IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\MMS43LFVAQOG1OXT3FFOALII.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MMS43LFVAQOG1OXT3FFOALII.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\MMS43LFVAQOG1OXT3FFOALII.exe
"C:\Users\user\AppData\Local\Temp\MMS43LFVAQOG1OXT3FFOALII.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.97.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/off/def.exeeh
unknown
https://necklacedmny.store/=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/E2
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://185.215.113.16/off/def.exee
unknown
https://necklacedmny.store:443/api
unknown
https://necklacedmny.store/X/ztlxfXsIh/
unknown
https://necklacedmny.store/apie6
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/api:
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://necklacedmny.store/apin3
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.stoF
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://go.mic
unknown
https://necklacedmny.store/apiG
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://necklacedmny.store/apib
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://necklacedmny.store/apis
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://necklacedmny.store/E
unknown
http://185.215.113.16/off/def.exe
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
B51000
unkown
page execute and read and write
malicious
3CDF000
stack
page read and write
45A0000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
2DFF000
stack
page read and write
551C000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
5422000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
545D000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
75E000
heap
page read and write
BAB000
unkown
page execute and read and write
5419000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
543D000
trusted library allocation
page read and write
1120000
heap
page read and write
807000
heap
page read and write
40CF000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
825000
heap
page read and write
4CD0000
direct allocation
page read and write
D9B000
unkown
page execute and read and write
58B4000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
AC8000
unkown
page execute and write copy
864000
heap
page read and write
5ABC000
trusted library allocation
page read and write
30BE000
stack
page read and write
A77000
unkown
page execute and read and write
834000
heap
page read and write
5430000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
DBB000
unkown
page execute and read and write
864000
heap
page read and write
59FF000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
844000
heap
page read and write
4490000
direct allocation
page read and write
548C000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
80A000
heap
page read and write
AEC000
unkown
page execute and write copy
485E000
stack
page read and write
58B6000
trusted library allocation
page read and write
864000
heap
page read and write
542A000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
516E000
stack
page read and write
141E000
stack
page read and write
5B41000
trusted library allocation
page read and write
DA6000
unkown
page execute and read and write
341F000
stack
page read and write
4DB4000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
8EA000
unkown
page execute and read and write
5964000
trusted library allocation
page read and write
54D7000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
5A5F000
trusted library allocation
page read and write
DA0000
unkown
page execute and read and write
AA7000
unkown
page execute and write copy
545D000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
44A1000
heap
page read and write
58BE000
trusted library allocation
page read and write
2CBF000
stack
page read and write
548E000
trusted library allocation
page read and write
11AF000
heap
page read and write
58B9000
trusted library allocation
page read and write
B8A000
unkown
page execute and write copy
3E3F000
stack
page read and write
58B8000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
10CE000
stack
page read and write
5422000
trusted library allocation
page read and write
837000
heap
page read and write
543A000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
B03000
unkown
page execute and read and write
4BFC000
stack
page read and write
435E000
stack
page read and write
5290000
heap
page read and write
58B0000
trusted library allocation
page read and write
864000
heap
page read and write
5473000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
5A25000
trusted library allocation
page read and write
438E000
stack
page read and write
1085000
heap
page read and write
5965000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
44A1000
heap
page read and write
5952000
trusted library allocation
page read and write
B66000
unkown
page execute and write copy
807000
heap
page read and write
544D000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
424E000
stack
page read and write
700000
heap
page read and write
59CE000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
3B9F000
stack
page read and write
5984000
trusted library allocation
page read and write
3E1F000
stack
page read and write
542D000
trusted library allocation
page read and write
864000
heap
page read and write
5477000
trusted library allocation
page read and write
BB7000
unkown
page execute and write copy
864000
heap
page read and write
5442000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
4DB7000
trusted library allocation
page read and write
2E9F000
stack
page read and write
543A000
trusted library allocation
page read and write
115F000
heap
page read and write
542A000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
112E000
heap
page read and write
5950000
trusted library allocation
page read and write
E44000
unkown
page execute and write copy
2A3F000
stack
page read and write
54B9000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
84B000
heap
page read and write
409F000
stack
page read and write
5AE6000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
837000
heap
page read and write
58B7000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
481F000
stack
page read and write
4E3D000
trusted library allocation
page execute and read and write
5415000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
5983000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
4FBF000
stack
page read and write
4CD0000
direct allocation
page read and write
723C000
stack
