IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.97.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/7
unknown
https://duckduckgo.com/ac/?q=
unknown
https://necklacedmny.store/apiB
unknown
https://necklacedmny.store/apite
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.microsoft
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://necklacedmny.store//
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://necklacedmny.store/apiI
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/apirH
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://necklacedmny.store/apib
unknown
https://necklacedmny.store/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/apirX
unknown
https://necklacedmny.store/jp
unknown
https://necklacedmny.store/apis7
unknown
https://necklacedmny.store/apim
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store/O
unknown
https://necklacedmny.store/apik
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9C1000
unkown
page execute and read and write
malicious
5C75000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
5D17000
trusted library allocation
page read and write
11E4000
heap
page read and write
C58000
unkown
page execute and read and write
11E4000
heap
page read and write
5D21000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
1444000
heap
page read and write
2E00000
direct allocation
page read and write
48EF000
stack
page read and write
13CE000
heap
page read and write
5D31000
trusted library allocation
page read and write
5AA0000
heap
page read and write
2E00000
direct allocation
page read and write
5C2A000
trusted library allocation
page read and write
5F1C000
trusted library allocation
page read and write
1440000
heap
page read and write
1429000
heap
page read and write
1431000
heap
page read and write
5C26000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
1434000
heap
page read and write
11E0000
heap
page read and write
BB4000
unkown
page execute and read and write
5C74000
trusted library allocation
page read and write
1440000
heap
page read and write
5C2D000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
1440000
heap
page read and write
5D21000
trusted library allocation
page read and write
3DEE000
stack
page read and write
13C9000
heap
page read and write
145C000
heap
page read and write
2E00000
direct allocation
page read and write
5F6D000
trusted library allocation
page read and write
4A6E000
stack
page read and write
9C1000
unkown
page execute and write copy
362F000
stack
page read and write
5D11000
trusted library allocation
page read and write
3CAE000
stack
page read and write
DE0000
heap
page read and write
5D31000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
143C000
heap
page read and write
5CA1000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
1431000
heap
page read and write
39EF000
stack
page read and write
13C9000
heap
page read and write
5D20000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
1440000
heap
page read and write
2D7E000
stack
page read and write
5D20000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
4FF0000
direct allocation
page read and write
132F000
stack
page read and write
A1B000
unkown
page execute and read and write
1429000
heap
page read and write
1440000
heap
page read and write
5C7A000
trusted library allocation
page read and write
352E000
stack
page read and write
553F000
stack
page read and write
502B000
stack
page read and write
60B5000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
5D20000
trusted library allocation
page read and write
143A000
heap
page read and write
2E00000
direct allocation
page read and write
4FF0000
direct allocation
page read and write
5CCD000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
1458000
heap
page read and write
5FBD000
trusted library allocation
page read and write
1429000
heap
page read and write
5C26000
trusted library allocation
page read and write
159E000
stack
page read and write
5CA7000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
42EE000
stack
page read and write
33AF000
stack
page read and write
5D49000
trusted library allocation
page read and write
136E000
heap
page read and write
5D56000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
5C55000
trusted library allocation
page read and write
5160000
direct allocation
page execute and read and write
1429000
heap
page read and write
5C8F000
trusted library allocation
page read and write
11E4000
heap
page read and write
5FED000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
1459000
heap
page read and write
4B6F000
stack
page read and write
144F000
heap
page read and write
5C1C000
trusted library allocation
page read and write
143F000
heap
page read and write
5C50000
trusted library allocation
page read and write
5CC4000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
5C19000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
11E4000
heap
page read and write
1432000
heap
page read and write
1429000
heap
page read and write
C91000
unkown
page execute and read and write
143F000
heap
page read and write
5C36000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
1440000
heap
page read and write
5C60000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
11E4000
heap
page read and write
5C3F000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
4B71000
heap
page read and write
38AF000
stack
page read and write
5D31000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
C2F000
unkown
page execute and write copy
5C54000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
1431000
