IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ZXCELRXK9FXBC48TJDYH4AM8OTM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZXCELRXK9FXBC48TJDYH4AM8OTM.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\ZXCELRXK9FXBC48TJDYH4AM8OTM.exe
"C:\Users\user\AppData\Local\Temp\ZXCELRXK9FXBC48TJDYH4AM8OTM.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://necklacedmny.store/apiO
unknown
malicious
https://necklacedmny.store/d
unknown
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
https://necklacedmny.store/l
unknown
malicious
https://necklacedmny.store/
unknown
malicious
https://necklacedmny.store/T
unknown
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.microsoft
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://185.215.113.16/off/def.exee
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
731000
unkown
page execute and read and write
malicious
530A000
trusted library allocation
page read and write
92B000
unkown
page execute and read and write
5212000
trusted library allocation
page read and write
941000
unkown
page execute and write copy
5258000
trusted library allocation
page read and write
1027000
unkown
page execute and write copy
5319000
trusted library allocation
page read and write
7940000
heap
page execute and read and write
4C0F000
stack
page read and write
1018000
unkown
page execute and read and write
4291000
heap
page read and write
5243000
trusted library allocation
page read and write
11F4000
heap
page read and write
52A0000
direct allocation
page read and write
5683000
trusted library allocation
page read and write
58CD000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
4291000
heap
page read and write
C39000
heap
page read and write
52E2000
trusted library allocation
page read and write
1C0000
heap
page read and write
568C000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
C46000
heap
page read and write
7C0E000
stack
page read and write
520F000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
67E4000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
52B1000
heap
page read and write
46BE000
stack
page read and write
4B97000
trusted library allocation
page read and write
78B000
unkown
page execute and read and write
363F000
stack
page read and write
52A0000
direct allocation
page read and write
C56000
heap
page read and write
F99000
unkown
page execute and write copy
C6B000
heap
page read and write
4870000
direct allocation
page execute and read and write
C58000
heap
page read and write
5301000
trusted library allocation
page read and write
185E000
stack
page read and write
C6E000
heap
page read and write
4880000
direct allocation
page execute and read and write
B70000
heap
page read and write
96C000
unkown
page execute and write copy
51FA000
trusted library allocation
page read and write
1672000
heap
page read and write
274E000
stack
page read and write
5686000
trusted library allocation
page read and write
973000
unkown
page execute and write copy
5228000
trusted library allocation
page read and write
50D0000
heap
page read and write
51E9000
trusted library allocation
page read and write
11F4000
heap
page read and write
5243000
trusted library allocation
page read and write
520D000
trusted library allocation
page read and write
5688000
trusted library allocation
page read and write
E32000
unkown
page execute and write copy
FEE000
unkown
page execute and read and write
575E000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
FF5000
unkown
page execute and write copy
520C000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
5217000
trusted library allocation
page read and write
C58000
heap
page read and write
51FF000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
4BBE000
stack
page read and write
5238000
trusted library allocation
page read and write
905000
unkown
page execute and write copy
5EFC000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
928000
unkown
page execute and read and write
6A0000
heap
page read and write
52A0000
direct allocation
page read and write
5785000
trusted library allocation
page read and write
548B000
trusted library allocation
page execute and read and write
5241000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
4291000
heap
page read and write
51E6000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
4291000
heap
page read and write
52AE000
trusted library allocation
page read and write
5241000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
310F000
stack
page read and write
48C0000
direct allocation
page execute and read and write
93C000
unkown
page execute and read and write
5246000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
E3A000
unkown
page execute and write copy
300E000
stack
page read and write
5783000
trusted library allocation
page read and write
4291000
heap
page read and write
1660000
heap
page read and write
1081000
unkown
page execute and read and write
2D8E000
stack
page read and write
576F000
trusted library allocation
page read and write
49CD000
stack
page read and write
54E9000
trusted library allocation
page read and write
5734000
trusted library allocation
page read and write
167D000
heap
page read and write
42A0000
heap
page read and write