page read and write
542A000
trusted library allocation
page read and write
DC4000
unkown
page execute and write copy
5A10000
trusted library allocation
page read and write
D0E000
unkown
page execute and read and write
BAB000
unkown
page execute and write copy
420F000
stack
page read and write
84B000
heap
page read and write
54D8000
trusted library allocation
page read and write
8EA000
unkown
page execute and write copy
44A1000
heap
page read and write
5963000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
770E000
stack
page read and write
5494000
trusted library allocation
page read and write
74BE000
stack
page read and write
58B6000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
31DE000
stack
page read and write
7D3000
heap
page read and write
50FE000
stack
page read and write
B4C000
stack
page read and write
2D3E000
stack
page read and write
864000
heap
page read and write
36FE000
stack
page read and write
553E000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
54A5000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
B8A000
unkown
page execute and write copy
4490000
direct allocation
page read and write
ADD000
unkown
page execute and read and write
5443000
trusted library allocation
page read and write
5525000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
B12000
unkown
page execute and read and write
59B9000
trusted library allocation
page read and write
100E000
stack
page read and write
543C000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
3D3E000
stack
page read and write
2F3F000
stack
page read and write
58B6000
trusted library allocation
page read and write
331E000
stack
page read and write
544A000
trusted library allocation
page read and write
DCB000
unkown
page execute and write copy
309F000
stack
page read and write
832000
heap
page read and write
27FF000
stack
page read and write
5439000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
AB4000
unkown
page execute and read and write
5976000
trusted library allocation
page read and write
850000
heap
page read and write
5B48000
trusted library allocation
page read and write
864000
heap
page read and write
5440000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
515E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
545D000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
A76000
unkown
page execute and write copy
5442000
trusted library allocation
page read and write
8E0000
unkown
page readonly
46DF000
stack
page read and write
59E1000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
4A80000
direct allocation
page execute and read and write
58BC000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
4920000
remote allocation
page read and write
84B000
heap
page read and write
5440000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
837000
heap
page read and write
860000
heap
page read and write
54CC000
trusted library allocation
page read and write
293E000
stack
page read and write
DB7000
unkown
page execute and write copy
5519000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
44A1000
heap
page read and write
5983000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
843000
heap
page read and write
5417000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
D97000
unkown
page execute and write copy
54C0000
trusted library allocation
page read and write
459F000
stack
page read and write
545D000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
D9C000
unkown
page execute and write copy
393F000
stack
page read and write
5447000
trusted library allocation
page read and write
2CFE000
stack
page read and write
543A000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
546D000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
104D000
stack
page read and write
4CF0000
heap
page read and write
4CE0000
heap
page read and write
5995000
trusted library allocation
page read and write
4CE1000
heap
page read and write
5516000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
D28000
unkown
page execute and read and write
5A27000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
DC8000
unkown
page execute and read and write
864000
heap
page read and write
5459000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
54C5000
trusted library allocation
page read and write
7DA000
heap
page read and write
5435000
trusted library allocation
page read and write
357F000
stack
page read and write
837000
heap
page read and write
D7D000
unkown
page execute and read and write
58B7000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5956000
trusted library allocation
page read and write
44A0000
heap
page read and write
4A6F000
stack
page read and write
58B4000
trusted library allocation
page read and write
ADB000
unkown
page execute and write copy
541D000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
48E0000
heap
page read and write
B1B000
unkown
page execute and read and write
55C6000
trusted library allocation
page read and write
864000
heap
page read and write
44A1000
heap
page read and write
115D000
heap
page read and write
58BE000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
82E000
heap
page read and write
5442000
trusted library allocation
page read and write
3CFF000
stack
page read and write
11A9000
heap
page read and write
55EE000
trusted library allocation
page read and write
3E5E000
stack
page read and write
5435000
trusted library allocation
page read and write
3F9E000
stack
page read and write
544D000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
2A7E000
stack
page read and write
59FD000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
83C000
heap
page read and write
830000
heap
page read and write
5DFC000
trusted library allocation
page read and write
83C000
heap
page read and write
5429000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
B2E000
unkown
page execute and read and write
59E1000
trusted library allocation
page read and write
44A1000
heap
page read and write
857000
heap
page read and write
5493000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
B88000
unkown
page execute and read and write
4CB0000
heap
page read and write
541D000
trusted library allocation
page read and write
5556000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page execute and read and write
58BB000
trusted library allocation
page read and write
4CE1000
heap
page read and write
864000
heap
page read and write
827000
heap
page read and write
85D000
heap
page read and write
596E000
trusted library allocation
page read and write
80A000
heap
page read and write
32DF000
