IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\JJZGOUTRQA0HU75NUH14KKL5I2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JJZGOUTRQA0HU75NUH14KKL5I2.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\JJZGOUTRQA0HU75NUH14KKL5I2.exe
"C:\Users\user\AppData\Local\Temp\JJZGOUTRQA0HU75NUH14KKL5I2.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.96.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/off/def.exee~
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.16/off/def.exeL
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/Q
unknown
http://185.215.113.16/off/def.exex
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/apitey.
unknown
http://185.215.113.16/off/def.exeh
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://necklacedmny.store:443/api
unknown
https://necklacedmny.store/44
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/~
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://necklacedmny.store/apiL
unknown
https://necklacedmny.store/n
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://necklacedmny.store/apib
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exey.
unknown
https://necklacedmny.store/F
unknown
http://185.215.113.16/off/def.exe
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store/N
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
81000
unkown
page execute and read and write
malicious
5A6D000
trusted library allocation
page read and write
108C000
unkown
page execute and read and write
4BAF000
stack
page read and write
28FF000
stack
page read and write
5AA9000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
C58000
heap
page read and write
5552000
trusted library allocation
page read and write
2F5000
unkown
page execute and read and write
27E0000
direct allocation
page read and write
553F000
trusted library allocation
page read and write
FDD000
unkown
page execute and write copy
5552000
trusted library allocation
page read and write
59D3000
trusted library allocation
page read and write
4AAB000
stack
page read and write
5548000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
27E0000
direct allocation
page read and write
1001000
unkown
page execute and read and write
36BF000
stack
page read and write
C64000
heap
page read and write
2D8000
unkown
page execute and write copy
5BDA000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
397E000
stack
page read and write
3CEF000
stack
page read and write
C63000
heap
page read and write
5583000
trusted library allocation
page read and write
45E1000
heap
page read and write
E5000
unkown
page execute and write copy
277000
unkown
page execute and read and write
3267000
heap
page read and write
5ADD000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
1742000
heap
page read and write
271000
unkown
page execute and write copy
27E0000
direct allocation
page read and write
4D3E000
stack
page read and write
5310000
direct allocation
page read and write
5689000
trusted library allocation
page read and write
1564000
heap
page read and write
E6A000
unkown
page execute and read and write
5B09000
trusted library allocation
page read and write
B30000
heap
page read and write
1700000
heap
page read and write
5539000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
4A70000
direct allocation
page read and write
3BBF000
stack
page read and write
5A6B000
trusted library allocation
page read and write
55EA000
trusted library allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
C53000
heap
page read and write
C78000
heap
page read and write
55D4000
trusted library allocation
page read and write
BC5000
heap
page read and write
C5B000
heap
page read and write
45E1000
heap
page read and write
5563000
trusted library allocation
page read and write
BEB000
heap
page read and write
5532000
trusted library allocation
page read and write
45E1000
heap
page read and write
5C5B000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
C7E000
heap
page read and write
167E000
stack
page read and write
31BF000
stack
page read and write
59DB000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
67F1000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
55C0000
direct allocation
page execute and read and write
5573000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
3E3F000
stack
page read and write
C5B000
heap
page read and write
5B1D000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
45E1000
heap
page read and write
25C000
unkown
page execute and write copy
40FE000
stack
page read and write
57A1000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
4E6F000
stack
page read and write
55A1000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
111C000
unkown
page execute and write copy
56AE000
stack
page read and write
59D0000
trusted library allocation
page read and write
100B000
unkown
page execute and read and write
1520000
heap
page read and write
59D4000
trusted library allocation
page read and write
343F000
stack
page read and write
2BD000
unkown
page execute and read and write
4DF3000
trusted library allocation
page read and write
555C000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
1092000
unkown
page execute and read and write
1564000
heap
page read and write
59D7000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
3E6E000
stack
page read and write
5581000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
4FBE000
stack
page read and write
5587000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
23C000
unkown
page execute and write copy
59D9000
trusted library allocation
page read and write
472E000
stack
page read and write