52E1000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
5685000
trusted library allocation
page read and write
A32000
unkown
page execute and read and write
5205000
trusted library allocation
page read and write
51E5000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
4880000
direct allocation
page execute and read and write
5301000
trusted library allocation
page read and write
4DFF000
stack
page read and write
C58000
heap
page read and write
5687000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
1042000
unkown
page execute and write copy
374F000
stack
page read and write
568A000
trusted library allocation
page read and write
A1C000
unkown
page execute and read and write
5319000
trusted library allocation
page read and write
52C0000
heap
page read and write
4291000
heap
page read and write
1054000
unkown
page execute and write copy
5217000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
364E000
stack
page read and write
11F4000
heap
page read and write
42FE000
stack
page read and write
100F000
unkown
page execute and write copy
56D0000
heap
page read and write
2ECE000
stack
page read and write
C66000
heap
page read and write
919000
unkown
page execute and write copy
1041000
unkown
page execute and read and write
4291000
heap
page read and write
520C000
trusted library allocation
page read and write
4291000
heap
page read and write
5400000
direct allocation
page read and write
670000
direct allocation
page read and write
5301000
trusted library allocation
page read and write
3C4F000
stack
page read and write
5200000
trusted library allocation
page read and write
15B000
stack
page read and write
52E1000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
E32000
unkown
page execute and read and write
576E000
trusted library allocation
page read and write
105B000
unkown
page execute and read and write
BB1000
heap
page read and write
585F000
trusted library allocation
page read and write
A33000
unkown
page execute and write copy
51E9000
trusted library allocation
page read and write
C49000
heap
page read and write
5301000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
11F4000
heap
page read and write
4291000
heap
page read and write
324F000
stack
page read and write
987000
unkown
page execute and write copy
51EF000
trusted library allocation
page read and write
5787000
trusted library allocation
page read and write
3F3E000
stack
page read and write
57E1000
trusted library allocation
page read and write
680000
heap
page read and write
162A000
heap
page read and write
3B0E000
stack
page read and write
5685000
trusted library allocation
page read and write
51F3000
trusted library allocation
page read and write
5258000
trusted library allocation
page read and write
BEB000
heap
page read and write
4B90000
trusted library allocation
page read and write
328E000
stack
page read and write
5756000
trusted library allocation
page read and write
A0F000
unkown
page execute and write copy
5454000
trusted library allocation
page read and write
1044000
unkown
page execute and read and write
993000
unkown
page execute and write copy
4CFE000
stack
page read and write
52BA000
trusted library allocation
page read and write
55C7000
trusted library allocation
page read and write
C45000
heap
page read and write
522A000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
C45000
heap
page read and write
10C9000
unkown
page execute and write copy
568E000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
1039000
unkown
page execute and write copy
51FE000
trusted library allocation
page read and write
11F4000
heap
page read and write
5317000
trusted library allocation
page read and write
520B000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
51F2000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
195F000
stack
page read and write
5301000
trusted library allocation
page read and write
360F000
stack
page read and write
29CE000
stack
page read and write
484F000
stack
page read and write
51F0000
trusted library allocation
page read and write
52B0000
heap
page read and write
55B7000
trusted library allocation
page read and write
4880000
direct allocation
page execute and read and write
5311000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
9B4000
unkown
page execute and read and write
5760000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
48FF000
stack
page read and write
530F000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
4291000
heap
page read and write
E30000
unkown
page readonly
52BD000
trusted library allocation
page read and write
543C000
stack
page read and write
4B84000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
51E9000
trusted library allocation
page read and write
550E000
stack
page read and write
972000
unkown
page execute and read and write
428F000
stack
page read and write
162E000
heap
page read and write
5687000
trusted library allocation
page read and write
730000
unkown
page readonly
925000
unkown
page execute and write copy
D6F000
stack
page read and write
B7A000
heap
page read and write
41BE000
stack
page read and write
4290000
heap
page read and write
52C7000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
978000
unkown
page execute and write copy
51DF000
stack