heap
page read and write
C16000
unkown
page execute and write copy
1440000
heap
page read and write
11E4000
heap
page read and write
5D31000
trusted library allocation
page read and write
3B6E000
stack
page read and write
43EF000
stack
page read and write
5C74000
trusted library allocation
page read and write
4B71000
heap
page read and write
5C16000
trusted library allocation
page read and write
11E4000
heap
page read and write
1440000
heap
page read and write
5D37000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5C77000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
4FB0000
heap
page read and write
C1C000
unkown
page execute and write copy
1440000
heap
page read and write
5D31000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
492E000
stack
page read and write
38EE000
stack
page read and write
5C55000
trusted library allocation
page read and write
57BE000
stack
page read and write
549A000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
145B000
heap
page read and write
5D31000
trusted library allocation
page read and write
11E4000
heap
page read and write
1440000
heap
page read and write
1434000
heap
page read and write
13EF000
heap
page read and write
149E000
stack
page read and write
33EE000
stack
page read and write
2E00000
direct allocation
page read and write
C1E000
unkown
page execute and read and write
5D31000
trusted library allocation
page read and write
1434000
heap
page read and write
5C15000
trusted library allocation
page read and write
4B71000
heap
page read and write
5D31000
trusted library allocation
page read and write
56BD000
stack
page read and write
5C1C000
trusted library allocation
page read and write
9C0000
unkown
page read and write
5C74000
trusted library allocation
page read and write
1421000
heap
page read and write
5C60000
trusted library allocation
page read and write
1350000
heap
page read and write
1440000
heap
page read and write
145C000
heap
page read and write
13A3000
heap
page read and write
5180000
direct allocation
page execute and read and write
CD3000
unkown
page execute and write copy
5C4B000
trusted library allocation
page read and write
3EEF000
stack
page read and write
1440000
heap
page read and write
C3C000
unkown
page execute and read and write
4A2F000
stack
page read and write
2E00000
direct allocation
page read and write
11E4000
heap
page read and write
5C74000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
5C2C000
trusted library allocation
page read and write
5C16000
trusted library allocation
page read and write
1440000
heap
page read and write
1440000
heap
page read and write
CC3000
unkown
page execute and write copy
5C33000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
3DAF000
stack
page read and write
5C1C000
trusted library allocation
page read and write
13CE000
heap
page read and write
1431000
heap
page read and write
5D21000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
4B70000
heap
page read and write
5D31000
trusted library allocation
page read and write
596E000
stack
page read and write
47AF000
stack
page read and write
11E4000
heap
page read and write
312F000
stack
page read and write
5C3B000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
13CE000
heap
page read and write
1452000
heap
page read and write
5C27000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
51C9000
trusted library allocation
page read and write
1431000
heap
page read and write
5C27000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
13A0000
heap
page read and write
C2C000
unkown
page execute and write copy
5D29000
trusted library allocation
page read and write
1458000
heap
page read and write
5CA1000
trusted library allocation
page read and write
512F000
stack
page read and write
5170000
direct allocation
page execute and read and write
5D2F000
trusted library allocation
page read and write
13CE000
heap
page read and write
5CCC000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
1437000
heap
page read and write
A19000
unkown
page write copy
2E2D000
heap
page read and write
5C23000
trusted library allocation
page read and write
13CE000
heap
page read and write
5C3F000
trusted library allocation
page read and write
5CC4000
trusted library allocation
page read and write
5A6F000
stack
page read and write
122E000
stack
page read and write
5C15000
trusted library allocation
page read and write
11E4000
heap
page read and write
1429000
heap
page read and write
5C7F000
trusted library allocation
page read and write
580D000
stack
page read and write
BB2000
unkown
page execute and write copy
5D87000
trusted library allocation
page read and write
46AE000
stack
page read and write
5D18000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
1440000
heap
page read and write
47EE000
stack
page read and write
143B000
heap
page read and write
136A000
heap
page read and write
376F000
stack
page read and write
1434000
heap
page read and write
1429000
heap
page read and write
CC3000
unkown
page execute and write copy
4B71000
heap
page read and write
5D49000
trusted library allocation
page read and write
1454000
heap
page read and write
5C2F000
trusted library allocation
page read and write
1450000
heap
page read and write
5C3F000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
1440000
heap
page read and write
5D7A000
trusted library allocation
page read and write
C48000
unkown
page execute and write copy
5C4C000
trusted library allocation
page read and write
CD2000
unkown
page execute and write copy
5C56000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5AEE000
