IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\V6JTG9Z5Z4ZAMITLFW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\V6JTG9Z5Z4ZAMITLFW.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\V6JTG9Z5Z4ZAMITLFW.exe
"C:\Users\user\AppData\Local\Temp\V6JTG9Z5Z4ZAMITLFW.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/9
unknown
malicious
https://necklacedmny.store:443/apiicrosoft
unknown
malicious
presticitpo.store
malicious
https://necklacedmny.store/1
unknown
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
https://necklacedmny.store:443/api
unknown
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.97.3
malicious
scriptyprefej.store
malicious
https://necklacedmny.store/o
unknown
malicious
https://necklacedmny.store/l
unknown
malicious
https://necklacedmny.store/apie
unknown
malicious
https://necklacedmny.store/
unknown
malicious
navygenerayk.store
malicious
https://necklacedmny.store/I
unknown
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://185.215.113.16/R
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/off/def.exeH
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exePPGm
unknown
http://185.215.113.16/off/def.exes
unknown
http://185.215.113.16/off/def.exeRqmZ5
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://185.215.113.16:80/off/def.exe$
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
http://185.215.113.16/9
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
D21000
unkown
page execute and read and write
malicious
62B8000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
B38000
unkown
page execute and write copy
5E2A000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
637B000
trusted library allocation
page read and write
168F000
heap
page read and write
1688000
heap
page read and write
AB3000
unkown
page execute and read and write
1685000
heap
page read and write
3B4000
heap
page read and write
B29000
unkown
page execute and write copy
319E000
stack
page read and write
2F1E000
stack
page read and write
63EA000
trusted library allocation
page read and write
369E000
stack
page read and write
62B8000
trusted library allocation
page read and write
3B4000
heap
page read and write
1696000
heap
page read and write
62B5000
trusted library allocation
page read and write
4EB1000
heap
page read and write
B65000
unkown
page execute and read and write
64AE000
trusted library allocation
page read and write
160F000
heap
page read and write
935000
unkown
page execute and read and write
5F5E000
trusted library allocation
page read and write
6B27000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
F14000
unkown
page execute and read and write
3B4000
heap
page read and write
62C0000
trusted library allocation
page read and write
4781000
heap
page read and write
62BC000
trusted library allocation
page read and write
63B9000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
5E18000
trusted library allocation
page read and write
6384000
trusted library allocation
page read and write
5B6E000
stack
page read and write
5E4D000
trusted library allocation
page read and write
F79000
unkown
page execute and write copy
63F3000
trusted library allocation
page read and write
3B4000
heap
page read and write
15A0000
direct allocation
page read and write
2710000
heap
page read and write
5E32000
trusted library allocation
page read and write
61C1000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
5F37000
trusted library allocation
page read and write
3C9F000
stack
page read and write
80E000
stack
page read and write
15A0000
direct allocation
page read and write
5E49000
trusted library allocation
page read and write
AC0000
unkown
page execute and read and write
5E5C000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
5EB7000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
2EDF000
stack
page read and write
5F37000
trusted library allocation
page read and write
166D000
heap
page read and write
637D000
trusted library allocation
page read and write
1692000
heap
page read and write
1013000
unkown
page execute and write copy
3A5E000
stack
page read and write
5E28000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
5E37000
trusted library allocation
page read and write
FE8000
unkown
page execute and read and write
644E000
trusted library allocation
page read and write
B50000
unkown
page execute and read and write
F86000
unkown
page execute and read and write
5E2D000
trusted library allocation
page read and write
1454000
heap
page read and write
5E1D000
trusted library allocation
page read and write
B12000
unkown
page execute and read and write
1688000
heap
page read and write
15E8000
heap
page read and write
308E000
stack
page read and write
62B1000
trusted library allocation
page read and write
34C000
stack
page read and write
3AEE000
stack
page read and write
33DF000
stack
page read and write
15A0000
direct allocation
page read and write
62B4000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
16AD000
heap
page read and write
D20000
unkown
page readonly
5E1D000
trusted library allocation
page read and write
4D6F000
stack
page read and write
641E000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
63FA000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
5E35000
trusted library allocation
page read and write
3D0000
heap
page read and write
5EB6000
trusted library allocation
page read and write
4790000
heap
page read and write
62B6000
trusted library allocation
page read and write
101D000
unkown
page execute and write copy
EDC000
unkown
page execute and write copy
4770000
direct allocation
page read and write
F9B000
unkown
page execute and write copy
5F20000
trusted library allocation
page read and write
63C2000
trusted library allocation
page read and write
3B4000
heap
page read and write
F6F000
unkown
page execute and read and write
5F18000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
5F10000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
63BC000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
6E7E000
stack
page read and write
926000
unkown
page write copy
6E3E000
stack
