IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe
"C:\Users\user\AppData\Local\Temp\HTUSFB9YFV610YTCBWQ47HFA41LN0.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/x
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.16/off/def.exeX
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://necklacedmny.store:443/apix
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://necklacedmny.store/r
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://necklacedmny.store/X
unknown
https://necklacedmny.store/
unknown
https://necklacedmny.store/apiG4
unknown
http://185.215.113.16/fg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/apiI4
unknown
http://185.215.113.16/Pg
unknown
http://185.215.113.16//
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://necklacedmny.store/R
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
http://185.215.113.16/off/def.exee
unknown
https://necklacedmny.store:443/api
unknown
http://185.215.113.16/off/def.exeik1
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
2D1000
unkown
page execute and read and write
malicious
5621000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
C11000
heap
page read and write
53C000
unkown
page execute and read and write
C11000
heap
page read and write
12DB000
stack
page read and write
545B000
trusted library allocation
page read and write
5C3000
unkown
page execute and write copy
5432000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
4E91000
heap
page read and write
2F9E000
stack
page read and write
96A000
stack
page read and write
4F6F000
stack
page read and write
5044000
trusted library allocation
page read and write
48CF000
stack
page read and write
5806000
trusted library allocation
page read and write
1294000
heap
page read and write
F55000
unkown
page execute and read and write
5466000
trusted library allocation
page read and write
FCA000
unkown
page execute and read and write
5422000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
275F000
stack
page read and write
4F5000
unkown
page execute and read and write
5437000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
251E000
stack
page read and write
478F000
stack
page read and write
541B000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
420E000
stack
page read and write
3D0E000
stack
page read and write
138E000
heap
page read and write
5A42000
trusted library allocation
page read and write
5A52000
trusted library allocation
page read and write
1294000
heap
page read and write
5ABC000
trusted library allocation
page read and write
520000
unkown
page execute and read and write
C19000
heap
page read and write
5432000
trusted library allocation
page read and write
335000
unkown
page execute and write copy
B77000
heap
page read and write
1294000
heap
page read and write
2FF0000
direct allocation
page read and write
42CE000
stack
page read and write
5030000
direct allocation
page execute and read and write
59A9000
trusted library allocation
page read and write
468E000
stack
page read and write
540B000
trusted library allocation
page read and write
4BAD000
stack
page read and write
C19000
heap
page read and write
5802000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
C33000
heap
page read and write
C1A000
heap
page read and write
1294000
heap
page read and write
C12000
heap
page read and write
59AE000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
2800000
heap
page read and write
541F000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
4451000
heap
page read and write
48A000
unkown
page execute and read and write
5452000
trusted library allocation
page read and write
F19000
unkown
page execute and read and write
167E000
stack
page read and write
5A79000
trusted library allocation
page read and write
336000
unkown
page execute and read and write
59AB000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
59A5000
trusted library allocation
page read and write
565000
unkown
page execute and read and write
59AB000
trusted library allocation
page read and write
C12000
heap
page read and write
9B4000
heap
page read and write
5A6E000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
C14000
heap
page read and write
4FAD000
stack
page read and write
518000
unkown
page execute and write copy
48D0000
remote allocation
page read and write
360F000
stack
page read and write
59A6000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
C33000
heap
page read and write
5601000
trusted library allocation
page read and write
2807000
heap
page read and write
5649000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
C1C000
heap
page read and write
5431000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
C1F000
heap
page read and write
5A62000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
D30000
unkown
page read and write
D30000
unkown
page readonly
59AC000
trusted library allocation
page read and write
C1E000
heap
page read and write
5462000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
7580000
heap
page execute and read and write
5A91000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
5050000
heap
page read and write
43CF000
stack
page read and write
4A80000
direct allocation
page execute and read and write
59A6000
trusted library allocation
page read and write
B40000
heap
page read and write
540E000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
279C000
stack
page read and write
5AC000
unkown
page execute and write copy
5AAA000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
2E0E000
stack
page read and write
5A89000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
F5D000