stack
page read and write
5C33000
trusted library allocation
page read and write
5C9A000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
BED000
unkown
page execute and read and write
5C5B000
trusted library allocation
page read and write
1440000
heap
page read and write
1440000
heap
page read and write
51B0000
direct allocation
page execute and read and write
1440000
heap
page read and write
13C9000
heap
page read and write
5170000
direct allocation
page execute and read and write
5D31000
trusted library allocation
page read and write
326F000
stack
page read and write
5C3A000
trusted library allocation
page read and write
543D000
stack
page read and write
5C23000
trusted library allocation
page read and write
1429000
heap
page read and write
5C4A000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
11E4000
heap
page read and write
1429000
heap
page read and write
5C26000
trusted library allocation
page read and write
1440000
heap
page read and write
143E000
heap
page read and write
5C23000
trusted library allocation
page read and write
C09000
unkown
page execute and read and write
5C38000
trusted library allocation
page read and write
10FA000
stack
page read and write
13CE000
heap
page read and write
D6B000
stack
page read and write
5C9A000
trusted library allocation
page read and write
53FC000
stack
page read and write
5D31000
trusted library allocation
page read and write
32AE000
stack
page read and write
5CCC000
trusted library allocation
page read and write
4B71000
heap
page read and write
11E4000
heap
page read and write
13CE000
heap
page read and write
C45000
unkown
page execute and write copy
52BE000
stack
page read and write
5D21000
trusted library allocation
page read and write
34EF000
stack
page read and write
13CE000
heap
page read and write
5D21000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
143F000
heap
page read and write
5C69000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
567E000
stack
page read and write
5190000
direct allocation
page execute and read and write
5D21000
trusted library allocation
page read and write
BAA000
unkown
page execute and read and write
5C10000
trusted library allocation
page read and write
3A2E000
stack
page read and write
B9E000
unkown
page execute and read and write
145E000
heap
page read and write
5D20000
trusted library allocation
page read and write
641F000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
11E4000
heap
page read and write
5C72000
trusted library allocation
page read and write
C4A000
unkown
page execute and read and write
5C2F000
trusted library allocation
page read and write
452F000
stack
page read and write
5D17000
trusted library allocation
page read and write
1360000
heap
page read and write
5DB7000
trusted library allocation
page read and write
BDA000
unkown
page execute and write copy
5C69000
trusted library allocation
page read and write
1448000
heap
page read and write
1440000
heap
page read and write
A19000
unkown
page write copy
1458000
heap
page read and write
5D18000
trusted library allocation
page read and write
42AF000
stack
page read and write
5CCD000
trusted library allocation
page read and write
1459000
heap
page read and write
5D21000
trusted library allocation
page read and write
2E27000
heap
page read and write
4FE0000
remote allocation
page read and write
5F1C000
trusted library allocation
page read and write
C33000
unkown
page execute and read and write
1440000
heap
page read and write
11E4000
heap
page read and write
C47000
unkown
page execute and read and write
5381000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
1452000
heap
page read and write
1440000
heap
page read and write
1440000
heap
page read and write
11E4000
heap
page read and write
5C4A000
trusted library allocation
page read and write
C02000
unkown
page execute and write copy
1437000
heap
page read and write
13C9000
heap
page read and write
DD0000
heap
page read and write
5CC4000
trusted library allocation
page read and write
302F000
stack
page read and write
590D000
stack
page read and write
C57000
unkown
page execute and write copy
CBC000
unkown
page execute and write copy
1440000
heap
page read and write
5D31000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
442E000
stack
page read and write
5D11000
trusted library allocation
page read and write
2E20000
heap
page read and write
5C1C000
trusted library allocation
page read and write
1440000
heap
page read and write
5E4C000
trusted library allocation
page read and write
1437000
heap
page read and write
13C9000
heap
page read and write
316E000
stack
page read and write
5D1F000
trusted library allocation
page read and write
4B71000
heap
page read and write
BAA000
unkown
page execute and write copy
13C8000
heap
page read and write
406E000
stack
page read and write
5CC7000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
13A5000
heap
page read and write
5C41000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
13C9000
heap
page read and write
5D31000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
1398000
heap
page read and write
456E000
stack
page read and write
5C16000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
11E4000
heap
page read and write
41AD000
stack
page read and write
1440000
heap
page read and write
5D31000
trusted library allocation
page read and write
693B000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
402F000
stack
page read and write
13AE000
heap
page read and write
1440000
heap
page read and write
1445000
heap
page read and write
5C3E000
trusted library allocation