page read and write
52A9000
trusted library allocation
page read and write
524F000
trusted library allocation
page read and write
C45000
heap
page read and write
52A0000
direct allocation
page read and write
52E7000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
470E000
stack
page read and write
313E000
stack
page read and write
670000
direct allocation
page read and write
942000
unkown
page execute and read and write
4890000
direct allocation
page execute and read and write
51E1000
trusted library allocation
page read and write
493E000
stack
page read and write
4291000
heap
page read and write
670000
direct allocation
page read and write
C54000
heap
page read and write
568C000
trusted library allocation
page read and write
5453000
trusted library allocation
page execute and read and write
52F2000
trusted library allocation
page read and write
C45000
heap
page read and write
4291000
heap
page read and write
323F000
stack
page read and write
572A000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
72B000
stack
page read and write
525D000
trusted library allocation
page read and write
C53000
heap
page read and write
589D000
trusted library allocation
page read and write
4860000
direct allocation
page execute and read and write
551F000
trusted library allocation
page read and write
48D7000
trusted library allocation
page read and write
9AA000
unkown
page execute and read and write
568C000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
11F4000
heap
page read and write
C46000
heap
page read and write
5301000
trusted library allocation
page read and write
2C0F000
stack
page read and write
687000
heap
page read and write
5785000
trusted library allocation
page read and write
52A8000
trusted library allocation
page read and write
5234000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
60E000
stack
page read and write
4A3F000
stack
page read and write
5216000
trusted library allocation
page read and write
C60000
heap
page read and write
5214000
trusted library allocation
page read and write
114C000
stack
page read and write
5688000
trusted library allocation
page read and write
5739000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
51FA000
trusted library allocation
page read and write
1B0000
heap
page read and write
521E000
trusted library allocation
page read and write
160E000
stack
page read and write
33CE000
stack
page read and write
5753000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
A32000
unkown
page execute and write copy
8F3000
unkown
page execute and write copy
4291000
heap
page read and write
57AA000
trusted library allocation
page read and write
11F4000
heap
page read and write
4A7E000
stack
page read and write
5212000
trusted library allocation
page read and write
68D000
heap
page read and write
388F000
stack
page read and write
52E0000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
43FF000
stack
page read and write
42BF000
stack
page read and write
5685000
trusted library allocation
page read and write
4291000
heap
page read and write
270F000
stack
page read and write
5301000
trusted library allocation
page read and write
F97000
unkown
page execute and read and write
52BD000
trusted library allocation
page read and write
54EA000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
51E5000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
52B1000
heap
page read and write
11F4000
heap
page read and write
52A0000
direct allocation
page read and write
57B0000
trusted library allocation
page read and write
11F4000
heap
page read and write
11F4000
heap
page read and write
52B1000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
1620000
heap
page read and write
B3F000
stack
page read and write
6EE000
stack
page read and write
57CB000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
5217000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
5241000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
5507000
trusted library allocation
page read and write
4B81000
trusted library allocation
page read and write
A0C000
unkown
page execute and write copy
589B000
trusted library allocation
page read and write
1017000
unkown
page execute and write copy
5680000
trusted library allocation
page read and write
C4E000
heap
page read and write
8F0000
unkown
page execute and read and write
4D60000
remote allocation
page read and write
5881000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
5243000
trusted library allocation
page read and write
4B7F000
stack
page read and write
C6D000
heap
page read and write
51FF000
trusted library allocation
page read and write
5744000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
52B1000
heap
page read and write
4EBE000
stack
page read and write
501F000
stack
page read and write
731000
unkown
page execute and write copy
5682000
trusted library allocation
page read and write
101A000
unkown
page execute and read and write
C56000
heap
page read and write
38FE000
stack
page read and write
11F4000
heap
page read and write
5681000
trusted library allocation
page read and write
5688000
trusted library allocation
page read and write
798E000
stack
page read and write
5206000
trusted library allocation
page read and write
99D000
unkown
