IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/hd
unknown
https://duckduckgo.com/ac/?q=
unknown
https://necklacedmny.sto
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/apis?
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://necklacedmny.store/apix
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/api7U
unknown
https://www.ecosia.org/newtab/
unknown
http://crl.microX
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://necklacedmny.store/p
unknown
https://necklacedmny.store/k
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/
unknown
https://necklacedmny.store:443/apil
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://necklacedmny.store/apis9
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://necklacedmny.store/C
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store:443/api
unknown
https://necklacedmny.store/K
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
https://necklacedmny.store/qP
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FD1000
unkown
page execute and read and write
malicious
5CA7000
trusted library allocation
page read and write
12D5000
unkown
page execute and write copy
14BD000
heap
page read and write
4CB1000
heap
page read and write
14AF000
heap
page read and write
13C4000
heap
page read and write
1449000
heap
page read and write
13C4000
heap
page read and write
14A6000
heap
page read and write
3CAE000
stack
page read and write
402F000
stack
page read and write
5C7B000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
144D000
heap
page read and write
5C96000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
5CC7000
trusted library allocation
page read and write
5C78000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
12C0000
unkown
page execute and write copy
5C81000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
6045000
trusted library allocation
page read and write
14ED000
heap
page read and write
5D63000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
13C4000
heap
page read and write
5C97000
trusted library allocation
page read and write
13C4000
heap
page read and write
1502000
trusted library allocation
page read and write
5C98000
trusted library allocation
page read and write
32AE000
stack
page read and write
12BE000
unkown
page execute and write copy
5CC7000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
5CF7000
trusted library allocation
page read and write
595E000
stack
page read and write
39EF000
stack
page read and write
13C4000
heap
page read and write
42AF000
stack
page read and write
55C3000
trusted library allocation
page read and write
14EF000
heap
page read and write
5C6A000
trusted library allocation
page read and write
11C8000
unkown
page execute and read and write
5C81000
trusted library allocation
page read and write
38AF000
stack
page read and write
5CC7000
trusted library allocation
page read and write
14A7000
heap
page read and write
5CA7000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
5C9C000
trusted library allocation
page read and write
14D7000
heap
page read and write
6978000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
14D4000
heap
page read and write
4CAF000
stack
page read and write
5D81000
trusted library allocation
page read and write
11CC000
unkown
page execute and read and write
13C4000
heap
page read and write
5CA7000
trusted library allocation
page read and write
5C84000
trusted library allocation
page read and write
13C4000
heap
page read and write
14E3000
heap
page read and write
5C70000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
14CC000
heap
page read and write
416F000
stack
page read and write
5C7C000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
1496000
heap
page read and write
603D000
trusted library allocation
page read and write
5BBF000
stack
page read and write
5D70000
trusted library allocation
page read and write
5C7C000
trusted library allocation
page read and write
1246000
unkown
page execute and read and write
4CB1000
heap
page read and write
5D81000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
3B6E000
stack
page read and write
5CAB000
trusted library allocation
page read and write
1469000
heap
page read and write
14BD000
heap
page read and write
5C70000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
2FE7000
heap
page read and write
5CBA000
trusted library allocation
page read and write
1445000
heap
page read and write
11AC000
unkown
page execute and write copy
5F9D000
trusted library allocation
page read and write
FD1000
unkown
page execute and write copy
5D61000
trusted library allocation
page read and write
1218000
unkown
page execute and write copy
5C62000
trusted library allocation
page read and write
14A9000
heap
page read and write
492E000
stack
page read and write
5CE1000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5A5F000
stack
page read and write
542D000
stack
page read and write
12BF000
unkown
page execute and read and write
5CA7000
trusted library allocation
page read and write
11F5000
unkown
page execute and read and write
5D70000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
38EE000
stack
page read and write
5D68000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5CC7000
trusted library allocation
page read and write
566E000
stack
page read and write
13C4000
heap
page read and write
5D70000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
1487000
heap
page read and write