stack
page read and write
834000
heap
page read and write
5982000
trusted library allocation
page read and write
2CFE000
stack
page read and write
547B000
trusted library allocation
page read and write
97E000
stack
page read and write
4930000
direct allocation
page read and write
4FC0000
direct allocation
page execute and read and write
7B3000
heap
page read and write
58B5000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
82E000
heap
page read and write
5483000
trusted library allocation
page read and write
3BBE000
stack
page read and write
7D9000
heap
page read and write
36BF000
stack
page read and write
5493000
trusted library allocation
page read and write
827000
heap
page read and write
5A3F000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
4CE1000
heap
page read and write
395E000
stack
page read and write
59AC000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
333E000
stack
page read and write
434F000
stack
page read and write
543F000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
4CE1000
heap
page read and write
B0E000
unkown
page execute and read and write
58B2000
trusted library allocation
page read and write
AF4000
unkown
page execute and write copy
3F8F000
stack
page read and write
58BF000
trusted library allocation
page read and write
2F7E000
stack
page read and write
5411000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
3AB000
stack
page read and write
5412000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
2CBF000
stack
page read and write
59EC000
trusted library allocation
page read and write
4CE1000
heap
page read and write
541E000
trusted library allocation
page read and write
DED000
unkown
page execute and read and write
541E000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
826000
heap
page read and write
733D000
stack
page read and write
827000
heap
page read and write
545D000
trusted library allocation
page read and write
834000
heap
page read and write
58B3000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
4CE1000
heap
page read and write
59F9000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
DB6000
unkown
page execute and read and write
4CE1000
heap
page read and write
541F000
trusted library allocation
page read and write
7D9000
heap
page read and write
40DE000
stack
page read and write
5A7E000
trusted library allocation
page read and write
4DCB000
trusted library allocation
page read and write
28FF000
stack
page read and write
544D000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
4CE1000
heap
page read and write
837000
heap
page read and write
5425000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
DC9000
unkown
page execute and write copy
74FE000
stack
page read and write
54C0000
trusted library allocation
page read and write
526F000
stack
page read and write
543B000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
3E8E000
stack
page read and write
544D000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
E5B000
unkown
page execute and write copy
834000
heap
page read and write
110C000
stack
page read and write
595B000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
545E000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
864000
heap
page read and write
4490000
direct allocation
page read and write
B2D000
unkown
page execute and write copy
5446000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
BC0000
heap
page read and write
B01000
unkown
page execute and write copy
58B5000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
83E000
heap
page read and write
5CFA000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
E4B000
unkown
page execute and write copy
543A000
trusted library allocation
page read and write
844000
heap
page read and write
5AFC000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
59F4000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
541F000
trusted library allocation
page read and write
58BE000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
864000
heap
page read and write
4D3D000
stack
page read and write
44A1000
heap
page read and write
421E000
stack
page read and write
59EA000
trusted library allocation
page read and write
2B7F000
stack
page read and write
3FCE000
stack
page read and write
595D000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
B79000
unkown
page execute and write copy
8E6000
unkown
page write copy
AA9000
unkown
page execute and write copy
543D000
trusted library allocation
page read and write
5977000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
4CE1000
heap
page read and write
5493000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
760E000
stack
page read and write
5986000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
747F000
stack
page read and write
1167000
heap
page read and write
5A03000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
837000
heap
page read and write
5425000
trusted library allocation
page read and write
449E000
stack
page read and write
864000
heap
page read and write
58B4000
trusted library allocation
page read and write
DEC000
unkown
page execute and write copy
5953000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
59AF000
trusted library allocation
page read and write
4CE1000
heap
page read and write
5966000
trusted library allocation
page read and write
842000
heap
page read and write
5417000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
837000
heap
page read and write
542F000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
5495000
trusted library allocation
page read and write
4DD9000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
551F000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
ABC000
unkown
page execute and read and write
3BDE000
stack
page read and write
37DF000
stack
page read and write
471E000
stack
page read and write
B51000
unkown
page execute and write copy
543A000
trusted library allocation
page read and write
4D7E000
stack
page read and write
5988000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
4ABD000
stack
page read and write
864000
heap
page read and write
54C0000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
820000
heap
page read and write
4CD0000
direct allocation
page read and write
82F000
heap
page read and write
839000
heap
page read and write
83E000
heap
page read and write
59DA000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page execute and read and write
5451000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
359E000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
6185000
trusted library allocation
