IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.97.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://necklacedmny.store/&
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://crisiwarny.store/Y
unknown
https://crisiwarny.store/api
unknown
https://crisiwarny.store:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.mozilla.or
unknown
https://necklacedmny.store:443/api
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://presticitpo.store:443/api
unknown
https://crisiwarny.store/)
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://necklacedmny.store/api7
unknown
https://presticitpo.store/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://presticitpo.store/A
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://necklacedmny.store/apiL
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://necklacedmny.store/m
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/X
unknown
https://necklacedmny.store/apimYH
unknown
https://necklacedmny.store/
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://presticitpo.store:443/apizc:
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
241000
unkown
page execute and read and write
malicious
4CF0000
remote allocation
page read and write
593E000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
2B70000
heap
page read and write
4CC0000
heap
page read and write
45F000
unkown
page execute and write copy
5A41000
trusted library allocation
page read and write
4881000
heap
page read and write
347F000
stack
page read and write
593F000
trusted library allocation
page read and write
10BC000
heap
page read and write
593B000
trusted library allocation
page read and write
F24000
heap
page read and write
5A31000
trusted library allocation
page read and write
484000
unkown
page execute and write copy
5932000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
10BC000
heap
page read and write
5C27000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
3E7F000
stack
page read and write
10A9000
heap
page read and write
6639000
trusted library allocation
page read and write
10B2000
heap
page read and write
2B5E000
stack
page read and write
5A41000
trusted library allocation
page read and write
530000
unkown
page execute and write copy
100E000
heap
page read and write
5A41000
trusted library allocation
page read and write
10BC000
heap
page read and write
5984000
trusted library allocation
page read and write
1095000
heap
page read and write
5932000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
5954000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
F24000
heap
page read and write
5A41000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
387E000
stack
page read and write
6129000
trusted library allocation
page read and write
2FBE000
stack
page read and write
5930000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
5930000
trusted library allocation
page read and write
4A5000
unkown
page execute and write copy
109E000
heap
page read and write
524E000
stack
page read and write
1009000
heap
page read and write
10A4000
heap
page read and write
1024000
heap
page read and write
12BF000
stack
page read and write
5930000
trusted library allocation
page read and write
532000
unkown
page execute and write copy
5A45000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
102E000
heap
page read and write
10A4000
heap
page read and write
5932000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
45E000
unkown
page execute and read and write
5A21000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
10BC000
heap
page read and write
428000
unkown
page execute and read and write
5A21000
trusted library allocation
page read and write
5983000
trusted library allocation
page read and write
2A9E000
stack
page read and write
5954000
trusted library allocation
page read and write
240000
unkown
page readonly
5A3F000
trusted library allocation
page read and write
39BE000
stack
page read and write
1024000
heap
page read and write
5956000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
593F000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
397F000
stack
page read and write
489000
unkown
page execute and read and write
5D95000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
10BC000
heap
page read and write
5930000
trusted library allocation
page read and write
5988000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
4880000
heap
page read and write
5940000
trusted library allocation
page read and write
4DB000
unkown
page execute and read and write
EC0000
heap
page read and write
598C000
trusted library allocation
page read and write
5973000
trusted library allocation
page read and write
44FE000
stack
page read and write
10A5000
heap
page read and write
5946000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
F24000
heap
page read and write
299000
unkown
page write copy
5A4F000
trusted library allocation
page read and write
241000
unkown
page execute and write copy
596E000
trusted library allocation
page read and write
1097000
heap
page read and write
5976000
trusted library allocation
page read and write
109F000
heap
page read and write
5953000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
4A8000
unkown
page execute and read and write
5944000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
561E000
stack
page read and write
598C000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
3FBE000
stack
page read and write
5921000
trusted library allocation
page read and write
109C000
heap
page read and write
5A31000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
1093000
heap
page read and write
439000
unkown
page execute and write copy
5940000
trusted library allocation
page read and write
4E3F000
stack
page read and write
2B7D000
heap
page read and write
5A30000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
59A4000
trusted library allocation
page read and write
4CF0000
remote allocation
page read and write
5A31000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
2F7F000
stack
page read and write
10A8000
heap
page read and write
5967000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
103E000
heap
page read and write
5A2D000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
FFF000
heap
page read and write
10A8000
heap
page read and write
2B1E000
stack
page read and write
5947000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5A27000
trusted library allocation
page read and write
2A7000
unkown
page execute and write copy
5C2C000
trusted library allocation
page read and write
299000
unkown
page write copy
383F000
stack
page read and write
5940000
trusted library allocation
page read and write
2ADC000
stack
page read and write
5988000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
108B000