page execute and write copy
C4E000
heap
page read and write
5747000
trusted library allocation
page read and write
353E000
stack
page read and write
C6B000
heap
page read and write
572B000
trusted library allocation
page read and write
1064000
unkown
page execute and read and write
568A000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
558F000
trusted library allocation
page read and write
378E000
stack
page read and write
38CE000
stack
page read and write
507E000
stack
page read and write
3DFE000
stack
page read and write
5797000
trusted library allocation
page read and write
67E1000
trusted library allocation
page read and write
C6C000
heap
page read and write
4D4E000
stack
page read and write
52A9000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
51FA000
trusted library allocation
page read and write
797000
unkown
page execute and write copy
52BC000
trusted library allocation
page read and write
C46000
heap
page read and write
5760000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
E36000
unkown
page write copy
E30000
unkown
page read and write
5220000
trusted library allocation
page read and write
4FA000
stack
page read and write
52F0000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
996000
unkown
page execute and read and write
5217000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
1002000
unkown
page execute and read and write
BD1000
heap
page read and write
90F000
unkown
page execute and read and write
11F4000
heap
page read and write
BF0000
heap
page read and write
5745000
trusted library allocation
page read and write
14F9000
stack
page read and write
C4B000
heap
page read and write
1053000
unkown
page execute and read and write
4D60000
remote allocation
page read and write
55BF000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
5244000
trusted library allocation
page read and write
E36000
unkown
page write copy
5808000
trusted library allocation
page read and write
C46000
heap
page read and write
C66000
heap
page read and write
FB9000
unkown
page execute and write copy
5307000
trusted library allocation
page read and write
53B0000
heap
page read and write
4DBD000
stack
page read and write
51EF000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
C62000
heap
page read and write
52A0000
direct allocation
page read and write
57B4000
trusted library allocation
page read and write
1026000
unkown
page execute and read and write
576D000
trusted library allocation
page read and write
58AB000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
B40000
heap
page read and write
51EF000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
3CBE000
stack
page read and write
51FF000
trusted library allocation
page read and write
4880000
direct allocation
page execute and read and write
16AC000
heap
page read and write
377F000
stack
page read and write
3D8F000
stack
page read and write
5684000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
670000
direct allocation
page read and write
C4B000
heap
page read and write
568C000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
7A8E000
stack
page read and write
C6D000
heap
page read and write
2D4F000
stack
page read and write
5221000
trusted library allocation
page read and write
5204000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
52B1000
heap
page read and write
5657000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
52BA000
trusted library allocation
page read and write
38BF000
stack
page read and write
3F0E000
stack
page read and write
51FA000
trusted library allocation
page read and write
5227000
trusted library allocation
page read and write
670000
direct allocation
page read and write
5280000
direct allocation
page read and write
7BCE000
stack
page read and write
51E9000
trusted library allocation
page read and write
568B000
trusted library allocation
page read and write
523C000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
568B000
trusted library allocation
page read and write
57DE000
stack
page read and write
5685000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
51ED000
trusted library allocation
page read and write
4E3E000
stack
page read and write
A1D000
unkown
page execute and write copy
51E9000
trusted library allocation
page read and write
4291000
heap
page read and write
568A000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
32C0000
heap
page read and write
47FE000
stack
page read and write
5470000
trusted library allocation
page read and write
3A0E000
stack
page read and write
9A8000
unkown
page execute and write copy
5ABE000
trusted library allocation
page read and write
5487000
trusted library allocation
page execute and read and write
B7E000
heap
page read and write
5689000
trusted library allocation
page read and write
11F0000
heap
page read and write
B60000
direct allocation
page read and write
4A84000
trusted library allocation
page read and write
3ECF000
stack
page read and write
5880000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
57CC000
trusted library allocation
page read and write
5732000
trusted library allocation
page read and write
418E000
stack
page read and write
5223000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
