read and write
56F9000
trusted library allocation
page read and write
2BD000
unkown
page execute and read and write
D21000
heap
page read and write
12B000
unkown
page execute and read and write
D94000
heap
page read and write
5631000
trusted library allocation
page read and write
563A000
trusted library allocation
page read and write
3CA000
unkown
page execute and write copy
CD0000
direct allocation
page read and write
33C000
unkown
page execute and write copy
4780000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
2AA000
unkown
page execute and write copy
4681000
heap
page read and write
D94000
heap
page read and write
55F1000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
56F9000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
D43000
heap
page read and write
55D6000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
DB6000
heap
page read and write
389F000
stack
page read and write
DAB000
heap
page read and write
55D2000
trusted library allocation
page read and write
39DF000
stack
page read and write
D25000
heap
page read and write
288E000
stack
page read and write
501F000
stack
page read and write
2EDE000
stack
page read and write
345000
unkown
page execute and write copy
311000
unkown
page execute and write copy
561A000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
DD6000
heap
page read and write
5602000
trusted library allocation
page read and write
309000
unkown
page execute and read and write
62EE000
trusted library allocation
page read and write
DAB000
heap
page read and write
5606000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
565D000
trusted library allocation
page read and write
455E000
stack
page read and write
31A000
unkown
page execute and read and write
D1000
unkown
page execute and write copy
59B7000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
DD9000
heap
page read and write
5601000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
329E000
stack
page read and write
D94000
heap
page read and write
5627000
trusted library allocation
page read and write
There are 606 hidden memdumps, click here to show them.