heap
page read and write
5958000
trusted library allocation
page read and write
10BE000
heap
page read and write
4C5000
unkown
page execute and write copy
41E000
unkown
page execute and write copy
4C8000
unkown
page execute and read and write
5A41000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
10BD000
heap
page read and write
FB0000
direct allocation
page read and write
5A59000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
F24000
heap
page read and write
373E000
stack
page read and write
10BD000
heap
page read and write
323E000
stack
page read and write
596B000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
4B4000
unkown
page execute and read and write
5954000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
F24000
heap
page read and write
FF7000
heap
page read and write
595D000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
F24000
heap
page read and write
3ABF000
stack
page read and write
1080000
heap
page read and write
FB0000
direct allocation
page read and write
597E000
trusted library allocation
page read and write
30BF000
stack
page read and write
59A4000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
109A000
heap
page read and write
57DE000
stack
page read and write
5921000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
413E000
stack
page read and write
333F000
stack
page read and write
5A57000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
43A000
unkown
page execute and read and write
5193000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
10A1000
heap
page read and write
F24000
heap
page read and write
5947000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
102E000
heap
page read and write
594A000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
F24000
heap
page read and write
5983000
trusted library allocation
page read and write
35FE000
stack
page read and write
5A41000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
FCE000
heap
page read and write
5970000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
109A000
heap
page read and write
593D000
trusted library allocation
page read and write
4881000
heap
page read and write
592A000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
4A4000
unkown
page execute and read and write
531000
unkown
page execute and read and write
4D00000
direct allocation
page read and write
58DF000
stack
page read and write
FC0000
heap
page read and write
5C45000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
F10000
heap
page read and write
551E000
stack
page read and write
3FE000
unkown
page execute and write copy
4BD000
unkown
page execute and read and write
5921000
trusted library allocation
page read and write
411000
unkown
page execute and read and write
1093000
heap
page read and write
109E000
heap
page read and write
10B0000
heap
page read and write
4BB000
unkown
page execute and write copy
36FF000
stack
page read and write
4E80000
direct allocation
page execute and read and write
FE4000
heap
page read and write
5A31000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
597D000
trusted library allocation
page read and write
F24000
heap
page read and write
FCA000
heap
page read and write
2D7F000
stack
page read and write
5A31000
trusted library allocation
page read and write
4DC000
unkown
page execute and write copy
5A41000
trusted library allocation
page read and write
11BE000
stack
page read and write
10B5000
heap
page read and write
5933000
trusted library allocation
page read and write
577F000
stack
page read and write
F24000
heap
page read and write
595C000
trusted library allocation
page read and write
54CE000
stack
page read and write
547000
unkown
page execute and read and write
5954000
trusted library allocation
page read and write
514D000
stack
page read and write
592C000
trusted library allocation
page read and write
423F000
stack
page read and write
5A28000
trusted library allocation
page read and write
29B000
unkown
page execute and write copy
427E000
stack
page read and write
10B4000
heap
page read and write
FAE000
stack
page read and write
477E000
stack
page read and write
597D000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
4E6000
unkown
page execute and write copy
4DE000
unkown
page execute and read and write
4EC0000
direct allocation
page execute and read and write
1097000
heap
page read and write
3EBD000
stack
page read and write
10BD000
heap
page read and write
FB0000
direct allocation
page read and write
4E50000
direct allocation
page execute and read and write
3BFF000
stack
page read and write
3FB000
unkown
page execute and read and write
2E7F000
stack
page read and write
522000
unkown
page execute and write copy
10AF000
heap
page read and write
5A41000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
528E000
stack
page read and write
5953000
trusted library allocation
page read and write
109F000
heap
page read and write
4FCD000
stack
page read and write
592D000
trusted library allocation
page read and write
10A1000
heap
page read and write
5A31000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
4E9000
unkown
page execute and read and write
4881000
heap
page read and write
5959000
trusted library allocation
page read and write
34BE000
stack
page read and write
596B000
trusted library allocation
page read and write
5A4A000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
F24000
heap
page read and write
5966000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
10BC000
heap
page read and write
59B4000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
F24000
heap
page read and write
494000
unkown
page execute and read and write
594A000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
5973000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
1093000
heap
page read and write
109E000
heap
page read and write
5A21000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
C7B000
stack
page read and write
29B000
unkown
page execute and write copy
10A6000
heap
page read and write
596C000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
F24000
heap
page read and write
595C000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
F24000
heap
page read and write
48E000
unkown
page execute and write copy
596B000
trusted library allocation
page read and write
10AF000
heap
page read and write
102E000
heap
page read and write
4AC000
unkown
page execute and read and write
4E80000
direct allocation
page execute and read and write
592A000
trusted library allocation
page read and write
4881000
heap
page read and write
10AF000
heap
page read and write
5930000
trusted library allocation
page read and write
437F000
stack
page read and write
593F000
trusted library allocation
page read and write
F24000
heap
page read and write
29B000
unkown