578A000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
FED000
unkown
page execute and write copy
467F000
stack
page read and write
5689000
trusted library allocation
page read and write
474B000
stack
page read and write
5688000
trusted library allocation
page read and write
FD7000
unkown
page execute and read and write
568C000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
94A000
unkown
page execute and write copy
4CBF000
stack
page read and write
547A000
trusted library allocation
page execute and read and write
FD6000
unkown
page execute and write copy
4BA6000
trusted library allocation
page read and write
5400000
direct allocation
page read and write
5686000
trusted library allocation
page read and write
4B0E000
stack
page read and write
57BD000
trusted library allocation
page read and write
34CF000
stack
page read and write
57AF000
trusted library allocation
page read and write
670000
direct allocation
page read and write
C65000
heap
page read and write
9AB000
unkown
page execute and write copy
5745000
trusted library allocation
page read and write
C3C000
heap
page read and write
414F000
stack
page read and write
165E000
heap
page read and write
957000
unkown
page execute and write copy
7ACE000
stack
page read and write
5683000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
670000
direct allocation
page read and write
52A8000
trusted library allocation
page read and write
5917000
trusted library allocation
page read and write
1062000
unkown
page execute and write copy
526F000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
57CE000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5248000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
5793000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
64E000
stack
page read and write
5722000
trusted library allocation
page read and write
557D000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
587F000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
C4E000
heap
page read and write
11F4000
heap
page read and write
C6D000
heap
page read and write
670000
direct allocation
page read and write
39CF000
stack
page read and write
91A000
unkown
page execute and read and write
577F000
trusted library allocation
page read and write
6805000
trusted library allocation
page read and write
417F000
stack
page read and write
C57000
heap
page read and write
5228000
trusted library allocation
page read and write
51FB000
trusted library allocation
page read and write
956000
unkown
page execute and read and write
C4D000
heap
page read and write
51E6000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
284F000
stack
page read and write
5795000
trusted library allocation
page read and write
11A0000
heap
page read and write
5211000
trusted library allocation
page read and write
522C000
trusted library allocation
page read and write
958000
unkown
page execute and read and write
5208000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
908000
unkown
page execute and read and write
39FF000
stack
page read and write
52A0000
direct allocation
page read and write
54EC000
trusted library allocation
page read and write
4C4E000
stack
page read and write
52E1000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
522C000
trusted library allocation
page read and write
5232000
trusted library allocation
page read and write
1080000
unkown
page execute and write copy
52AE000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
5688000
trusted library allocation
page read and write
660000
heap
page read and write
51FF000
trusted library allocation
page read and write
52A8000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
C35000
heap
page read and write
10E0000
unkown
page execute and write copy
52B1000
heap
page read and write
C46000
heap
page read and write
5754000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
4F3F000
stack
page read and write
4880000
direct allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
C49000
heap
page read and write
51FA000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
32BE000
stack
page read and write
4D60000
remote allocation
page read and write
FAC000
unkown
page execute and read and write
400F000
stack
page read and write
5743000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
57AA000
trusted library allocation
page read and write
3DBF000
stack
page read and write
11F4000
heap
page read and write
568E000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
E3A000
unkown
page execute and read and write
314E000
stack
page read and write
904000
unkown
page execute and read and write
51E6000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
10DE000
unkown
page execute and read and write
51F0000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
407E000
stack
page read and write
52AE000
trusted library allocation
page read and write
51E4000
trusted library allocation
page read and write
C56000
heap
page read and write
5690000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
1065000
unkown
page execute and write copy
52BF000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
C6B000
heap
page read and write
568D000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
670000
direct allocation
page read and write