55B3000
trusted library allocation
page read and write
261000
unkown
page execute and write copy
C7E000
heap
page read and write
5AF7000
trusted library allocation
page read and write
5B1F000
trusted library allocation
page read and write
45E1000
heap
page read and write
53FE000
stack
page read and write
555A000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
C7E000
heap
page read and write
11AC000
stack
page read and write
5BA1000
trusted library allocation
page read and write
1564000
heap
page read and write
1048000
unkown
page execute and read and write
4C30000
direct allocation
page execute and read and write
4BF0000
direct allocation
page execute and read and write
558B000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
4D2F000
stack
page read and write
45E1000
heap
page read and write
5A8E000
trusted library allocation
page read and write
C71000
heap
page read and write
55D4000
trusted library allocation
page read and write
553B000
trusted library allocation
page read and write
37EF000
stack
page read and write
5531000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
C55000
heap
page read and write
4AAF000
stack
page read and write
59D7000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
4C2E000
stack
page read and write
E66000
unkown
page write copy
5B2F000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
E76000
unkown
page execute and write copy
5C4B000
trusted library allocation
page read and write
5578000
trusted library allocation
page read and write
B8E000
heap
page read and write
555A000
trusted library allocation
page read and write
16D0000
heap
page read and write
556A000
trusted library allocation
page read and write
5340000
heap
page read and write
5567000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
C5B000
heap
page read and write
40BF000
stack
page read and write
5634000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
356F000
stack
page read and write
293B000
stack
page read and write
5AA7000
trusted library allocation
page read and write
FF3000
unkown
page execute and read and write
5538000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
C4D000
heap
page read and write
37FF000
stack
page read and write
5554000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
5554000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
3D2E000
stack
page read and write
55D4000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
5C59000
trusted library allocation
page read and write
C76000
heap
page read and write
BE2000
heap
page read and write
556E000
trusted library allocation
page read and write
553F000
trusted library allocation
page read and write
79CD000
stack
page read and write
55C4000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
45BF000
stack
page read and write
1564000
heap
page read and write
2B9000
unkown
page execute and write copy
173E000
heap
page read and write
59DC000
trusted library allocation
page read and write
45E1000
heap
page read and write
5B3F000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
59D7000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
4EE4000
trusted library allocation
page read and write
C7E000
heap
page read and write
5A90000
trusted library allocation
page read and write
110B000
unkown
page execute and write copy
321C000
stack
page read and write
59D9000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
2CFE000
stack
page read and write
5B67000
trusted library allocation
page read and write
555C000
trusted library allocation
page read and write
5321000
heap
page read and write
59D7000
trusted library allocation
page read and write
C5D000
heap
page read and write
5669000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
57D0000
trusted library allocation
page read and write
553B000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
1103000
unkown
page execute and write copy
59D2000
trusted library allocation
page read and write
45E1000
heap
page read and write
46EF000
stack
page read and write
559F000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
C55000
heap
page read and write
59DB000
trusted library allocation
page read and write
C76000
heap
page read and write
302000
unkown
page execute and write copy
3F7F000
stack
page read and write
5B9C000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
1014000
unkown
page execute and read and write
C7D000
heap
page read and write
528E000
stack
page read and write
5535000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5554000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
268000
unkown
page execute and read and write
5A95000
trusted library allocation
page read and write
175C000
heap
page read and write
2A0000
unkown
page execute and read and write
5567000
trusted library allocation
page read and write
C7D000
heap
page read and write
2F7E000
stack
page read and write
5310000
direct allocation
page read and write
5600000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
E7000
unkown
page execute and write copy
5CA1000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
447F000
stack
page read and write
5A9E000
trusted library allocation
page read and write
108B000
unkown
page execute and write copy
C58000
heap
page read and write
C58000
heap
page read and write
307F000
stack
page read and write
511D000
stack
page read and write
5AFF000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
59D6000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
111C000
unkown
page execute and write copy
296000
unkown
page execute and write copy
5709000
trusted library allocation
page read and write