unkown
page execute and read and write
5A8B000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
750D000
stack
page read and write
F18000
unkown
page execute and write copy
544A000
trusted library allocation
page read and write
9B4000
heap
page read and write
5453000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
C2E000
heap
page read and write
5449000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
541F000
trusted library allocation
page read and write
780E000
stack
page read and write
9B4000
heap
page read and write
C0D000
heap
page read and write
3F8E000
stack
page read and write
450F000
stack
page read and write
5621000
trusted library allocation
page read and write
4D86000
trusted library allocation
page read and write
4451000
heap
page read and write
59A5000
trusted library allocation
page read and write
38CE000
stack
page read and write
394E000
stack
page read and write
5621000
trusted library allocation
page read and write
13DE000
heap
page read and write
5177000
trusted library allocation
page execute and read and write
5411000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
59A9000
trusted library allocation
page read and write
2D0000
unkown
page read and write
5432000
trusted library allocation
page read and write
9B4000
heap
page read and write
59A9000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
2FF0000
direct allocation
page read and write
4E6E000
stack
page read and write
27DE000
stack
page read and write
59AA000
trusted library allocation
page read and write
354F000
stack
page read and write
2FF0000
direct allocation
page read and write
47CE000
stack
page read and write
4D71000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
337000
unkown
page execute and write copy
13C8000
heap
page read and write
5A44000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
135E000
stack
page read and write
C2A000
heap
page read and write
5800000
trusted library allocation
page read and write
F2E000
unkown
page execute and write copy
F09000
unkown
page execute and read and write
584000
unkown
page execute and read and write
5433000
trusted library allocation
page read and write
4C6000
unkown
page execute and write copy
5431000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
37CF000
stack
page read and write
157F000
stack
page read and write
5C00000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
48C000
unkown
page execute and write copy
5639000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
9B4000
heap
page read and write
D46000
unkown
page execute and write copy
9B4000
heap
page read and write
9B4000
heap
page read and write
5610000
trusted library allocation
page read and write
D3A000
unkown
page execute and write copy
5431000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
400F000
stack
page read and write
C2E000
heap
page read and write
5621000
trusted library allocation
page read and write
59AC000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
5A64000
trusted library allocation
page read and write
5D3000
unkown
page execute and write copy
4AA0000
direct allocation
page execute and read and write
D3F000
stack
page read and write
51B000
unkown
page execute and read and write
526000
unkown
page execute and read and write
52F000
unkown
page execute and write copy
9B0000
heap
page read and write
768E000
stack
page read and write
27F0000
direct allocation
page read and write
5B3B000
trusted library allocation
page read and write
9B4000
heap
page read and write
C1B000
heap
page read and write
5405000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
6355000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
5627000
trusted library allocation
page read and write
C33000
heap
page read and write
4E2F000
stack
page read and write
27F0000
direct allocation
page read and write
4A60000
direct allocation
page execute and read and write
F82000
unkown
page execute and read and write
511E000
stack
page read and write
2FF0000
direct allocation
page read and write
527E000
stack
page read and write
59A1000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
330E000
stack
page read and write
C12000
heap
page read and write
5601000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
541F000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
2A0F000
stack
page read and write
4451000
heap
page read and write
D36000
unkown
page write copy
3D8F000
stack
page read and write
5A6C000
trusted library allocation
page read and write
C32000
heap
page read and write
131E000
stack
page read and write
5610000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
F67000
unkown
page execute and read and write
5431000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
48E0000
direct allocation
page read and write
59AC000
trusted library allocation
page read and write
C5C000
stack
page read and write
358E000
stack
page read and write
5ACE000
trusted library allocation
page read and write
5B34000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
58F000
unkown
page execute and read and write
5C18000
trusted library allocation
page read and write
414F000
stack
page read and write
5AE0000
trusted library allocation
page read and write
C30000
heap
page read and write
5A77000
trusted library allocation
page read and write
9B4000
heap
page read and write
388F000
stack
page read and write
3A4F000
stack
page read and write
5406000
trusted library allocation
page read and write
13E2000
heap
page read and write
9B4000
heap
page read and write
D3A000
unkown
page execute and read and write
3A8E000
stack
page read and write
5AE2000