page read and write
59BE000
trusted library allocation
page read and write
381E000
stack
page read and write
54AC000
trusted library allocation
page read and write
864000
heap
page read and write
31BF000
stack
page read and write
864000
heap
page read and write
58B5000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
834000
heap
page read and write
4CD0000
direct allocation
page read and write
839000
heap
page read and write
89C000
stack
page read and write
5457000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
1080000
heap
page read and write
369F000
stack
page read and write
4CD0000
direct allocation
page read and write
3A9E000
stack
page read and write
410E000
stack
page read and write
541F000
trusted library allocation
page read and write
8E6000
unkown
page write copy
5B43000
trusted library allocation
page read and write
5513000
trusted library allocation
page read and write
B0B000
unkown
page execute and write copy
864000
heap
page read and write
B67000
unkown
page execute and read and write
5465000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
750000
heap
page read and write
B50000
unkown
page readonly
83F000
heap
page read and write
44B2000
heap
page read and write
4930000
direct allocation
page read and write
4CB4000
trusted library allocation
page read and write
E4B000
unkown
page execute and write copy
2D97000
heap
page read and write
59C7000
trusted library allocation
page read and write
5453000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
45DE000
stack
page read and write
59D8000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page execute and read and write
4CE1000
heap
page read and write
58BA000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
307F000
stack
page read and write
823000
heap
page read and write
2D7E000
stack
page read and write
E45000
unkown
page execute and write copy
A6E000
unkown
page execute and read and write
5441000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
AB0000
unkown
page execute and write copy
E34000
unkown
page execute and write copy
4EBE000
stack
page read and write
542F000
trusted library allocation
page read and write
6161000
trusted library allocation
page read and write
4FE0000
heap
page execute and read and write
5467000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
D3F000
unkown
page execute and write copy
35BE000
stack
page read and write
D34000
unkown
page execute and write copy
B88000
unkown
page execute and write copy
793000
heap
page read and write
4B02000
trusted library allocation
page read and write
837000
heap
page read and write
2BBE000
stack
page read and write
E18000
unkown
page execute and read and write
5435000
trusted library allocation
page read and write
E5A000
unkown
page execute and read and write
F5E000
stack
page read and write
D40000
unkown
page execute and read and write
58B2000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
ACB000
unkown
page execute and read and write
541A000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
DD6000
unkown
page execute and write copy
543D000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
131E000
stack
page read and write
4FF0000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
DA1000
unkown
page execute and write copy
AF6000
unkown
page execute and read and write
545C000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
864000
heap
page read and write
397E000
stack
page read and write
543A000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
864000
heap
page read and write
41DF000
stack
page read and write
5470000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
7500000
heap
page execute and read and write
5516000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
83E000
heap
page read and write
547B000
trusted library allocation
page read and write
8E2000
unkown
page execute and write copy
5988000
trusted library allocation
page read and write
B50000
unkown
page read and write
5468000
trusted library allocation
page read and write
4DC4000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
52DE000
stack
page read and write
44A1000
heap
page read and write
546B000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
542F000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
505E000
stack
page read and write
5425000
trusted library allocation
page read and write
827000
heap
page read and write
59E3000
trusted library allocation
page read and write
59CD000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
31FE000
stack
page read and write
2D80000
direct allocation
page read and write
834000
heap
page read and write
544A000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
431F000
stack
page read and write
5F24000
trusted library allocation
page read and write
737E000
stack
page read and write
59FC000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
4CD0000
direct allocation
page read and write
B79000
unkown
page execute and write copy
A50000
unkown
page execute and read and write
496C000
stack
page read and write
BB0000
heap
page read and write
545B000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
343F000
stack
page read and write
56B0000
trusted library allocation
page read and write
83C000
heap
page read and write
E44000
unkown
page execute and read and write
82E000
heap
page read and write
4CE1000
heap
page read and write
710000
heap
page read and write
5437000
trusted library allocation
page read and write
5010000
heap
page read and write
5955000
trusted library allocation
page read and write
82E000
heap
page read and write
4490000
direct allocation
page read and write
568E000
trusted library allocation
page read and write
598A000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
4920000
remote allocation
page read and write
5997000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
A6D000
unkown
page execute and write copy
495F000
stack
page read and write
5981000
trusted library allocation
page read and write
EF9000
stack
page read and write
5AAA000
trusted library allocation
page read and write
347E000
stack
page read and write
4920000
remote allocation
page read and write
4E44000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
4CE1000
heap
page read and write
B0E000
stack
page read and write
7B0000
heap
page read and write
543A000
trusted library allocation
page read and write
2F9F000
stack
page read and write
6164000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
79E000
heap
page read and write
542F000
trusted library allocation
page read and write
4E7F000
stack