B35000
heap
page read and write
2EC000
unkown
page execute and read and write
35D000
unkown
page execute and write copy
373000
unkown
page execute and write copy
5F44000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
52F0000
direct allocation
page read and write
55B4000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
446F000
stack
page read and write
25C000
unkown
page execute and write copy
554C000
trusted library allocation
page read and write
2BE000
unkown
page execute and write copy
5310000
direct allocation
page read and write
1008000
unkown
page execute and write copy
106E000
unkown
page execute and write copy
55A3000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
5AC9000
trusted library allocation
page read and write
437E000
stack
page read and write
5701000
trusted library allocation
page read and write
433F000
stack
page read and write
5561000
trusted library allocation
page read and write
55CD000
trusted library allocation
page execute and read and write
5711000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
4FAF000
stack
page read and write
1079000
unkown
page execute and write copy
170E000
heap
page read and write
4AEE000
stack
page read and write
59D4000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
1070000
unkown
page execute and read and write
27E0000
direct allocation
page read and write
5320000
heap
page read and write
336F000
stack
page read and write
1740000
heap
page read and write
C53000
heap
page read and write
556B000
trusted library allocation
page read and write
3A6F000
stack
page read and write
5B08000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
C76000
heap
page read and write
5590000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
5538000
trusted library allocation
page read and write
5558000
trusted library allocation
page read and write
423E000
stack
page read and write
45E1000
heap
page read and write
1560000
heap
page read and write
55E0000
trusted library allocation
page read and write
C7E000
heap
page read and write
5A8A000
trusted library allocation
page read and write
364000
unkown
page execute and write copy
6815000
trusted library allocation
page read and write
C5A000
heap
page read and write
5B2B000
trusted library allocation
page read and write
553B000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
1077000
unkown
page execute and write copy
4EF4000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
357F000
stack
page read and write
1078000
unkown
page execute and read and write
35BE000
stack
page read and write
2C6000
unkown
page execute and read and write
BCE000
heap
page read and write
373000
unkown
page execute and read and write
B40000
heap
page read and write
C7E000
heap
page read and write
5632000
trusted library allocation
page read and write
C5D000
heap
page read and write
10AD000
unkown
page execute and read and write
346F000
stack
page read and write
5566000
trusted library allocation
page read and write
2CBF000
stack
page read and write
2D6000
unkown
page execute and write copy
557C000
trusted library allocation
page read and write
FDA000
unkown
page execute and read and write
59DC000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
54AC000
stack
page read and write
55E4000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
5539000
trusted library allocation
page read and write
34D000
unkown
page execute and write copy
55B4000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
1564000
heap
page read and write
5AE9000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
4A5D000
stack
page read and write
C65000
heap
page read and write
1564000
heap
page read and write
3E7E000
stack
page read and write
558E000
trusted library allocation
page read and write
554F000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
5539000
trusted library allocation
page read and write
2D7000
unkown
page execute and read and write
55DC000
trusted library allocation
page read and write
5569000
trusted library allocation
page read and write
41FF000
stack
page read and write
5B21000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
4BFD000
stack
page read and write
287000
unkown
page execute and write copy
14F9000
stack
page read and write
5541000
trusted library allocation
page read and write
5321000
heap
page read and write
5552000
trusted library allocation
page read and write
556A000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
55C2000
trusted library allocation
page read and write
C78000
heap
page read and write
59DA000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
E62000
unkown
page execute and write copy
5B23000
trusted library allocation
page read and write
5BD8000
trusted library allocation
page read and write
54FF000
stack
page read and write
10AA000
unkown
page execute and write copy
5539000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
C64000
heap
page read and write
4E7E000
stack
page read and write
55B1000
trusted library allocation
page read and write
392F000
stack
page read and write
1747000
heap
page read and write
2BBE000
stack
page read and write
4EE7000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
7CAE000
stack
page read and write
4F7F000
stack
page read and write
5567000
trusted library allocation
page read and write
7B8E000
stack
page read and write
5310000
direct allocation
page read and write
5573000
trusted library allocation
page read and write
2EA000
unkown
page execute and write copy
5321000
heap
page read and write
5573000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
7B4E000
stack
page read and write