page read and write
62B8000
trusted library allocation
page read and write
EF9000
unkown
page execute and read and write
63AC000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
5E16000
trusted library allocation
page read and write
934000
unkown
page execute and write copy
4A0F000
stack
page read and write
355E000
stack
page read and write
6408000
trusted library allocation
page read and write
4EB0000
heap
page read and write
16A3000
heap
page read and write
63D0000
trusted library allocation
page read and write
4C00000
trusted library allocation
page execute and read and write
63B0000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
587F000
stack
page read and write
6353000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
63D2000
trusted library allocation
page read and write
48C0000
trusted library allocation
page read and write
F9F000
unkown
page execute and write copy
3B4000
heap
page read and write
5E30000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
30E0000
heap
page read and write
FA8000
unkown
page execute and read and write
6391000
trusted library allocation
page read and write
101D000
unkown
page execute and write copy
62B4000
trusted library allocation
page read and write
3C0000
heap
page read and write
16A7000
heap
page read and write
563D000
stack
page read and write
6395000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
936000
unkown
page execute and write copy
62B6000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
B5E000
unkown
page execute and read and write
63B4000
trusted library allocation
page read and write
B03000
unkown
page execute and read and write
4C40000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
4EB1000
heap
page read and write
5F20000
trusted library allocation
page read and write
577E000
stack
page read and write
3E6F000
stack
page read and write
922000
unkown
page execute and read and write
5E2C000
trusted library allocation
page read and write
6355000
trusted library allocation
page read and write
54BD000
stack
page read and write
1454000
heap
page read and write
35AF000
stack
page read and write
661C000
trusted library allocation
page read and write
4781000
heap
page read and write
2A1F000
stack
page read and write
5E21000
trusted library allocation
page read and write
4C2F000
stack
page read and write
63D2000
trusted library allocation
page read and write
573D000
stack
page read and write
48B4000
trusted library allocation
page read and write
F9A000
unkown
page execute and read and write
5E65000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
EFF000
unkown
page execute and read and write
2B5E000
stack
page read and write
422F000
stack
page read and write
5F20000
trusted library allocation
page read and write
5F52000
trusted library allocation
page read and write
26BE000
stack
page read and write
5F31000
trusted library allocation
page read and write
59BF000
stack
page read and write
5ECB000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
48BD000
trusted library allocation
page execute and read and write
5EC2000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
64A1000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
640F000
trusted library allocation
page read and write
A99000
unkown
page execute and read and write
4C6E000
stack
page read and write
4EAF000
stack
page read and write
4EB1000
heap
page read and write
639B000
trusted library allocation
page read and write
3B4000
heap
page read and write
5E57000
trusted library allocation
page read and write
1673000
heap
page read and write
5E53000
trusted library allocation
page read and write
396F000
stack
page read and write
D30000
heap
page read and write
336E000
stack
page read and write
48A0000
trusted library allocation
page read and write
3B4000
heap
page read and write
63D9000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
62B7000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
16AA000
heap
page read and write
5F5E000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
15A0000
direct allocation
page read and write
BC3000
unkown
page execute and read and write
62B9000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
3AAF000
stack
page read and write
6367000
trusted library allocation
page read and write
3D2F000
stack
page read and write
1454000
heap
page read and write
1454000
heap
page read and write
F1D000
unkown
page execute and write copy
4A20000
direct allocation
page execute and read and write
16AA000
heap
page read and write
B3D000
unkown
page execute and read and write
15A0000
direct allocation
page read and write
1454000
heap
page read and write
5E14000
trusted library allocation
page read and write
305E000
stack
page read and write
5F31000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
6526000
trusted library allocation
page read and write
365F000
stack
page read and write
1688000
heap
page read and write
386E000
stack
page read and write
3B4000
heap
page read and write
644D000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
5EDC000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
F3E000
unkown
page execute and write copy
1684000
heap
page read and write
5E1C000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
5E55000
trusted library allocation
page read and write
5F3F000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
1454000
heap
page read and write
B60000
unkown
page execute and write copy
F66000
unkown
page execute and write copy
1454000
heap
page read and write
30ED000
heap
page read and write
31EF000
stack
page read and write
4C61000
trusted library allocation
page read and write
3F1F000
stack
page read and write
1454000
heap
page read and write
5E57000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
6351000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
63D4000
trusted library allocation
page read and write
C1E000
stack
page read and write
54B0000
direct allocation
page execute and read and write
48D0000
direct allocation
page read and write
6362000
trusted library allocation
page read and write
FCA000
unkown
page execute and read and write
