IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.97.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/7
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/apibc
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://necklacedmny.store/
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://necklacedmny.store/api#Q
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/apiZ
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://necklacedmny.store/apis
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store:443/api
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
AC1000
unkown
page execute and read and write
malicious
4C31000
heap
page read and write
5CF9000
trusted library allocation
page read and write
3C2E000
stack
page read and write
5BB9000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
13AE000
heap
page read and write
5C5A000
trusted library allocation
page read and write
5BD6000
trusted library allocation
page read and write
5CCF000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5F8A000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
C8C000
unkown
page execute and read and write
5BC1000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
5EB1000
trusted library allocation
page read and write
5BC9000
trusted library allocation
page read and write
1342000
heap
page read and write
5EA9000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
134E000
heap
page read and write
5BB1000
trusted library allocation
page read and write
13A9000
heap
page read and write
3EAE000
stack
page read and write
3BEF000
stack
page read and write
1284000
heap
page read and write
4C31000
heap
page read and write
5CB1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
12CE000
heap
page read and write
13AF000
heap
page read and write
5CB8000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
332F000
stack
page read and write
1284000
heap
page read and write
5BB1000
trusted library allocation
page read and write
5CED000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
5CED000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
538D000
stack
page read and write
5BC1000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
1284000
heap
page read and write
5BB1000
trusted library allocation
page read and write
1306000
heap
page read and write
1284000
heap
page read and write
43AE000
stack
page read and write
5BCF000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
13A6000
heap
page read and write
2F3F000
stack
page read and write
5EAB000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
382F000
stack
page read and write
5C5A000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
1290000
heap
page read and write
58FE000
stack
page read and write
601A000
trusted library allocation
page read and write
13A0000
heap
page read and write
5BC1000
trusted library allocation
page read and write
5CCB000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
5BC1000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
D37000
unkown
page execute and read and write
1397000
heap
page read and write
D15000
unkown
page execute and write copy
5BA3000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
13A9000
heap
page read and write
5C3B000
trusted library allocation
page read and write
1320000
heap
page read and write
5C34000
trusted library allocation
page read and write
3AAF000
stack
page read and write
D0C000
unkown
page execute and write copy
39AE000
stack
page read and write
5CB7000
trusted library allocation
page read and write
3AEE000
stack
page read and write
D2E000
unkown
page execute and read and write
5BC7000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
4AEF000
stack
page read and write
5C55000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
CAC000
unkown
page execute and read and write
5BC1000
trusted library allocation
page read and write
12C0000
heap
page read and write
5BC1000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
13AF000
heap
page read and write
5C33000
trusted library allocation
page read and write
5BD6000
trusted library allocation
page read and write
5CD5000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
4C31000
heap
page read and write
5240000
direct allocation
page execute and read and write
1284000
heap
page read and write
5C49000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
2E3E000
stack
page read and write
C9F000
unkown
page execute and write copy
5CD7000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
D57000
unkown
page execute and read and write
2FAD000
heap
page read and write
426D000
stack
page read and write
13B4000
heap
page read and write
132D000
heap
page read and write
5C5A000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
D8D000
unkown
page execute and write copy
462E000
stack
page read and write
4C31000
heap
page read and write
B1B000
unkown
page execute and read and write
CB4000
unkown
page execute and read and write
5BC1000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
11A0000
heap
page read and write
5BD6000
trusted library allocation
page read and write
13FE000
stack
page read and write
5BD7000
trusted library allocation
page read and write
1284000
heap
page read and write
5BDC000
trusted library allocation
page read and write
DB9000
unkown
page execute and write copy
5BA7000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
50C0000
direct allocation
page read and write
5BC1000
trusted library allocation
page read and write
163E000
stack
page read and write
5C5A000
trusted library allocation
page read and write
1284000
heap
page read and write
130F000
heap
page read and write
5CCC000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
138D000
heap
page read and write
54CD000
stack
page read and write
13B3000
heap
page read and write
2F90000
direct allocation
page read and write
5BB1000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
45EF000
stack
page read and write
5C3E000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
1345000
heap
page read and write
5BA8000
trusted library allocation
page read and write
30AF000
stack
page read and write
5CB7000
trusted library allocation
page read and write
1284000
heap
page read and write
5C43000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
50B0000
remote allocation
page read and write