trusted library allocation
page read and write
9B4000
heap
page read and write
374F000
stack
page read and write
5AE3000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
4E3000
unkown
page execute and write copy
FE0000
unkown
page execute and write copy
59A5000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
138A000
heap
page read and write
F31000
unkown
page execute and read and write
39CF000
stack
page read and write
32CF000
stack
page read and write
C2A000
heap
page read and write
3007000
heap
page read and write
543D000
trusted library allocation
page read and write
FC9000
unkown
page execute and write copy
5A94000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
4460000
heap
page read and write
27E0000
heap
page read and write
5AE1000
trusted library allocation
page read and write
54D000
unkown
page execute and write copy
C31000
heap
page read and write
540A000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
4E91000
heap
page read and write
4E90000
heap
page read and write
59A4000
trusted library allocation
page read and write
280D000
heap
page read and write
511000
unkown
page execute and write copy
5AA8000
trusted library allocation
page read and write
59AC000
trusted library allocation
page read and write
440E000
stack
page read and write
5C60000
trusted library allocation
page read and write
1294000
heap
page read and write
5414000
trusted library allocation
page read and write
9B4000
heap
page read and write
512000
unkown
page execute and read and write
1294000
heap
page read and write
2FF0000
direct allocation
page read and write
C19000
heap
page read and write
2FF0000
direct allocation
page read and write
5432000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
5A99000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
59A9000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
59AC000
trusted library allocation
page read and write
3C4F000
stack
page read and write
9B4000
heap
page read and write
59A9000
trusted library allocation
page read and write
CD0000
heap
page read and write
5AD9000
trusted library allocation
page read and write
9B4000
heap
page read and write
5AB9000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
48D0000
remote allocation
page read and write
C1A000
heap
page read and write
5600000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
BB7000
heap
page read and write
567000
unkown
page execute and read and write
C14000
heap
page read and write
41CF000
stack
page read and write
2F1F000
stack
page read and write
C19000
heap
page read and write
9B4000
heap
page read and write
C14000
heap
page read and write
541D000
trusted library allocation
page read and write
13BE000
heap
page read and write
B8E000
heap
page read and write
FD3000
unkown
page execute and write copy
2F0F000
stack
page read and write
4A60000
direct allocation
page execute and read and write
C07000
heap
page read and write
5A6B000
trusted library allocation
page read and write
59A3000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
B4E000
heap
page read and write
9B4000
heap
page read and write
5406000
trusted library allocation
page read and write
C1A000
heap
page read and write
FCB000
unkown
page execute and write copy
2FF0000
direct allocation
page read and write
3ECF000
stack
page read and write
C05000
heap
page read and write
541F000
trusted library allocation
page read and write
51E0000
trusted library allocation
page execute and read and write
2DCF000
stack
page read and write
547C000
trusted library allocation
page read and write
4B1000
unkown
page execute and write copy
544B000
trusted library allocation
page read and write
545C000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
2CCE000
stack
page read and write
5AFD000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
F64000
unkown
page execute and write copy
541B000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
5A49000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
408F000
stack
page read and write
5406000
trusted library allocation
page read and write
5B0000
unkown
page execute and write copy
59AE000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
340F000
stack
page read and write
5611000
trusted library allocation
page read and write
59AC000
trusted library allocation
page read and write
C02000
heap
page read and write
77CE000
stack
page read and write
59AD000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
563000
unkown
page execute and write copy
59A3000
trusted library allocation
page read and write
B85000
heap
page read and write
1294000
heap
page read and write
59A1000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
1290000
heap
page read and write
581F000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
4451000
heap
page read and write
FE2000
unkown
page execute and write copy
13D0000
heap
page read and write
5404000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
48D0000
remote allocation
page read and write
27F0000
direct allocation
page read and write
5310000
trusted library allocation
page read and write
4E91000
heap
page read and write
C1F000
heap
page read and write
4A60000
direct allocation
page execute and read and write
5AB7000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
308E000
stack
page read and write
C2A000
heap
page read and write
59A5000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
53FF000
stack
page read and write
454E000
stack
page read and write
1294000
heap
page read and write
5AB9000
trusted library allocation
page read and write
1294000
heap
page read and write