EF8000
unkown
page execute and write copy
2700000
direct allocation
page read and write
168E000
heap
page read and write
5F31000
trusted library allocation
page read and write
5F4B000
trusted library allocation
page read and write
1686000
heap
page read and write
48C4000
trusted library allocation
page read and write
3D6E000
stack
page read and write
71FF000
stack
page read and write
6F9000
stack
page read and write
5E44000
trusted library allocation
page read and write
1590000
heap
page read and write
64F5000
trusted library allocation
page read and write
48D0000
direct allocation
page read and write
5330000
direct allocation
page read and write
5ECD000
trusted library allocation
page read and write
419F000
stack
page read and write
FA2000
unkown
page execute and write copy
486F000
stack
page read and write
168E000
heap
page read and write
5E1C000
trusted library allocation
page read and write
4EB1000
heap
page read and write
5E37000
trusted library allocation
page read and write
4A40000
heap
page read and write
2B1F000
stack
page read and write
62B3000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
5EEB000
trusted library allocation
page read and write
49AF000
stack
page read and write
B7C000
unkown
page execute and write copy
5F63000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
4A2A000
trusted library allocation
page execute and read and write
5E18000
trusted library allocation
page read and write
D6A000
heap
page read and write
62B2000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
382F000
stack
page read and write
5F31000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
ED9000
unkown
page execute and read and write
5E22000
trusted library allocation
page read and write
BDA000
unkown
page execute and read and write
5E3D000
trusted library allocation
page read and write
263E000
stack
page read and write
3B4000
heap
page read and write
62BA000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
1004000
unkown
page execute and write copy
4FB0000
trusted library allocation
page read and write
1686000
heap
page read and write
5E34000
trusted library allocation
page read and write
63B2000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
476E000
stack
page read and write
35EE000
stack
page read and write
643E000
trusted library allocation
page read and write
1454000
heap
page read and write
30E7000
heap
page read and write
546F000
stack
page read and write
638F000
trusted library allocation
page read and write
D87000
unkown
page execute and write copy
1014000
unkown
page execute and read and write
5E2D000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
6357000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
922000
unkown
page execute and write copy
62B8000
trusted library allocation
page read and write
90F000
stack
page read and write
4770000
direct allocation
page read and write
54F0000
direct allocation
page execute and read and write
5E3D000
trusted library allocation
page read and write
920000
unkown
page readonly
6372000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
62BA000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
42DF000
stack
page read and write
5F5E000
trusted library allocation
page read and write
441F000
stack
page read and write
5E18000
trusted library allocation
page read and write
167C000
heap
page read and write
5E14000
trusted library allocation
page read and write
F5E000
unkown
page execute and read and write
3DDF000
stack
page read and write
5EBD000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
63C7000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
637D000
trusted library allocation
page read and write
5320000
remote allocation
page read and write
ADA000
unkown
page execute and write copy
1686000
heap
page read and write
267B000
stack
page read and write
6450000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
5320000
remote allocation
page read and write
4880000
trusted library allocation
page read and write
16A2000
heap
page read and write
1688000
heap
page read and write
D20000
unkown
page read and write
4C10000
heap
page read and write
638B000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
ABD000
unkown
page execute and write copy
62B2000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
6411000
trusted library allocation
page read and write
1681000
heap
page read and write
B1E000
unkown
page execute and write copy
6457000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
1454000
heap
page read and write
5E1D000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
920000
unkown
page read and write
BCC000
unkown
page execute and write copy
62B5000
trusted library allocation
page read and write
3B4000
heap
page read and write
4AAE000
stack
page read and write
1410000
heap
page read and write
4770000
direct allocation
page read and write
63AE000
trusted library allocation
page read and write
17AF000
stack
page read and write
32DE000
stack
page read and write
B13000
unkown
page execute and write copy
5F5D000
trusted library allocation
page read and write
1454000
heap
page read and write
15F8000
heap
page read and write
3B4000
heap
page read and write
2C5F000
stack
page read and write
5E29000
trusted library allocation
page read and write
640A000
trusted library allocation
page read and write
62B7000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
640A000
trusted library allocation
page read and write
6382000
trusted library allocation
page read and write
ADB000
unkown
page execute and read and write
5F17000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
64EB000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
16AE000
heap
page read and write
5E22000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
1454000
heap
page read and write
5F31000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
1454000
heap
page read and write
62BE000
trusted library allocation
page read and write
3FAF000
stack
page read and write
62B0000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
15F8000
heap
page read and write
6EBE000
stack
page read and write