page read and write
5C9A000
trusted library allocation
page read and write
5BEF000
stack
page read and write
5C37000
trusted library allocation
page read and write
CD2000
unkown
page execute and read and write
143F000
heap
page read and write
5C86000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
2DFE000
stack
page read and write
4FE0000
remote allocation
page read and write
1440000
heap
page read and write
52FD000
stack
page read and write
5C27000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
1440000
heap
page read and write
5C34000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
11E4000
heap
page read and write
5150000
direct allocation
page execute and read and write
4B71000
heap
page read and write
5C15000
trusted library allocation
page read and write
1431000
heap
page read and write
5C3E000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
3C6F000
stack
page read and write
13C9000
heap
page read and write
1459000
heap
page read and write
5C50000
trusted library allocation
page read and write
1440000
heap
page read and write
5C26000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
1440000
heap
page read and write
5D21000
trusted library allocation
page read and write
144D000
heap
page read and write
5170000
direct allocation
page execute and read and write
143B000
heap
page read and write
2E00000
direct allocation
page read and write
5D31000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
1440000
heap
page read and write
5C26000
trusted library allocation
page read and write
1459000
heap
page read and write
5D21000
trusted library allocation
page read and write
C2E000
unkown
page execute and read and write
4B80000
heap
page read and write
1440000
heap
page read and write
CBD000
unkown
page execute and write copy
143A000
heap
page read and write
5C23000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
1437000
heap
page read and write
4B71000
heap
page read and write
5C3F000
trusted library allocation
page read and write
13CE000
heap
page read and write
1445000
heap
page read and write
5170000
direct allocation
page execute and read and write
1440000
heap
page read and write
5C77000
trusted library allocation
page read and write
B8E000
unkown
page execute and write copy
5D31000
trusted library allocation
page read and write
11E4000
heap
page read and write
5C4C000
trusted library allocation
page read and write
143E000
heap
page read and write
5D21000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
466F000
stack
page read and write
11E4000
heap
page read and write
5D21000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
4B71000
heap
page read and write
5F35000
trusted library allocation
page read and write
1440000
heap
page read and write
5C19000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
2E00000
direct allocation
page read and write
5C9A000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
51A0000
direct allocation
page execute and read and write
13CE000
heap
page read and write
1447000
heap
page read and write
5C19000
trusted library allocation
page read and write
145B000
heap
page read and write
144F000
heap
page read and write
2E00000
direct allocation
page read and write
13C9000
heap
page read and write
5D31000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
4FF0000
direct allocation
page read and write
5C16000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
1440000
heap
page read and write
1431000
heap
page read and write
11E4000
heap
page read and write
5FF5000
trusted library allocation
page read and write
5FE5000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
143B000
heap
page read and write
2DBB000
stack
page read and write
BD9000
unkown
page execute and read and write
5D31000
trusted library allocation
page read and write
416F000
stack
page read and write
517D000
stack
page read and write
9C0000
unkown
page readonly
1459000
heap
page read and write
5C90000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
11E4000
heap
page read and write
5D31000
trusted library allocation
page read and write
BD8000
unkown
page execute and write copy
5C3E000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
3B2F000
stack
page read and write
557E000
stack
page read and write
13C0000
heap
page read and write
11E4000
heap
page read and write
5C6B000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
11E4000
heap
page read and write
5CC5000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
CBC000
unkown
page execute and read and write
1429000
heap
page read and write
1440000
heap
page read and write
5C49000
trusted library allocation
page read and write
4B71000
heap
page read and write
A1B000
unkown
page execute and write copy
145E000
heap
page read and write
143D000
heap
page read and write
1437000
heap
page read and write
11E4000
heap
page read and write
2E2B000
heap
page read and write
5D21000
trusted library allocation
page read and write
C1B000
unkown
page execute and read and write
B8C000
unkown
page execute and read and write
366E000
stack
page read and write
C3A000
unkown
page execute and write copy
5CCD000
trusted library allocation
page read and write
1426000
heap
page read and write
5D20000
trusted library allocation
page read and write
37AE000
stack
page read and write
5D31000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
3F2E000
stack
page read and write
2F2F000
stack
page read and write
A27000
unkown
page execute and write copy
5FAA000
trusted library allocation
page read and write
There are 583 hidden memdumps, click here to show them.