516C000
stack
page read and write
3C6F000
stack
page read and write
73C86000
unkown
page readonly
56AE000
stack
page read and write
5D70000
trusted library allocation
page read and write
362F000
stack
page read and write
5C7C000
trusted library allocation
page read and write
13C4000
heap
page read and write
1469000
heap
page read and write
5C94000
trusted library allocation
page read and write
37AE000
stack
page read and write
5CC8000
trusted library allocation
page read and write
4CB1000
heap
page read and write
13C4000
heap
page read and write
5C6F000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
73C71000
unkown
page execute read
5C87000
trusted library allocation
page read and write
13C4000
heap
page read and write
14E9000
heap
page read and write
5120000
remote allocation
page read and write
1487000
heap
page read and write
5130000
direct allocation
page read and write
5D99000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
376F000
stack
page read and write
5C61000
trusted library allocation
page read and write
5C7B000
trusted library allocation
page read and write
1438000
heap
page read and write
13D0000
direct allocation
page read and write
5CC5000
trusted library allocation
page read and write
1291000
unkown
page execute and read and write
5C73000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5C9B000
trusted library allocation
page read and write
11B6000
unkown
page execute and read and write
5C9E000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
13C4000
heap
page read and write
14AA000
heap
page read and write
14EB000
heap
page read and write
5CA3000
trusted library allocation
page read and write
5C75000
trusted library allocation
page read and write
5120000
remote allocation
page read and write
14A6000
heap
page read and write
5CBF000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5C9B000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
58EE000
stack
page read and write
6461000
trusted library allocation
page read and write
14EF000
heap
page read and write
5CA7000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
14EF000
heap
page read and write
456E000
stack
page read and write
5D81000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
466F000
stack
page read and write
12BE000
unkown
page execute and write copy
4A6E000
stack
page read and write
352E000
stack
page read and write
1433000
heap
page read and write
5CD0000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
13D0000
direct allocation
page read and write
5D67000
trusted library allocation
page read and write
14DF000
heap
page read and write
13C4000
heap
page read and write
5D70000
trusted library allocation
page read and write
5C7C000
trusted library allocation
page read and write
5C9E000
trusted library allocation
page read and write
5FBD000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
1469000
heap
page read and write
4CB1000
heap
page read and write
5CC0000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5C78000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
14E4000
heap
page read and write
146A000
heap
page read and write
5D91000
trusted library allocation
page read and write
13F0000
direct allocation
page read and write
13D0000
direct allocation
page read and write
150C000
trusted library allocation
page read and write
1488000
heap
page read and write
1284000
unkown
page execute and write copy
5C81000
trusted library allocation
page read and write
4A2F000
stack
page read and write
5C9E000
trusted library allocation
page read and write
11B4000
unkown
page execute and read and write
442E000
stack
page read and write
5CA8000
trusted library allocation
page read and write
5CC7000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
1469000
heap
page read and write
52A0000
direct allocation
page execute and read and write
5CBA000
trusted library allocation
page read and write
47AF000
stack
page read and write
1217000
unkown
page execute and read and write
366E000
stack
page read and write
5D70000
trusted library allocation
page read and write
14E5000
heap
page read and write
52AD000
stack
page read and write
5CBF000
trusted library allocation
page read and write
1484000
heap
page read and write
14C6000
heap
page read and write
5C9F000
trusted library allocation
page read and write
5120000
remote allocation
page read and write
5C97000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
73C8D000
unkown
page read and write
4CB1000
heap
page read and write
5C75000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
13C4000
heap
page read and write
1212000
unkown
page execute and write copy
5C7B000
trusted library allocation
page read and write
1469000
heap
page read and write
5D69000
trusted library allocation
page read and write
B9B000
stack
page read and write
5CF7000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
5C73000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
5CCF000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
3DEE000
stack
page read and write
11AC000
unkown
page execute and read and write
5C84000
trusted library allocation
page read and write
5C7E000
trusted library allocation
page read and write
12D4000
unkown
page execute and read and write
55B6000
trusted library allocation
page read and write
46AE000
stack
page read and write
5D81000
trusted library allocation
page read and write
452F000
stack
page read and write
13D0000
direct allocation