5431000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
4450000
heap
page read and write
F46000
unkown
page execute and write copy
1414000
heap
page read and write
59A8000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
EA5000
unkown
page execute and read and write
5320000
heap
page read and write
368F000
stack
page read and write
444F000
stack
page read and write
C19000
heap
page read and write
404E000
stack
page read and write
541D000
trusted library allocation
page read and write
3F0E000
stack
page read and write
86B000
stack
page read and write
59A0000
trusted library allocation
page read and write
5476000
trusted library allocation
page read and write
58CF000
trusted library allocation
page read and write
4D2E000
stack
page read and write
9B4000
heap
page read and write
59A6000
trusted library allocation
page read and write
5A83000
trusted library allocation
page read and write
2FF0000
direct allocation
page read and write
5033000
trusted library allocation
page execute and read and write
59A0000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
32B000
unkown
page execute and write copy
1294000
heap
page read and write
5A4D000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
9B4000
heap
page read and write
52ED000
stack
page read and write
32B000
unkown
page execute and read and write
FE0000
unkown
page execute and read and write
3BCE000
stack
page read and write
3C8E000
stack
page read and write
5423000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
4AB7000
trusted library allocation
page read and write
1294000
heap
page read and write
5649000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
521F000
stack
page read and write
59A0000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
F56000
unkown
page execute and write copy
5F09000
trusted library allocation
page read and write
541F000
trusted library allocation
page read and write
4E91000
heap
page read and write
5A44000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
4CED000
stack
page read and write
5A53000
trusted library allocation
page read and write
304F000
stack
page read and write
5800000
trusted library allocation
page read and write
4E91000
heap
page read and write
5492000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
3B0F000
stack
page read and write
434E000
stack
page read and write
5417000
trusted library allocation
page read and write
5331000
trusted library allocation
page read and write
4451000
heap
page read and write
318F000
stack
page read and write
5BC000
unkown
page execute and read and write
5415000
trusted library allocation
page read and write
2F4E000
stack
page read and write
5458000
trusted library allocation
page read and write
4C66000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
53B000
unkown
page execute and write copy
5639000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
76CE000
stack
page read and write
4890000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
5BC000
unkown
page execute and write copy
4A4E000
stack
page read and write
5160000
trusted library allocation
page read and write
3CCF000
stack
page read and write
4EA0000
heap
page read and write
F32000
unkown
page execute and write copy
515E000
stack
page read and write
9B4000
heap
page read and write
C1F000
heap
page read and write
59A3000
trusted library allocation
page read and write
59A7000
trusted library allocation
page read and write
C2E000
heap
page read and write
330F000
stack
page read and write
5432000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
5200000
heap
page execute and read and write
5412000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5423000
trusted library allocation
page read and write
2F5E000
stack
page read and write
5621000
trusted library allocation
page read and write
C30000
heap
page read and write
59A1000
trusted library allocation
page read and write
F36000
unkown
page execute and read and write
2FF0000
direct allocation
page read and write
5469000
trusted library allocation
page read and write
C31000
heap
page read and write
503D000
trusted library allocation
page execute and read and write
2A4E000
stack
page read and write
4451000
heap
page read and write
541B000
trusted library allocation
page read and write
58DF000
trusted library allocation
page read and write
C21000
heap
page read and write
580A000
trusted library allocation
page read and write
517B000
trusted library allocation
page execute and read and write
C21000
heap
page read and write
48E0000
direct allocation
page read and write
59AA000
trusted library allocation
page read and write
C30000
heap
page read and write
464F000
stack
page read and write
C2A000
heap
page read and write
5629000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
1294000
heap
page read and write
59A4000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
C0D000
heap
page read and write
310F000
stack
page read and write
378E000
stack
page read and write
5AA8000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
C1A000
heap
page read and write
EC3000
unkown
page execute and read and write
4A6E000
stack
page read and write
2FF0000
direct allocation
page read and write
59AA000
trusted library allocation
page read and write
40CE000
stack
page read and write
6334000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
545C000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
CC0000
heap
page read and write
4A50000
direct allocation
page execute and read and write
5621000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
59A7000
trusted library allocation
page read and write
3E4E000
stack