5AF2000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
555A000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
57E0000
heap
page execute and read and write
35AE000
stack
page read and write
5572000
trusted library allocation
page read and write
496F000
stack
page read and write
1564000
heap
page read and write
107F000
unkown
page execute and write copy
59D4000
trusted library allocation
page read and write
16BE000
stack
page read and write
111A000
unkown
page execute and read and write
5563000
trusted library allocation
page read and write
1564000
heap
page read and write
555A000
trusted library allocation
page read and write
482F000
stack
page read and write
BFE000
heap
page read and write
5552000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
1564000
heap
page read and write
5545000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
4F09000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5B9F000
trusted library allocation
page read and write
BEB000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
1564000
heap
page read and write
55C3000
trusted library allocation
page execute and read and write
5BEA000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
31FE000
stack
page read and write
E62000
unkown
page execute and read and write
5541000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
BFE000
heap
page read and write
59D9000
trusted library allocation
page read and write
E66000
unkown
page write copy
32E000
unkown
page execute and read and write
5553000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
2E2000
unkown
page execute and read and write
5531000
trusted library allocation
page read and write
2DB000
unkown
page execute and read and write
553A000
trusted library allocation
page read and write
103B000
unkown
page execute and write copy
55D4000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
45E1000
heap
page read and write
5B0E000
trusted library allocation
page read and write
7B0E000
stack
page read and write
5541000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
30BE000
stack
page read and write
5574000
trusted library allocation
page read and write
2F3F000
stack
page read and write
333E000
stack
page read and write
C57000
heap
page read and write
E60000
unkown
page read and write
BE0000
heap
page read and write
55CD000
trusted library allocation
page read and write
5535000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5600000
direct allocation
page execute and read and write
5553000
trusted library allocation
page read and write
5420000
heap
page read and write
5553000
trusted library allocation
page read and write
C75000
heap
page read and write
55DA000
trusted library allocation
page read and write
3260000
heap
page read and write
5553000
trusted library allocation
page read and write
521E000
stack
page read and write
44AE000
stack
page read and write
5A78000
trusted library allocation
page read and write
5554000
trusted library allocation
page read and write
553B000
trusted library allocation
page read and write
B50000
heap
page read and write
55AC000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
3CFF000
stack
page read and write
5B88000
trusted library allocation
page read and write
288000
unkown
page execute and read and write
1564000
heap
page read and write
5B7D000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
C5B000
heap
page read and write
C5D000
heap
page read and write
5552000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
5564000
trusted library allocation
page read and write
267000
unkown
page execute and write copy
5B7B000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
2ED000
unkown
page execute and write copy
50D0000
remote allocation
page read and write
4A70000
direct allocation
page read and write
251000
unkown
page execute and read and write
5AA5000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
31DE000
stack
page read and write
3E2F000
stack
page read and write
5C21000
trusted library allocation
page read and write
555E000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page read and write
5539000
trusted library allocation
page read and write
C49000
heap
page read and write
59D9000
trusted library allocation
page read and write
556A000
trusted library allocation
page read and write
19FF000
stack
page read and write
5539000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
560B000
trusted library allocation
page execute and read and write
2B4000
unkown
page execute and read and write
558C000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
28E000
unkown
page execute and read and write
553A000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
57AF000
stack
page read and write
554A000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
35F000
unkown
page execute and write copy
35D000
unkown
page execute and write copy
C7E000
heap
page read and write
BB8000
heap
page read and write
56CC000
trusted library allocation
page read and write
1000000
unkown
page execute and write copy
67F4000
trusted library allocation
page read and write
2DC000
unkown
page execute and write copy
45E1000
heap
page read and write
5A9A000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
7A0E000
stack
page read and write
1564000
heap
page read and write
3F6F000
stack
page read and write
5566000
trusted library allocation
page read and write
E60000
unkown
page readonly
5AFF000
trusted library allocation
page read and write
374000
unkown
page execute and write copy
C7E000
heap
page read and write
50D0000
remote allocation
page read and write
5553000
trusted library allocation
