IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.97.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://necklacedmny.store/5
unknown
http://crl.microsoft
unknown
https://necklacedmny.store/api%4
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://necklacedmny.store/apir4v
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.mozilla.or
unknown
https://necklacedmny.store/apid4d
unknown
https://necklacedmny.store/$$
unknown
https://necklacedmny.store:443/apiK
unknown
https://necklacedmny.store/api2f
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://necklacedmny.store/99=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/d
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://necklacedmny.store/m
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://necklacedmny.store:443/api.default-release/key4.dbPK
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/D
unknown
https://necklacedmny.store/apin
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://necklacedmny.store/apij
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
671000
unkown
page execute and read and write
malicious
5EED000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
8FD000
unkown
page execute and write copy
56BD000
stack
page read and write
4E61000
heap
page read and write
5C6E000
stack
page read and write
4E50000
direct allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DCE000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
1788000
heap
page read and write
366F000
stack
page read and write
5DB8000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
1788000
heap
page read and write
4E61000
heap
page read and write
5DF9000
trusted library allocation
page read and write
177E000
heap
page read and write
5DC9000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
4E61000
heap
page read and write
5DD8000
trusted library allocation
page read and write
169A000
heap
page read and write
1780000
heap
page read and write
5E41000
trusted library allocation
page read and write
1780000
heap
page read and write
5DEC000
trusted library allocation
page read and write
8EB000
unkown
page execute and read and write
3CEE000
stack
page read and write
5DE9000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
176E000
heap
page read and write
5E46000
trusted library allocation
page read and write
840000
unkown
page execute and write copy
5DD1000
trusted library allocation
page read and write
1788000
heap
page read and write
87A000
unkown
page execute and read and write
5DC7000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
5A9E000
stack
page read and write
63B5000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
4E30000
heap
page read and write
4E60000
heap
page read and write
5E41000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
5DB8000
trusted library allocation
page read and write
177D000
heap
page read and write
5DF0000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
5E7F000
trusted library allocation
page read and write
1780000
heap
page read and write
5E1D000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
16D0000
heap
page read and write
42EF000
stack
page read and write
153E000
stack
page read and write
1788000
heap
page read and write
5470000
direct allocation
page execute and read and write
5DF9000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
356E000
stack
page read and write
6D7000
unkown
page execute and write copy
8E9000
unkown
page execute and read and write
5E46000
trusted library allocation
page read and write
962000
unkown
page execute and write copy
177E000
heap
page read and write
825000
unkown
page execute and write copy
5DF2000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
52F0000
direct allocation
page read and write
13B0000
heap
page read and write
5950000
remote allocation
page read and write
5E41000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
5E46000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
670000
unkown
page read and write
5E08000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
31AC000
stack
page read and write
599D000
stack
page read and write
5E70000
trusted library allocation
page read and write
1766000
heap
page read and write
52F0000
direct allocation
page read and write
5DEE000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
432E000
stack
page read and write
5DD8000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5E46000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
1765000
heap
page read and write
1775000
heap
page read and write
5EBF000
trusted library allocation
page read and write
4BAF000
stack
page read and write
5E03000
trusted library allocation
page read and write
1788000
heap
page read and write
8CA000
unkown
page execute and write copy
5DC4000
trusted library allocation
page read and write
5DCE000
trusted library allocation
page read and write
352F000
stack
page read and write
5950000
remote allocation
page read and write
1788000
heap
page read and write
5950000
remote allocation
page read and write
5E30000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
37AF000
stack
page read and write
5E03000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
1788000
heap
page read and write
5E46000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
492F000
stack
page read and write
4E61000
heap
page read and write
442F000
stack
page read and write
5DE8000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
1786000
heap
page read and write
91F000
unkown
page execute and read and write
843000
unkown
page execute and read and write
5E46000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
16DA000
heap
page read and write
3BAE000
stack
page read and write
8B2000
unkown
page execute and read and write
5DCD000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
1788000
heap
page read and write
5DC7000
trusted library allocation
page read and write
1775000
heap
page read and write
40AE000
stack
page read and write
5DC7000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
16C7000
heap
page read and write
4E61000
heap
page read and write
5DBE000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5DD9000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
38EF000
stack
page read and write
5E15000
trusted library allocation
page read and write
8D9000
unkown
page execute and write copy
891000
unkown
page execute and read and write
5DE5000
trusted library allocation
page read and write