page read and write
9B4000
heap
page read and write
C11000
heap
page read and write
543A000
trusted library allocation
page read and write
545C000
trusted library allocation
page read and write
418E000
stack
page read and write
EF6000
unkown
page execute and write copy
5BAC000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
C12000
heap
page read and write
127E000
stack
page read and write
9B4000
heap
page read and write
4B1000
unkown
page execute and read and write
265E000
stack
page read and write
1294000
heap
page read and write
4FE0000
direct allocation
page read and write
5D0F000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
ECD000
unkown
page execute and write copy
5400000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
4BED000
stack
page read and write
5401000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
491C000
stack
page read and write
5483000
trusted library allocation
page read and write
C33000
heap
page read and write
2FF0000
direct allocation
page read and write
5621000
trusted library allocation
page read and write
59A9000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
ECF000
unkown
page execute and read and write
740C000
stack
page read and write
5601000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
9B4000
heap
page read and write
2FF0000
direct allocation
page read and write
4D65000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
2B8E000
stack
page read and write
EC3000
unkown
page execute and write copy
5403000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
516A000
trusted library allocation
page execute and read and write
C19000
heap
page read and write
5BD000
unkown
page execute and write copy
540A000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
5631000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
6331000
trusted library allocation
page read and write
EB7000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
4B4F000
stack
page read and write
5621000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
D32000
unkown
page execute and write copy
4A90000
direct allocation
page execute and read and write
13C0000
heap
page read and write
D32000
unkown
page execute and read and write
59AC000
trusted library allocation
page read and write
59A3000
trusted library allocation
page read and write
58D7000
trusted library allocation
page read and write
55FE000
stack
page read and write
261F000
stack
page read and write
D36000
unkown
page write copy
5621000
trusted library allocation
page read and write
4D78000
trusted library allocation
page read and write
2D0000
unkown
page readonly
5AFB000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
BF3000
heap
page read and write
27F0000
direct allocation
page read and write
59A5000
trusted library allocation
page read and write
C21000
heap
page read and write
F1E000
unkown
page execute and read and write
547C000
trusted library allocation
page read and write
3000000
heap
page read and write
541B000
trusted library allocation
page read and write
B4A000
heap
page read and write
F3F000
unkown
page execute and read and write
5A40000
trusted library allocation
page read and write
566000
unkown
page execute and write copy
5434000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
2B4F000
stack
page read and write
5B36000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
59AE000
trusted library allocation
page read and write
C0D000
heap
page read and write
5440000
trusted library allocation
page read and write
9B4000
heap
page read and write
5610000
trusted library allocation
page read and write
1294000
heap
page read and write
C21000
heap
page read and write
1294000
heap
page read and write
4A30000
direct allocation
page execute and read and write
F8D000
unkown
page execute and write copy
31CE000
stack
page read and write
10E9000
stack
page read and write
3B8F000
stack
page read and write
5621000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
3B4E000
stack
page read and write
5C3000
unkown
page execute and write copy
541D000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
9B4000
heap
page read and write
59A3000
trusted library allocation
page read and write
4E91000
heap
page read and write
546C000
trusted library allocation
page read and write
59A5000
trusted library allocation
page read and write
1294000
heap
page read and write
790E000
stack
page read and write
F48000
unkown
page execute and read and write
1370000
direct allocation
page read and write
B1E000
stack
page read and write
490E000
stack
page read and write
5621000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
52F0000
heap
page read and write
5170000
trusted library allocation
page read and write
3F4F000
stack
page read and write
59A9000
trusted library allocation
page read and write
530E000
stack
page read and write
C11000
heap
page read and write
51C000
unkown
page execute and write copy
C1A000
heap
page read and write
5423000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
1294000
heap
page read and write
9D0000
heap
page read and write
D20000
heap
page read and write
5422000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
5AF2000
trusted library allocation
page read and write
C14000
heap
page read and write
5ADF000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
EA8000
unkown
page execute and write copy
350F000
stack
page read and write
5837000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
54E000
unkown
page execute and read and write
59A7000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
2D1000
unkown
page execute and write copy
27F0000