page read and write
108D000
unkown
page execute and write copy
C53000
heap
page read and write
81000
unkown
page execute and write copy
25D000
unkown
page execute and read and write
4E3C000
stack
page read and write
5F51000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
C62000
heap
page read and write
486E000
stack
page read and write
59D2000
trusted library allocation
page read and write
27FD000
heap
page read and write
55A3000
trusted library allocation
page read and write
538F000
stack
page read and write
C7D000
heap
page read and write
1510000
heap
page read and write
422E000
stack
page read and write
5541000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
436E000
stack
page read and write
5321000
heap
page read and write
59D9000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
5577000
trusted library allocation
page read and write
2B8000
unkown
page execute and read and write
383E000
stack
page read and write
59D9000
trusted library allocation
page read and write
1564000
heap
page read and write
4EFB000
trusted library allocation
page read and write
78CC000
stack
page read and write
5A9C000
trusted library allocation
page read and write
C60000
heap
page read and write
DB000
unkown
page execute and write copy
5A7C000
trusted library allocation
page read and write
ECE000
stack
page read and write
10BE000
unkown
page execute and write copy
2DFF000
stack
page read and write
59DC000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
555B000
trusted library allocation
page read and write
27F7000
heap
page read and write
55A0000
trusted library allocation
page read and write
E6000
unkown
page execute and read and write
1083000
unkown
page execute and read and write
1564000
heap
page read and write
59D1000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
59D2000
trusted library allocation
page read and write
55AE000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
265000
unkown
page execute and read and write
3A7F000
stack
page read and write
5AF3000
trusted library allocation
page read and write
556B000
trusted library allocation
page read and write
396E000
stack
page read and write
5589000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
C5A000
heap
page read and write
55CD000
trusted library allocation
page read and write
170A000
heap
page read and write
57F1000
trusted library allocation
page read and write
45E0000
heap
page read and write
59D0000
trusted library allocation
page read and write
5470000
direct allocation
page read and write
59D5000
trusted library allocation
page read and write
28D000
unkown
page execute and write copy
53A0000
heap
page read and write
49AE000
stack
page read and write
5557000
trusted library allocation
page read and write
44BE000
stack
page read and write
5AA0000
trusted library allocation
page read and write
50BF000
stack
page read and write
5571000
trusted library allocation
page read and write
1564000
heap
page read and write
557F000
trusted library allocation
page read and write
45EE000
stack
page read and write
5C49000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
5C1F000
trusted library allocation
page read and write
382E000
stack
page read and write
1564000
heap
page read and write
5569000
trusted library allocation
page read and write
27D0000
heap
page read and write
C5A000
heap
page read and write
27E0000
direct allocation
page read and write
5541000
trusted library allocation
page read and write
5330000
heap
page read and write
107E000
unkown
page execute and read and write
59DB000
trusted library allocation
page read and write
347E000
stack
page read and write
5B26000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
1751000
heap
page read and write
5587000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
7DB000
stack
page read and write
27E0000
direct allocation
page read and write
3BAF000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
5552000
trusted library allocation
page read and write
432F000
stack
page read and write
59D9000
trusted library allocation
page read and write
C71000
heap
page read and write
110B000
unkown
page execute and write copy
5A93000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
5607000
trusted library allocation
page execute and read and write
556D000
trusted library allocation
page read and write
40EE000
stack
page read and write
E8F000
stack
page read and write
C62000
heap
page read and write
5563000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
10A3000
unkown
page execute and read and write
27CE000
stack
page read and write
5C3E000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
32FF000
stack
page read and write
5310000
direct allocation
page read and write
3BEE000
stack
page read and write
C5B000
heap
page read and write
5310000
direct allocation
page read and write
5C1B000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
5470000
direct allocation
page read and write
553F000
trusted library allocation
page read and write
27E0000
direct allocation
page read and write
40AF000
stack
page read and write
3FAE000
stack
page read and write
5566000
trusted library allocation
page read and write
45E1000
heap
page read and write
DB000
unkown
page execute and read and write
C55000
heap
page read and write
5A9A000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
C5A000
heap
page read and write
59D1000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
55AE000
stack
page read and write
2B3000
unkown
page execute and write copy
45E1000
heap
page read and write
5AD0000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