5DFD000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
1773000
heap
page read and write
46EE000
stack
page read and write
5E55000
trusted library allocation
page read and write
175F000
heap
page read and write
1788000
heap
page read and write
4E61000
heap
page read and write
5DE6000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
6CB000
unkown
page execute and read and write
5E94000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
8FE000
unkown
page execute and read and write
5DD8000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
5F95000
trusted library allocation
page read and write
95B000
unkown
page execute and write copy
14F0000
heap
page read and write
406F000
stack
page read and write
5DFB000
trusted library allocation
page read and write
41EE000
stack
page read and write
5E47000
trusted library allocation
page read and write
1787000
heap
page read and write
4E61000
heap
page read and write
542F000
stack
page read and write
5DB0000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
1785000
heap
page read and write
5E18000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
1772000
heap
page read and write
5DE8000
trusted library allocation
page read and write
1786000
heap
page read and write
1760000
heap
page read and write
1788000
heap
page read and write
5DF9000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
52F0000
direct allocation
page read and write
5E10000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
5EBC000
trusted library allocation
page read and write
125B000
stack
page read and write
5DB8000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
583E000
stack
page read and write
5E41000
trusted library allocation
page read and write
970000
unkown
page execute and write copy
5DE9000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
4E61000
heap
page read and write
5E69000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
167E000
stack
page read and write
4E2F000
stack
page read and write
5E45000
trusted library allocation
page read and write
175F000
heap
page read and write
14F5000
heap
page read and write
5DEE000
trusted library allocation
page read and write
1787000
heap
page read and write
41AF000
stack
page read and write
5DE9000
trusted library allocation
page read and write
5D6F000
stack
page read and write
1772000
heap
page read and write
5DC7000
trusted library allocation
page read and write
4E61000
heap
page read and write
45AE000
stack
page read and write
14E0000
heap
page read and write
5E5A000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
971000
unkown
page execute and write copy
5DDF000
trusted library allocation
page read and write
3B6F000
stack
page read and write
5D90000
heap
page read and write
5E39000
trusted library allocation
page read and write
1773000
heap
page read and write
5E36000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
6CB000
unkown
page execute and write copy
5DF9000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
16D5000
heap
page read and write
95A000
unkown
page execute and read and write
5DF5000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5DB6000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
5DC9000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
5E6C000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5DCE000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
4CEF000
stack
page read and write
5470000
direct allocation
page execute and read and write
5DD8000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
175F000
heap
page read and write
5DD7000
trusted library allocation
page read and write
8CF000
unkown
page execute and read and write
4E61000
heap
page read and write
5DEC000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
3DEF000
stack
page read and write
169E000
heap
page read and write
5E41000
trusted library allocation
page read and write
670000
unkown
page readonly
970000
unkown
page execute and read and write
1765000
heap
page read and write
176E000
heap
page read and write
5DD8000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
5DB6000
trusted library allocation
page read and write
1772000
heap
page read and write
886000
unkown
page execute and write copy
5DC6000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
901000
unkown
page execute and read and write
5DB1000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
1772000
heap
page read and write
959000
unkown
page execute and write copy
8B3000
unkown
page execute and write copy
1767000
heap
page read and write
5DFD000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
46AF000
stack
page read and write
5DE4000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
83F000
unkown
page execute and read and write
5DC9000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5F85000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
5E7F000
trusted library allocation
page read and write
342E000
stack
page read and write
5E5A000
trusted library allocation
page read and write
135A000
stack
page read and write
5E4E000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
879000
unkown
page execute and write copy
577B000
trusted library allocation
page read and write
4BEE000
stack
page read and write
5DF8000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
1781000
heap
page read and write
92A000
unkown
page execute and read and write
5E41000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
482E000
stack
page read and write
5DD8000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
5DC9000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
6C9000
unkown
page write copy
5E09000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
1788000
heap
page read and write
4D2E000
stack
page read and write
5E46000
trusted library allocation
page read and write
16F1000
heap
page read and write
959000
unkown
page execute and write copy
5DE1000
trusted library allocation
page read and write
8E8000
unkown
page execute and write copy
5DF1000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
55BD000
stack
page read and write
177E000
heap
page read and write
32AF000
stack
page read and write
8EA000
unkown
page execute and write copy
849000
unkown
page execute and read and write
5787000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5DC9000
trusted library allocation
page read and write
532C000
stack
page read and write
5DD8000
trusted library allocation
page read and write
8FF000
unkown