102E000
unkown
page execute and read and write
33FF000
stack
page read and write
52A9000
trusted library allocation
page read and write
C66000
heap
page read and write
106D000
unkown
page execute and read and write
5765000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
5203000
trusted library allocation
page read and write
A22000
unkown
page execute and write copy
5682000
trusted library allocation
page read and write
5683000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
531A000
trusted library allocation
page read and write
51E9000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
10E0000
unkown
page execute and write copy
57B2000
trusted library allocation
page read and write
32F7000
heap
page read and write
578C000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
E46000
unkown
page execute and write copy
57AD000
trusted library allocation
page read and write
48B0000
direct allocation
page execute and read and write
3A3E000
stack
page read and write
C6C000
heap
page read and write
9ED000
unkown
page execute and read and write
5217000
trusted library allocation
page read and write
5296000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
7D0E000
stack
page read and write
BBE000
heap
page read and write
59EA000
trusted library allocation
page read and write
443E000
stack
page read and write
52FA000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
5243000
trusted library allocation
page read and write
288E000
stack
page read and write
1016000
unkown
page execute and read and write
298F000
stack
page read and write
5690000
trusted library allocation
page read and write
FD3000
unkown
page execute and write copy
5301000
trusted library allocation
page read and write
47BF000
stack
page read and write
568A000
trusted library allocation
page read and write
52B1000
heap
page read and write
57DE000
trusted library allocation
page read and write
568B000
trusted library allocation
page read and write
A22000
unkown
page execute and write copy
52F0000
trusted library allocation
page read and write
2FCF000
stack
page read and write
670000
direct allocation
page read and write
5464000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
791D000
stack
page read and write
520F000
trusted library allocation
page read and write
11B0000
heap
page read and write
670000
direct allocation
page read and write
593B000
trusted library allocation
page read and write
C6C000
heap
page read and write
367E000
stack
page read and write
48A0000
direct allocation
page execute and read and write
FD4000
unkown
page execute and read and write
5BD5000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
51F7000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
670000
direct allocation
page read and write
C6E000
heap
page read and write
C46000
heap
page read and write
A1B000
unkown
page execute and write copy
51E9000
trusted library allocation
page read and write
5223000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
11F4000
heap
page read and write
4291000
heap
page read and write
78B000
unkown
page execute and write copy
992000
unkown
page execute and read and write
568E000
trusted library allocation
page read and write
4880000
direct allocation
page execute and read and write
51E9000
trusted library allocation
page read and write
5208000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
5234000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
986000
unkown
page execute and read and write
521A000
trusted library allocation
page read and write
5223000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
985000
unkown
page execute and write copy
34FF000
stack
page read and write
51E9000
trusted library allocation
page read and write
C46000
heap
page read and write
54EE000
trusted library allocation
page read and write
C6D000
heap
page read and write
577A000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
670000
direct allocation
page read and write
453F000
stack
page read and write
51FA000
trusted library allocation
page read and write
1019000
unkown
page execute and write copy
FB9000
unkown
page execute and read and write
BB5000
heap
page read and write
3B4E000
stack
page read and write
5682000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
52F9000
trusted library allocation
page read and write
5683000
trusted library allocation
page read and write
52A0000
direct allocation
page read and write
57B2000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
4F1E000
stack
page read and write
5687000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
5248000
trusted library allocation
page read and write
C53000
heap
page read and write
5301000
trusted library allocation
page read and write
5248000
trusted library allocation
page read and write
C5C000
heap
page read and write
5226000
trusted library allocation
page read and write
C46000
heap
page read and write
52BC000
trusted library allocation
page read and write
4291000
heap
page read and write
5687000
trusted library allocation
page read and write
2C4E000
stack
page read and write
C52000
heap
page read and write
5243000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
10D0000
unkown
page execute and write copy
5689000
trusted library allocation