10C0000
unkown
page execute and read and write
5660000
heap
page read and write
5548000
trusted library allocation
page read and write
35E000
unkown
page execute and read and write
3AAE000
stack
page read and write
101A000
unkown
page execute and read and write
5BBF000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
C58000
heap
page read and write
C57000
heap
page read and write
23A000
unkown
page execute and read and write
59D2000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
303000
unkown
page execute and read and write
393F000
stack
page read and write
5531000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
55F0000
heap
page read and write
59D8000
trusted library allocation
page read and write
3ABE000
stack
page read and write
E6A000
unkown
page execute and write copy
57DD000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
4EAE000
stack
page read and write
59D9000
trusted library allocation
page read and write
109B000
unkown
page execute and write copy
7DAE000
stack
page read and write
D8E000
stack
page read and write
178F000
heap
page read and write
556B000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
556C000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
1013000
unkown
page execute and write copy
5540000
trusted library allocation
page read and write
80000
unkown
page readonly
45E1000
heap
page read and write
41EF000
stack
page read and write
36FE000
stack
page read and write
3D3E000
stack
page read and write
103E000
unkown
page execute and read and write
556D000
trusted library allocation
page read and write
4D6E000
stack
page read and write
55C4000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
5A9E000
trusted library allocation
page read and write
C57000
heap
page read and write
4C20000
direct allocation
page execute and read and write
C48000
heap
page read and write
5554000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
5541000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
2B7F000
stack
page read and write
4C10000
direct allocation
page execute and read and write
5550000
trusted library allocation
page read and write
325E000
stack
page read and write
59D3000
trusted library allocation
page read and write
27F0000
heap
page read and write
5B28000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
2B5000
unkown
page execute and write copy
4BC0000
direct allocation
page execute and read and write
C6B000
heap
page read and write
5553000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
C7E000
heap
page read and write
27E0000
direct allocation
page read and write
5AB5000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
45C0000
heap
page read and write
B8A000
heap
page read and write
45E1000
heap
page read and write
5470000
direct allocation
page read and write
55AB000
trusted library allocation
page read and write
AFA000
stack
page read and write
5A9C000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
B80000
heap
page read and write
C6B000
heap
page read and write
5AB3000
trusted library allocation
page read and write
45E1000
heap
page read and write
59DC000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
5321000
heap
page read and write
5545000
trusted library allocation
page read and write
18FE000
stack
page read and write
4A70000
direct allocation
page read and write
350000
unkown
page execute and write copy
5578000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
5C3C000
trusted library allocation
page read and write
3BFD000
stack
page read and write
45E1000
heap
page read and write
36EE000
stack
page read and write
5ABC000
trusted library allocation
page read and write
5310000
direct allocation
page read and write
80000
unkown
page read and write
5B0A000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
45E1000
heap
page read and write
7BA0000
heap
page execute and read and write
FCE000
stack
page read and write
1564000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
1564000
heap
page read and write
5570000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
2A3F000
stack
page read and write
4BEF000
stack
page read and write
5B02000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
2E3E000
stack
page read and write
3FBE000
stack
page read and write
1017000
unkown
page execute and write copy
36AF000
stack
page read and write
5B19000
trusted library allocation
page read and write
45F0000
heap
page read and write
59D4000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
5563000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
DB000
unkown
page execute and write copy
C6C000
heap
page read and write
C64000
heap
page read and write
111A000
unkown
page execute and write copy
5582000
trusted library allocation
page read and write
45E1000
heap
page read and write
C7D000
heap
page read and write
5420000
trusted library allocation
page read and write
103F000
unkown
page execute and write copy
5590000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
C75000
heap
page read and write
5573000
trusted library allocation
page read and write
2A7E000
stack
page read and write
5AD2000
trusted library allocation
page read and write
5B38000
trusted library allocation
page read and write
C68000
heap
page read and write
C5B000
heap
page read and write
5B31000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
45AF000
stack
page read and write
C4D000
heap
page read and write
27E0000
direct allocation
page read and write
364000
unkown
page execute and write copy
5553000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
There are 912 hidden memdumps, click here to show them.