direct allocation
page read and write
545E000
trusted library allocation
page read and write
C12000
heap
page read and write
2FDE000
stack
page read and write
4D61000
trusted library allocation
page read and write
534000
unkown
page execute and read and write
5432000
trusted library allocation
page read and write
123E000
stack
page read and write
6224000
trusted library allocation
page read and write
5D2000
unkown
page execute and read and write
4451000
heap
page read and write
FE2000
unkown
page execute and write copy
4451000
heap
page read and write
541F000
trusted library allocation
page read and write
5BFE000
trusted library allocation
page read and write
430F000
stack
page read and write
5611000
trusted library allocation
page read and write
4451000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
EE0000
unkown
page execute and read and write
F1A000
unkown
page execute and write copy
59A3000
trusted library allocation
page read and write
FD3000
unkown
page execute and write copy
C2A000
heap
page read and write
5466000
trusted library allocation
page read and write
EDF000
unkown
page execute and write copy
5AF4000
trusted library allocation
page read and write
4F90000
heap
page read and write
9B4000
heap
page read and write
4BE000
unkown
page execute and read and write
540B000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5B58000
trusted library allocation
page read and write
59A3000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
C0D000
heap
page read and write
5B56000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
290F000
stack
page read and write
4F90000
trusted library allocation
page read and write
561F000
trusted library allocation
page read and write
2FF0000
direct allocation
page read and write
F68000
unkown
page execute and write copy
5409000
trusted library allocation
page read and write
562F000
trusted library allocation
page read and write
4A0F000
stack
page read and write
2FF0000
direct allocation
page read and write
59A4000
trusted library allocation
page read and write
364E000
stack
page read and write
F70000
unkown
page execute and read and write
51DE000
stack
page read and write
C2A000
heap
page read and write
5AEF000
trusted library allocation
page read and write
59A7000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
4A7000
unkown
page execute and read and write
5446000
trusted library allocation
page read and write
C0F000
heap
page read and write
C33000
heap
page read and write
5423000
trusted library allocation
page read and write
4C7000
unkown
page execute and read and write
3DCE000
stack
page read and write
5ACB000
trusted library allocation
page read and write
4890000
heap
page read and write
B9F000
heap
page read and write
C12000
heap
page read and write
F53000
unkown
page execute and write copy
5444000
trusted library allocation
page read and write
1294000
heap
page read and write
5AA9000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
2C8F000
stack
page read and write
59A3000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
380E000
stack
page read and write
5B8E000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
C0F000
heap
page read and write
59A2000
trusted library allocation
page read and write
F80000
unkown
page execute and write copy
5432000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
5034000
trusted library allocation
page read and write
5D2000
unkown
page execute and write copy
59A4000
trusted library allocation
page read and write
320F000
stack
page read and write
50AE000
stack
page read and write
AB0000
heap
page read and write
543D000
trusted library allocation
page read and write
596F000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
59A8000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
27F0000
direct allocation
page read and write
1380000
heap
page read and write
27F0000
direct allocation
page read and write
5433000
trusted library allocation
page read and write
4A1F000
stack
page read and write
5610000
trusted library allocation
page read and write
C12000
heap
page read and write
428F000
stack
page read and write
3A0E000
stack
page read and write
5443000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
C33000
heap
page read and write
58A7000
trusted library allocation
page read and write
521000
unkown
page execute and write copy
59AE000
trusted library allocation
page read and write
48E0000
direct allocation
page read and write
59A9000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
583000
unkown
page execute and write copy
390F000
stack
page read and write
5AAA000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
344E000
stack
page read and write
5412000
trusted library allocation
page read and write
F8E000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
501B000
stack
page read and write
754E000
stack
page read and write
5AC9000
trusted library allocation
page read and write
4BD000
unkown
page execute and write copy
5432000
trusted library allocation
page read and write
B83000
heap
page read and write
C07000
heap
page read and write
3E0F000
stack
page read and write
59A0000
trusted library allocation
page read and write
589E000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
11FE000
stack
page read and write
F3D000
unkown
page execute and write copy
541F000
trusted library allocation
page read and write
340F000
stack
page read and write
5607000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
36CE000
stack
page read and write
59A8000
trusted library allocation
page read and write
There are 934 hidden memdumps, click here to show them.