page read and write
13C4000
heap
page read and write
5CCA000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
53ED000
stack
page read and write
526F000
stack
page read and write
14E4000
heap
page read and write
52F2000
trusted library allocation
page read and write
5C76000
trusted library allocation
page read and write
12D4000
unkown
page execute and write copy
5C8D000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
52B0000
direct allocation
page execute and read and write
5C98000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
14E9000
heap
page read and write
13C4000
heap
page read and write
5CBF000
trusted library allocation
page read and write
102B000
unkown
page execute and read and write
14DD000
heap
page read and write
2FED000
heap
page read and write
1438000
heap
page read and write
5C7C000
trusted library allocation
page read and write
1285000
unkown
page execute and read and write
5D81000
trusted library allocation
page read and write
140A000
heap
page read and write
5C84000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
13C4000
heap
page read and write
5CF7000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
11C7000
unkown
page execute and write copy
3DAF000
stack
page read and write
13C0000
heap
page read and write
5C7D000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
EFA000
stack
page read and write
144D000
heap
page read and write
5CC6000
trusted library allocation
page read and write
1185000
unkown
page execute and read and write
123C000
unkown
page execute and write copy
5C97000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
5F66000
trusted library allocation
page read and write
12C6000
unkown
page execute and write copy
14DB000
heap
page read and write
11B2000
unkown
page execute and read and write
5CB4000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
1449000
heap
page read and write
5C60000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
145F000
heap
page read and write
13C4000
heap
page read and write
5D70000
trusted library allocation
page read and write
5C99000
trusted library allocation
page read and write
123E000
unkown
page execute and write copy
5C50000
heap
page read and write
14E3000
heap
page read and write
5CD1000
trusted library allocation
page read and write
47EE000
stack
page read and write
13D0000
direct allocation
page read and write
5C6F000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
1487000
heap
page read and write
312F000
stack
page read and write
13B0000
heap
page read and write
4CB1000
heap
page read and write
5C7B000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5C73000
trusted library allocation
page read and write
5C99000
trusted library allocation
page read and write
14DD000
heap
page read and write
5280000
direct allocation
page execute and read and write
5C9C000
trusted library allocation
page read and write
48EF000
stack
page read and write
34EF000
stack
page read and write
5C97000
trusted library allocation
page read and write
5C9E000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
4CB0000
heap
page read and write
5C73000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
316E000
stack
page read and write
549C000
trusted library allocation
page read and write
5C7C000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
FD0000
unkown
page readonly
33AF000
stack
page read and write
5D81000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5ABE000
stack
page read and write
5C9C000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
43EF000
stack
page read and write
5D81000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
57AF000
stack
page read and write
55AE000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
11B3000
unkown
page execute and write copy
1233000
unkown
page execute and write copy
1445000
heap
page read and write
5CAE000
trusted library allocation
page read and write
14DA000
heap
page read and write
5CF5000
trusted library allocation
page read and write
13C4000
heap
page read and write
14BE000
heap
page read and write
14EE000
heap
page read and write
5C6F000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
5C70000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
5C99000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
2FDF000
stack
page read and write
5D81000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
2FE0000
heap
page read and write
42EE000
stack
page read and write
73C70000
unkown
page readonly
5C87000
trusted library allocation
page read and write
140E000
heap
page read and write
5C75000
trusted library allocation
page read and write
5CB3000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5C69000
trusted library allocation
page read and write
1487000
heap
page read and write
5C81000
trusted library allocation
page read and write
13C4000
heap
page read and write
5D67000
trusted library allocation
page read and write
14E3000
heap
page read and write
11CB000
unkown
page execute and write copy
11DE000
unkown
page execute and read and write
5D81000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
1400000
heap
page read and write
5270000
direct allocation
page execute and read and write
3A2E000
stack
page read and write
5CBF000
trusted library allocation
page read and write
1487000
heap
page read and write
5C74000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
5CC7000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