5CF2000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
1284000
heap
page read and write
13B3000
heap
page read and write
DA4000
unkown
page execute and write copy
68BC000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
372E000
stack
page read and write
5BC1000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
D1F000
unkown
page execute and write copy
1284000
heap
page read and write
5BB0000
trusted library allocation
page read and write
2F80000
heap
page read and write
5BD6000
trusted library allocation
page read and write
1284000
heap
page read and write
48AE000
stack
page read and write
5240000
direct allocation
page execute and read and write
1346000
heap
page read and write
1284000
heap
page read and write
5CD9000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
59FF000
stack
page read and write
1351000
heap
page read and write
422F000
stack
page read and write
5BB1000
trusted library allocation
page read and write
D2F000
unkown
page execute and write copy
5BC1000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5F52000
trusted library allocation
page read and write
436E000
stack
page read and write
40EF000
stack
page read and write
5BCA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
D8F000
unkown
page execute and read and write
5C49000
trusted library allocation
page read and write
13AF000
heap
page read and write
5BA1000
trusted library allocation
page read and write
4C31000
heap
page read and write
5BC1000
trusted library allocation
page read and write
CAF000
unkown
page execute and read and write
5BB1000
trusted library allocation
page read and write
13B1000
heap
page read and write
386E000
stack
page read and write
13AF000
heap
page read and write
550D000
stack
page read and write
5D4B000
trusted library allocation
page read and write
1359000
heap
page read and write
5CF9000
trusted library allocation
page read and write
5BC4000
trusted library allocation
page read and write
DB9000
unkown
page execute and read and write
5CC9000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
13AF000
heap
page read and write
1396000
heap
page read and write
5250000
direct allocation
page execute and read and write
50C0000
direct allocation
page read and write
2F90000
direct allocation
page read and write
2FA0000
heap
page read and write
5C33000
trusted library allocation
page read and write
153E000
stack
page read and write
5CD4000
trusted library allocation
page read and write
AC1000
unkown
page execute and write copy
5BAD000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
1348000
heap
page read and write
2F7C000
stack
page read and write
5BA2000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
5ECA000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
5BA7000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
1284000
heap
page read and write
486F000
stack
page read and write
5C52000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
346F000
stack
page read and write
5240000
direct allocation
page execute and read and write
35EE000
stack
page read and write
105B000
stack
page read and write
13A6000
heap
page read and write
13AC000
heap
page read and write
5EE2000
trusted library allocation
page read and write
13A6000
heap
page read and write
49EE000
stack
page read and write
5CB9000
trusted library allocation
page read and write
13B4000
heap
page read and write
4C30000
heap
page read and write
C7E000
unkown
page execute and write copy
1349000
heap
page read and write
5CD9000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
1304000
heap
page read and write
5BB9000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
DAA000
unkown
page execute and write copy
1359000
heap
page read and write
49AF000
stack
page read and write
574F000
stack
page read and write
12CA000
heap
page read and write
13A3000
heap
page read and write
5CA8000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
5BD7000
trusted library allocation
page read and write
35AF000
stack
page read and write
5240000
direct allocation
page execute and read and write
5C3A000
trusted library allocation
page read and write
396F000
stack
page read and write
1393000
heap
page read and write
C7C000
unkown
page execute and read and write
5C3B000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
4C2F000
stack
page read and write
5BA7000
trusted library allocation
page read and write
138E000
heap
page read and write
51FF000
stack
page read and write
12F9000
heap
page read and write
3FAF000
stack
page read and write
5BB1000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
D55000
unkown
page execute and write copy
CB2000
unkown
page execute and write copy
5BC1000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
50B0000
remote allocation
page read and write
5C4A000
trusted library allocation
page read and write
AC0000
unkown
page readonly
1284000
heap
page read and write
5BA8000
trusted library allocation
page read and write
3E6F000
stack
page read and write
5BB1000
trusted library allocation
page read and write
1301000
heap
page read and write
13A3000
heap
page read and write
D03000
unkown
page execute and read and write
5B6F000
stack
page read and write
13AA000
heap
page read and write
5F7A000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
CF5000
unkown
page execute and read and write
5BB0000
trusted library allocation
page read and write
5BC4000
trusted library allocation
page read and write
1394000
heap
page read and write
5C43000
trusted library allocation
page read and write
13B4000
heap
page read and write
5BB9000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
588E000
stack
page read and write
50FB000
stack
page read and write
5C3D000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
13B8000
heap
page read and write
5BC2000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
13A3000
heap
page read and write
555D000
trusted library allocation
page read and write
5BFE000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
CF3000
unkown
page execute and write copy
D17000
unkown
page execute and read and write
5BA1000
trusted library allocation
page read and write
1398000
heap
page read and write
5C34000
trusted library allocation
page read and write
336E000
stack
page read and write
5CD1000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
1284000
heap