page read and write
1668000
heap
page read and write
51E6000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
57CD000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
C49000
heap
page read and write
54A0000
trusted library allocation
page read and write
9A1000
unkown
page execute and read and write
3C8E000
stack
page read and write
3B3F000
stack
page read and write
C45000
heap
page read and write
57B7000
trusted library allocation
page read and write
562E000
stack
page read and write
C46000
heap
page read and write
5919000
trusted library allocation
page read and write
520C000
trusted library allocation
page read and write
457E000
stack
page read and write
52A0000
direct allocation
page read and write
5262000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
2E8F000
stack
page read and write
51E9000
trusted library allocation
page read and write
51F4000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
BA8000
heap
page read and write
781C000
stack
page read and write
6A5000
heap
page read and write
57C6000
trusted library allocation
page read and write
545D000
trusted library allocation
page execute and read and write
98A000
unkown
page execute and read and write
51E1000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
5683000
trusted library allocation
page read and write
10DE000
unkown
page execute and write copy
568A000
trusted library allocation
page read and write
4ACD000
stack
page read and write
979000
unkown
page execute and read and write
4291000
heap
page read and write
929000
unkown
page execute and write copy
57ED000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
730000
unkown
page read and write
568C000
trusted library allocation
page read and write
11F4000
heap
page read and write
54EA000
trusted library allocation
page read and write
C53000
heap
page read and write
5742000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
52B8000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
3EFF000
stack
page read and write
260F000
stack
page read and write
93B000
unkown
page execute and write copy
568C000
trusted library allocation
page read and write
5236000
trusted library allocation
page read and write
1025000
unkown
page execute and write copy
52AD000
trusted library allocation
page read and write
991000
unkown
page execute and write copy
5688000
trusted library allocation
page read and write
977000
unkown
page execute and read and write
488E000
stack
page read and write
C45000
heap
page read and write
54E1000
trusted library allocation
page read and write
C62000
heap
page read and write
C36000
heap
page read and write
5210000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
11F4000
heap
page read and write
51FF000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
2B0E000
stack
page read and write
5687000
trusted library allocation
page read and write
C3C000
heap
page read and write
3B7E000
stack
page read and write
32F0000
heap
page read and write
5301000
trusted library allocation
page read and write
11F4000
heap
page read and write
404E000
stack
page read and write
BAE000
heap
page read and write
403F000
stack
page read and write
5450000
direct allocation
page execute and read and write
51F4000
trusted library allocation
page read and write
670000
direct allocation
page read and write
58A9000
trusted library allocation
page read and write
3DCE000
stack
page read and write
54C0000
heap
page execute and read and write
327B000
stack
page read and write
5520000
heap
page read and write
57EF000
trusted library allocation
page read and write
5234000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
4291000
heap
page read and write
52ED000
trusted library allocation
page read and write
51F4000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
2ACF000
stack
page read and write
5795000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
1052000
unkown
page execute and write copy
58EA000
trusted library allocation
page read and write
C66000
heap
page read and write
5301000
trusted library allocation
page read and write
3C7F000
stack
page read and write
37BE000
stack
page read and write
B60000
direct allocation
page read and write
52AF000
trusted library allocation
page read and write
10D0000
unkown
page execute and write copy
C43000
heap
page read and write
4850000
direct allocation
page execute and read and write
57C5000
trusted library allocation
page read and write
C65000
heap
page read and write
90F000
unkown
page execute and write copy
181F000
stack
page read and write
5724000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
350E000
stack
page read and write
A1B000
unkown
page execute and write copy
5841000
trusted library allocation
page read and write
57CC000
trusted library allocation
page read and write
338F000
stack
page read and write
C6D000
heap
page read and write
52AC000
trusted library allocation
page read and write
5683000
trusted library allocation
page read and write
C53000
heap
page read and write
5763000
trusted library allocation
page read and write
5400000
direct allocation
page read and write
C4E000
heap
page read and write
5781000
trusted library allocation
page read and write
There are 956 hidden memdumps, click here to show them.