page execute and write copy
5E41000
trusted library allocation
page read and write
8A6000
unkown
page execute and write copy
671000
unkown
page execute and write copy
5DF9000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5DC9000
trusted library allocation
page read and write
1786000
heap
page read and write
5DC7000
trusted library allocation
page read and write
579C000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5E46000
trusted library allocation
page read and write
4AAE000
stack
page read and write
5DF9000
trusted library allocation
page read and write
6D6000
unkown
page execute and read and write
5C0F000
stack
page read and write
5E41000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
456E000
stack
page read and write
5DE0000
trusted library allocation
page read and write
188E000
stack
page read and write
6C9000
unkown
page write copy
3A6E000
stack
page read and write
1788000
heap
page read and write
5E04000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
3A2F000
stack
page read and write
1788000
heap
page read and write
4E61000
heap
page read and write
5DF3000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
4A6F000
stack
page read and write
496E000
stack
page read and write
175F000
heap
page read and write
5E07000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
68C4000
trusted library allocation
page read and write
33EF000
stack
page read and write
1786000
heap
page read and write
962000
unkown
page execute and write copy
5E1A000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
52DD000
stack
page read and write
8AA000
unkown
page execute and write copy
5E36000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
91D000
unkown
page execute and write copy
5E45000
trusted library allocation
page read and write
1490000
heap
page read and write
4E50000
direct allocation
page read and write
5DC9000
trusted library allocation
page read and write
4E61000
heap
page read and write
5DE6000
trusted library allocation
page read and write
593F000
stack
page read and write
1780000
heap
page read and write
5DE8000
trusted library allocation
page read and write
32EE000
stack
page read and write
5DE8000
trusted library allocation
page read and write
316F000
stack
page read and write
5470000
direct allocation
page execute and read and write
1772000
heap
page read and write
14E7000
heap
page read and write
8A9000
unkown
page execute and read and write
547E000
stack
page read and write
5DCD000
trusted library allocation
page read and write
3CAF000
stack
page read and write
5E41000
trusted library allocation
page read and write
1759000
heap
page read and write
5E46000
trusted library allocation
page read and write
14ED000
heap
page read and write
8E1000
unkown
page execute and read and write
3E2E000
stack
page read and write
5E06000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
306E000
stack
page read and write
5DD1000
trusted library allocation
page read and write
8BB000
unkown
page execute and read and write
5E41000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
163E000
stack
page read and write
3F2F000
stack
page read and write
5DC2000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
1785000
heap
page read and write
5E41000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
1762000
heap
page read and write
5DC9000
trusted library allocation
page read and write
56FE000
stack
page read and write
5E10000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
4E61000
heap
page read and write
5DE8000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
8CC000
unkown
page execute and read and write
5E46000
trusted library allocation
page read and write
4E61000
heap
page read and write
5E46000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
4E61000
heap
page read and write
578F000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
3F6E000
stack
page read and write
1690000
heap
page read and write
5DC6000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
6D5000
unkown
page execute and write copy
4E50000
direct allocation
page read and write
8CD000
unkown
page execute and write copy
4E61000
heap
page read and write
5B0E000
stack
page read and write
36AE000
stack
page read and write
4E70000
heap
page read and write
5DD7000
trusted library allocation
page read and write
5E37000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
87E000
unkown
page execute and write copy
176E000
heap
page read and write
6025000
trusted library allocation
page read and write
54CF000
trusted library allocation
page read and write
4E61000
heap
page read and write
5E15000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
1788000
heap
page read and write
1785000
heap
page read and write
1773000
heap
page read and write
5E51000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5ED5000
trusted library allocation
page read and write
392E000
stack
page read and write
5DE0000
trusted library allocation
page read and write
87F000
unkown
page execute and read and write
5460000
direct allocation
page execute and read and write
5E28000
trusted library allocation
page read and write
57FF000
stack
page read and write
822000
unkown
page execute and read and write
4E61000
heap
page read and write
446E000
stack
page read and write
5E55000
trusted library allocation
page read and write
47EF000
stack
page read and write
5DC3000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
1788000
heap
page read and write
5F8D000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
867000
unkown
page execute and read and write
5DF3000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
1788000
heap
page read and write
37EE000
stack
page read and write
5E78000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
176E000
heap
page read and write
5E01000
trusted library allocation
page read and write
1786000
heap
page read and write
5DEF000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
1788000
heap
page read and write
5DC7000
trusted library allocation
page read and write
16DE000
heap
page read and write
866000
unkown
page execute and write copy
94D000
unkown
page execute and write copy
5DC2000
trusted library allocation
page read and write
849000
unkown
page execute and write copy
1680000
heap
page read and write
5E47000
trusted library allocation
page read and write
1788000
heap
page read and write
5DBD000
trusted library allocation
page read and write
There are 583 hidden memdumps, click here to show them.