552D000
stack
page read and write
5D81000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
14E3000
heap
page read and write
5CC2000
trusted library allocation
page read and write
5C68000
trusted library allocation
page read and write
5C75000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5C76000
trusted library allocation
page read and write
13C4000
heap
page read and write
5CF8000
trusted library allocation
page read and write
124D000
unkown
page execute and write copy
5C6F000
trusted library allocation
page read and write
5CBC000
trusted library allocation
page read and write
5D87000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5CF8000
trusted library allocation
page read and write
1227000
unkown
page execute and read and write
406E000
stack
page read and write
1225000
unkown
page execute and write copy
5CE1000
trusted library allocation
page read and write
5C99000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5C76000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
1487000
heap
page read and write
121D000
unkown
page execute and read and write
5C75000
trusted library allocation
page read and write
14DA000
heap
page read and write
13F0000
direct allocation
page read and write
60D5000
trusted library allocation
page read and write
BF0000
heap
page read and write
5CA7000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
126F000
unkown
page execute and read and write
5C9C000
trusted library allocation
page read and write
5C7B000
trusted library allocation
page read and write
14C1000
heap
page read and write
FD0000
unkown
page read and write
5C8D000
trusted library allocation
page read and write
5C9E000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
2EDE000
stack
page read and write
556E000
stack
page read and write
1235000
unkown
page execute and read and write
3F2E000
stack
page read and write
5CA7000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
1484000
heap
page read and write
5C97000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
12E0000
heap
page read and write
12B0000
unkown
page execute and write copy
5C81000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5C7B000
trusted library allocation
page read and write
12C6000
unkown
page execute and write copy
5C6F000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
13C4000
heap
page read and write
302B000
stack
page read and write
5C84000
trusted library allocation
page read and write
5C73000
trusted library allocation
page read and write
5C99000
trusted library allocation
page read and write
5F6C000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
13C4000
heap
page read and write
57ED000
stack
page read and write
5F85000
trusted library allocation
page read and write
5CB7000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
600D000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
33EE000
stack
page read and write
5CC0000
trusted library allocation
page read and write
5C75000
trusted library allocation
page read and write
14BD000
heap
page read and write
5C7C000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
124F000
unkown
page execute and read and write
11B5000
unkown
page execute and write copy
5C76000
trusted library allocation
page read and write
73C8F000
unkown
page readonly
50F0000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
13D0000
direct allocation
page read and write
123D000
unkown
page execute and read and write
5D97000
trusted library allocation
page read and write
41AE000
stack
page read and write
13C4000
heap
page read and write
5C73000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
145F000
heap
page read and write
4BAE000
stack
page read and write
5C9F000
trusted library allocation
page read and write
5CF7000
trusted library allocation
page read and write
50F0000
heap
page read and write
11E6000
unkown
page execute and write copy
5CD0000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
11DD000
unkown
page execute and write copy
1469000
heap
page read and write
3EEF000
stack
page read and write
5C81000
trusted library allocation
page read and write
5C78000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
102B000
unkown
page execute and write copy
5C89000
trusted library allocation
page read and write
126C000
unkown
page execute and write copy
14DF000
heap
page read and write
14DB000
heap
page read and write
5C9C000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
14D8000
heap
page read and write
3B2F000
stack
page read and write
5C6F000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
13C4000
heap
page read and write
5D79000
trusted library allocation
page read and write
1188000
unkown
page execute and write copy
119F000
unkown
page execute and read and write
5D68000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5C75000
trusted library allocation
page read and write
1037000
unkown
page execute and write copy
5C62000
trusted library allocation
page read and write
5C7B000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
4CB1000
heap
page read and write
14E9000
heap
page read and write
5C7B000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
326F000
stack
page read and write
4B6F000
stack
page read and write
52A0000
direct allocation
page execute and read and write
11AF000
unkown
page execute and write copy
14BA000
heap
page read and write
4CC0000
heap
page read and write
There are 582 hidden memdumps, click here to show them.