page read and write
13A9000
heap
page read and write
5A10000
heap
page read and write
5C33000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
5BB1000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
3FEE000
stack
page read and write
13B6000
heap
page read and write
5BAA000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
44EE000
stack
page read and write
3D2F000
stack
page read and write
1284000
heap
page read and write
5BC1000
trusted library allocation
page read and write
D77000
unkown
page execute and read and write
5C3B000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
13AE000
heap
page read and write
2F90000
direct allocation
page read and write
5C34000
trusted library allocation
page read and write
AC0000
unkown
page read and write
5BBF000
trusted library allocation
page read and write
14FF000
stack
page read and write
5070000
heap
page read and write
5C33000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
560F000
stack
page read and write
476E000
stack
page read and write
5BA8000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
1284000
heap
page read and write
13AE000
heap
page read and write
CCA000
unkown
page execute and write copy
5C4F000
trusted library allocation
page read and write
13A7000
heap
page read and write
5BA5000
trusted library allocation
page read and write
D2A000
unkown
page execute and write copy
5BB1000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
D95000
unkown
page execute and write copy
5BA8000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
CA0000
unkown
page execute and read and write
30EE000
stack
page read and write
3D6E000
stack
page read and write
5BB0000
trusted library allocation
page read and write
DBA000
unkown
page execute and write copy
5C4D000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
472F000
stack
page read and write
2F90000
direct allocation
page read and write
4C31000
heap
page read and write
5548000
trusted library allocation
page read and write
1284000
heap
page read and write
5CEE000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
13B1000
heap
page read and write
5210000
direct allocation
page execute and read and write
5BC1000
trusted library allocation
page read and write
5CC3000
trusted library allocation
page read and write
5240000
direct allocation
page execute and read and write
DA3000
unkown
page execute and read and write
1396000
heap
page read and write
5CB9000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
1284000
heap
page read and write
13A3000
heap
page read and write
13AE000
heap
page read and write
5BB1000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
D0E000
unkown
page execute and read and write
5CA7000
trusted library allocation
page read and write
5A6E000
stack
page read and write
50C0000
direct allocation
page read and write
578D000
stack
page read and write
5BB0000
trusted library allocation
page read and write
564E000
stack
page read and write
5BC1000
trusted library allocation
page read and write
1284000
heap
page read and write
44AF000
stack
page read and write
322E000
stack
page read and write
5C49000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
5CBD000
trusted library allocation
page read and write
B1B000
unkown
page execute and write copy
31EF000
stack
page read and write
134B000
heap
page read and write
5CC8000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
50B0000
remote allocation
page read and write
5BC1000
trusted library allocation
page read and write
1284000
heap
page read and write
CDB000
unkown
page execute and read and write
1280000
heap
page read and write
524D000
stack
page read and write
554F000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
4C31000
heap
page read and write
1284000
heap
page read and write
5BAF000
trusted library allocation
page read and write
CFE000
unkown
page execute and write copy
4C31000
heap
page read and write
13B3000
heap
page read and write
5240000
direct allocation
page execute and read and write
1284000
heap
page read and write
5BC1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
5C54000
trusted library allocation
page read and write
C97000
unkown
page execute and write copy
13AF000
heap
page read and write
5BC1000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
CAE000
unkown
page execute and write copy
412E000
stack
page read and write
2F90000
direct allocation
page read and write
5BC1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
53CE000
stack
page read and write
5BC1000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
4C41000
heap
page read and write
5C33000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
DAA000
unkown
page execute and write copy
5BC1000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
13A3000
heap
page read and write
13A3000
heap
page read and write
DA3000
unkown
page execute and write copy
C97000
unkown
page execute and read and write
5F02000
trusted library allocation
page read and write
CAB000
unkown
page execute and write copy
5BB1000
trusted library allocation
page read and write
D23000
unkown
page execute and read and write
5BE0000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
36EF000
stack
page read and write
5BB9000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
4C31000
heap
page read and write
604D000
trusted library allocation
page read and write
115A000
stack
page read and write
5BB0000
trusted library allocation
page read and write
13B1000
heap
page read and write
5C55000
trusted library allocation
page read and write
13B6000
heap
page read and write
1284000
heap
page read and write
5BC1000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
2F90000
direct allocation
page read and write
5BD7000
trusted library allocation
page read and write
34AE000
stack
page read and write
5BC1000
trusted library allocation
page read and write
4B2E000
stack
page read and write
5BC0000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
B27000
unkown
page execute and write copy
5BC1000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5BAF000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
1284000
heap
page read and write
2FA7000
heap
page read and write
13A6000
heap
page read and write
5260000
direct allocation
page execute and read and write
There are 542 hidden memdumps, click here to show them.