page read and write
4490000
direct allocation
page read and write
5453000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
37FF000
stack
page read and write
543A000
trusted library allocation
page read and write
837000
heap
page read and write
544C000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
7DA000
heap
page read and write
B13000
unkown
page execute and write copy
5422000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
5A05000
trusted library allocation
page read and write
59CE000
trusted library allocation
page read and write
827000
heap
page read and write
5B6C000
trusted library allocation
page read and write
44A1000
heap
page read and write
5A41000
trusted library allocation
page read and write
448F000
stack
page read and write
864000
heap
page read and write
4FA7000
trusted library allocation
page execute and read and write
4CE1000
heap
page read and write
AA8000
unkown
page execute and read and write
5435000
trusted library allocation
page read and write
6FA000
stack
page read and write
5490000
trusted library allocation
page read and write
8E2000
unkown
page execute and read and write
4CD0000
direct allocation
page read and write
5B46000
trusted library allocation
page read and write
3D1E000
stack
page read and write
54D5000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
8F6000
unkown
page execute and write copy
319F000
stack
page read and write
59CD000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
2D90000
heap
page read and write
4F90000
direct allocation
page execute and read and write
D10000
unkown
page execute and write copy
D72000
unkown
page execute and write copy
AEB000
unkown
page execute and read and write
4E00000
heap
page read and write
544D000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
58B9000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
864000
heap
page read and write
117B000
heap
page read and write
3A7F000
stack
page read and write
3ABE000
stack
page read and write
5412000
trusted library allocation
page read and write
4490000
direct allocation
page read and write
E37000
unkown
page execute and write copy
5417000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
864000
heap
page read and write
AF3000
unkown
page execute and read and write
845000
heap
page read and write
5425000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
D34000
unkown
page execute and read and write
5481000
trusted library allocation
page read and write
5978000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
3E40000
heap
page read and write
864000
heap
page read and write
82E000
heap
page read and write
1060000
heap
page read and write
ABD000
stack
page read and write
4CE1000
heap
page read and write
5517000
trusted library allocation
page read and write
A52000
unkown
page execute and write copy
4FFD000
stack
page read and write
546B000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
807000
heap
page read and write
7DA000
heap
page read and write
565E000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
788000
heap
page read and write
355F000
stack
page read and write
59F7000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
59FF000
trusted library allocation
page read and write
827000
heap
page read and write
542F000
trusted library allocation
page read and write
4E34000
trusted library allocation
page read and write
541F000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
A6C000
unkown
page execute and read and write
58C0000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
A7E000
stack
page read and write
58B6000
trusted library allocation
page read and write
4E33000
trusted library allocation
page execute and read and write
5425000
trusted library allocation
page read and write
542E000
trusted library allocation
page read and write
AE8000
unkown
page execute and write copy
5440000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
4F8E000
stack
page read and write
59EF000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
3A5F000
stack
page read and write
53DF000
stack
page read and write
7D9000
heap
page read and write
864000
heap
page read and write
AB5000
unkown
page execute and write copy
58B6000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
112A000
heap
page read and write
DCA000
unkown
page execute and read and write
5426000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
808000
heap
page read and write
8E0000
unkown
page read and write
545D000
trusted library allocation
page read and write
B0F000
unkown
page execute and write copy
DCE000
unkown
page execute and read and write
5422000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
830000
heap
page read and write
58B8000
trusted library allocation
page read and write
3F5F000
stack
page read and write
E5A000
unkown
page execute and write copy
4A90000
direct allocation
page execute and read and write
834000
heap
page read and write
4C3D000
stack
page read and write
4490000
direct allocation
page read and write
5497000
trusted library allocation
page read and write
59D3000
trusted library allocation
page read and write
2E3E000
stack
page read and write
DD8000
unkown
page execute and read and write
545D000
trusted library allocation
page read and write
36DE000
stack
page read and write
445F000
stack
page read and write
5411000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
383E000
stack
page read and write
DB5000
unkown
page execute and write copy
544D000
trusted library allocation
page read and write
345E000
stack
page read and write
391F000
stack
page read and write
4490000
direct allocation
page read and write
7D9000
heap
page read and write
541A000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
55FE000
trusted library allocation
page read and write
844000
heap
page read and write
58C1000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
59F6000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
3BFE000
stack
page read and write
B72000
unkown
page execute and write copy
4E8C000
stack
page read and write
807000
heap
page read and write
4490000
direct allocation
page read and write
80A000
heap
page read and write
4930000
direct allocation
page read and write
58BD000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
5465000
trusted library allocation
page read and write
32FF000
stack
page read and write
5475000
trusted library allocation
page read and write
AAF000
unkown
page execute and read and write
5446000
trusted library allocation
page read and write
75A000
heap
page read and write
There are 966 hidden memdumps, click here to show them.