Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://necklacedmny.store/W1
|
unknown
|
||
https://necklacedmny.store/api
|
188.114.96.3
|
||
https://necklacedmny.store:443/apiicrosoft
|
unknown
|
||
https://necklacedmny.store/api8
|
unknown
|
||
https://necklacedmny.store/apix
|
unknown
|
||
https://necklacedmny.store/apiU
|
unknown
|
||
presticitpo.store
|
|||
scriptyprefej.store
|
|||
https://necklacedmny.store/d
|
unknown
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
https://necklacedmny.store/ed
|
unknown
|
||
https://necklacedmny.store/
|
unknown
|
||
https://necklacedmny.store:443/api.default-release/key4.dbPK
|
unknown
|
||
https://necklacedmny.store/apiZ
|
unknown
|
||
navygenerayk.store
|
|||
founpiuer.store
|
|||
https://necklacedmny.store/?19
|
unknown
|
||
https://necklacedmny.store/G11
|
unknown
|
||
thumbystriw.store
|
|||
https://necklacedmny.store/api0
|
unknown
|
||
crisiwarny.store
|
|||
https://necklacedmny.store/apisn
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 36 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.96.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
necklacedmny.store
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21000
|
unkown
|
page execute and read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
60C2000
|
trusted library allocation
|
page read and write
|
||
87000
|
unkown
|
page execute and write copy
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
553D000
|
stack
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
30D000
|
unkown
|
page execute and write copy
|
||
4BBE000
|
stack
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
15DE000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
7B000
|
unkown
|
page execute and write copy
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
stack
|
page read and write
|
||
2FD000
|
unkown
|
page execute and write copy
|
||
1659000
|
heap
|
page read and write
|
||
1FB000
|
unkown
|
page execute and write copy
|
||
1415000
|
heap
|
page read and write
|
||
1DC000
|
unkown
|
page execute and write copy
|
||
165B000
|
heap
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5B8F000
|
stack
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
58D0000
|
remote allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
5E67000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
6A4E000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
7B000
|
unkown
|
page execute and write copy
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
79000
|
unkown
|
page write copy
|
||
4E01000
|
heap
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1530000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
52BC000
|
stack
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5E0E000
|
trusted library allocation
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
292000
|
unkown
|
page execute and write copy
|
||
3100000
|
direct allocation
|
page read and write
|
||
58D0000
|
remote allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
30E000
|
unkown
|
page execute and read and write
|
||
262000
|
unkown
|
page execute and write copy
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
279000
|
unkown
|
page execute and write copy
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
26E000
|
unkown
|
page execute and read and write
|
||
295000
|
unkown
|
page execute and write copy
|
||
1FB000
|
unkown
|
page execute and read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
2B8000
|
unkown
|
page execute and write copy
|
||
1659000
|
heap
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
267000
|
unkown
|
page execute and write copy
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
1639000
|
heap
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
25F000
|
unkown
|
page execute and write copy
|
||
1659000
|
heap
|
page read and write
|
||
326000
|
unkown
|
page execute and read and write
|
||
1637000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
61DF000
|
trusted library allocation
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
327000
|
unkown
|
page execute and write copy
|
||
162C000
|
heap
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
stack
|
page read and write
|
||
207000
|
unkown
|
page execute and read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
5E02000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
653A000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
591D000
|
stack
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5ED7000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
23F000
|
unkown
|
page execute and read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
1FF000
|
unkown
|
page execute and write copy
|
||
417F000
|
stack
|
page read and write
|
||
284000
|
unkown
|
page execute and write copy
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
266000
|
unkown
|
page execute and read and write
|
||
165E000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
27C000
|
unkown
|
page execute and read and write
|
||
15B3000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
1637000
|
heap
|
page read and write
|
||
185F000
|
stack
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
26F000
|
unkown
|
page execute and write copy
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
1659000
|
heap
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
1638000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page read and write
|
||
577F000
|
stack
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5E5A000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
21000
|
unkown
|
page execute and write copy
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
261000
|
unkown
|
page execute and read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
217000
|
unkown
|
page execute and write copy
|
||
38BF000
|
stack
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
15A4000
|
heap
|
page read and write
|
||
5F62000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
206000
|
unkown
|
page execute and write copy
|
||
3120000
|
direct allocation
|
page read and write
|
||
5DFB000
|
trusted library allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
319000
|
unkown
|
page execute and write copy
|
||
4E01000
|
heap
|
page read and write
|
||
FCB000
|
stack
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
527D000
|
stack
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
53FD000
|
stack
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
353E000
|
stack
|
page read and write
|
||
319000
|
unkown
|
page execute and write copy
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1632000
|
heap
|
page read and write
|
||
2BA000
|
unkown
|
page execute and read and write
|
||
1659000
|
heap
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
1632000
|
heap
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
2DE000
|
unkown
|
page execute and read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
1637000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
30F000
|
unkown
|
page execute and write copy
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
trusted library allocation
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
326000
|
unkown
|
page execute and write copy
|
||
1599000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
1DA000
|
unkown
|
page execute and read and write
|
||
1637000
|
heap
|
page read and write
|
||
563C000
|
stack
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
1646000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1652000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
30D000
|
unkown
|
page execute and write copy
|
||
218000
|
unkown
|
page execute and read and write
|
||
22C000
|
unkown
|
page execute and write copy
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
28A000
|
unkown
|
page execute and read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
15F3000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
165D000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
1652000
|
heap
|
page read and write
|
||
317B000
|
stack
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
7B000
|
unkown
|
page execute and read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
remote allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
3100000
|
direct allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
610E000
|
trusted library allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
5DC8000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
1FB000
|
unkown
|
page execute and write copy
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
79000
|
unkown
|
page write copy
|
||
5A1E000
|
stack
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
trusted library allocation
|
page read and write
|
||
5D87000
|
trusted library allocation
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5D89000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
15E1000
|
heap
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
15C3000
|
heap
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
55EE000
|
trusted library allocation
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
293000
|
unkown
|
page execute and read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
29D000
|
unkown
|
page execute and read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
205000
|
unkown
|
page execute and read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
272000
|
unkown
|
page execute and read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
There are 504 hidden memdumps, click here to show them.