page execute and read and write
10A6000
heap
page read and write
40FF000
stack
page read and write
337E000
stack
page read and write
5A41000
trusted library allocation
page read and write
530000
unkown
page execute and write copy
D7A000
stack
page read and write
597D000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
5A28000
trusted library allocation
page read and write
100E000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5946000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1083000
heap
page read and write
2A6000
unkown
page execute and read and write
FB0000
direct allocation
page read and write
4E80000
direct allocation
page execute and read and write
4881000
heap
page read and write
1097000
heap
page read and write
593F000
trusted library allocation
page read and write
3FFE000
stack
page read and write
595F000
trusted library allocation
page read and write
48A000
unkown
page execute and write copy
593B000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
5980000
trusted library allocation
page read and write
109B000
heap
page read and write
5953000
trusted library allocation
page read and write
4891000
heap
page read and write
FB0000
direct allocation
page read and write
5A41000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
5988000
trusted library allocation
page read and write
3D3F000
stack
page read and write
10B4000
heap
page read and write
5936000
trusted library allocation
page read and write
463E000
stack
page read and write
6129000
trusted library allocation
page read and write
5976000
trusted library allocation
page read and write
30FE000
stack
page read and write
567E000
stack
page read and write
41E000
unkown
page execute and read and write
4881000
heap
page read and write
10B0000
heap
page read and write
537000
unkown
page execute and write copy
5A31000
trusted library allocation
page read and write
5974000
trusted library allocation
page read and write
2B77000
heap
page read and write
3D7E000
stack
page read and write
FB0000
direct allocation
page read and write
5944000
trusted library allocation
page read and write
F24000
heap
page read and write
F24000
heap
page read and write
5940000
trusted library allocation
page read and write
DE0000
heap
page read and write
43BE000
stack
page read and write
48D000
unkown
page execute and read and write
5993000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
10A8000
heap
page read and write
10A8000
heap
page read and write
1005000
heap
page read and write
487F000
stack
page read and write
5931000
trusted library allocation
page read and write
F24000
heap
page read and write
5A31000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
593B000
trusted library allocation
page read and write
597D000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
1021000
heap
page read and write
5A41000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
1093000
heap
page read and write
5A30000
trusted library allocation
page read and write
45FF000
stack
page read and write
4D6000
unkown
page execute and write copy
5953000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
4881000
heap
page read and write
465000
unkown
page execute and read and write
5923000
trusted library allocation
page read and write
473F000
stack
page read and write
3C3E000
stack
page read and write
5A41000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
537000
unkown
page execute and write copy
4D3B000
stack
page read and write
5938000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
44BF000
stack
page read and write
31FF000
stack
page read and write
5A28000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
427000
unkown
page execute and write copy
1021000
heap
page read and write
4CF0000
remote allocation
page read and write
5A41000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
547000
unkown
page execute and write copy
F24000
heap
page read and write
5A41000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
5910000
heap
page read and write
2C7F000
stack
page read and write
597D000
trusted library allocation
page read and write
4E8D000
stack
page read and write
5930000
trusted library allocation
page read and write
459000
unkown
page execute and write copy
593D000
trusted library allocation
page read and write
507000
unkown
page execute and read and write
5A21000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
F24000
heap
page read and write
F24000
heap
page read and write
5983000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
4AD000
unkown
page execute and write copy
4E60000
direct allocation
page execute and read and write
4A3000
unkown
page execute and write copy
10A1000
heap
page read and write
5922000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
3AFE000
stack
page read and write
5946000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5081000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
595C000
trusted library allocation
page read and write
53CD000
stack
page read and write
F24000
heap
page read and write
5186000
trusted library allocation
page read and write
519B000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
51A9000
trusted library allocation
page read and write
240000
unkown
page read and write
4E70000
direct allocation
page execute and read and write
5953000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
500E000
stack
page read and write
F24000
heap
page read and write
4D00000
direct allocation
page read and write
5A31000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
F24000
heap
page read and write
10A8000
heap
page read and write
5A41000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
10B4000
heap
page read and write
593D000
trusted library allocation
page read and write
F20000
heap
page read and write
F24000
heap
page read and write
F6E000
stack
page read and write
5A41000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
5CCD000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
109C000
heap
page read and write
1014000
heap
page read and write
61B2000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
4881000
heap
page read and write
5953000
trusted library allocation
page read and write
4881000
heap
page read and write
5A41000
trusted library allocation
page read and write
10B4000
heap
page read and write
2A5000
unkown
page execute and write copy
5A41000
trusted library allocation
page read and write
538F000
stack
page read and write
548000
unkown
page execute and write copy
10BB000
heap
page read and write
35BF000
stack
page read and write
5A41000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
10AD000
heap
page read and write
510D000
stack
page read and write
4A9000
unkown
page execute and write copy
There are 567 hidden memdumps, click here to show them.