62BE000
trusted library allocation
page read and write
6528000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
FFF000
unkown
page execute and read and write
5EA6000
trusted library allocation
page read and write
4BAE000
stack
page read and write
5EA6000
trusted library allocation
page read and write
3B4000
heap
page read and write
5E11000
trusted library allocation
page read and write
F0B000
unkown
page execute and write copy
5F11000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
156E000
stack
page read and write
B6F000
unkown
page execute and read and write
16A2000
heap
page read and write
F7C000
unkown
page execute and read and write
5E29000
trusted library allocation
page read and write
16A2000
heap
page read and write
F13000
unkown
page execute and write copy
5F5E000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
6EF0000
heap
page execute and read and write
15EF000
heap
page read and write
5E29000
trusted library allocation
page read and write
B2C000
unkown
page execute and read and write
BCC000
unkown
page execute and write copy
5E28000
trusted library allocation
page read and write
1454000
heap
page read and write
43AE000
stack
page read and write
5F20000
trusted library allocation
page read and write
405F000
stack
page read and write
15BE000
heap
page read and write
635B000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
168E000
heap
page read and write
636C000
trusted library allocation
page read and write
351F000
stack
page read and write
B6D000
unkown
page execute and write copy
5490000
direct allocation
page execute and read and write
62B9000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
6393000
trusted library allocation
page read and write
64C2000
trusted library allocation
page read and write
5DCF000
stack
page read and write
431E000
stack
page read and write
4BF0000
heap
page execute and read and write
62B7000
trusted library allocation
page read and write
3B4000
heap
page read and write
5E33000
trusted library allocation
page read and write
62B7000
trusted library allocation
page read and write
3B4000
heap
page read and write
6364000
trusted library allocation
page read and write
5E6A000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
63AE000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
16AE000
heap
page read and write
63CD000
trusted library allocation
page read and write
15FE000
heap
page read and write
16AC000
heap
page read and write
168E000
heap
page read and write
63E2000
trusted library allocation
page read and write
41DE000
stack
page read and write
3BEF000
stack
page read and write
62B6000
trusted library allocation
page read and write
63B7000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
6384000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
5E29000
trusted library allocation
page read and write
ACA000
unkown
page execute and read and write
36EF000
stack
page read and write
26FE000
stack
page read and write
B34000
unkown
page execute and write copy
1007000
unkown
page execute and write copy
536B000
stack
page read and write
653A000
trusted library allocation
page read and write
635D000
trusted library allocation
page read and write
5DF0000
heap
page read and write
5E4D000
trusted library allocation
page read and write
4EB1000
heap
page read and write
3B0000
heap
page read and write
F48000
unkown
page execute and read and write
5E14000
trusted library allocation
page read and write
15FE000
heap
page read and write
167D000
heap
page read and write
5E57000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
16A2000
heap
page read and write
5B0E000
stack
page read and write
EFF000
unkown
page execute and write copy
15FA000
heap
page read and write
5504000
trusted library allocation
page read and write
5320000
remote allocation
page read and write
490B000
stack
page read and write
5E53000
trusted library allocation
page read and write
6053000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
322C000
stack
page read and write
DA0000
heap
page read and write
5E1D000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
167C000
heap
page read and write
64ED000
trusted library allocation
page read and write
6289000
trusted library allocation
page read and write
301F000
stack
page read and write
5E44000
trusted library allocation
page read and write
5E5B000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
B1F000
unkown
page execute and read and write
4770000
direct allocation
page read and write
30CE000
stack
page read and write
3E1E000
stack
page read and write
1420000
heap
page read and write
63C9000
trusted library allocation
page read and write
160F000
heap
page read and write
5E51000
trusted library allocation
page read and write
1015000
unkown
page execute and write copy
62C1000
trusted library allocation
page read and write
1688000
heap
page read and write
102B000
unkown
page execute and write copy
636E000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
6353000
trusted library allocation
page read and write
16A7000
heap
page read and write
5C64000
trusted library allocation
page read and write
3B4000
heap
page read and write
4DAE000
stack
page read and write
B4A000
unkown
page execute and write copy
5E8F000
trusted library allocation
page read and write
4781000
heap
page read and write
6478000
trusted library allocation
page read and write
63EB000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
4EB1000
heap
page read and write
FC9000
unkown
page execute and write copy
F70000
unkown
page execute and write copy
472F000
stack
page read and write
160F000
heap
page read and write
5E91000
trusted library allocation
page read and write
1673000
heap
page read and write
40EF000
stack
page read and write
D1E000
stack
page read and write
62B8000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5C6F000
stack
page read and write
62BD000
trusted library allocation
page read and write
5E5B000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
3B5E000
stack
page read and write
FFE000
unkown
page execute and write copy
6420000
trusted library allocation
page read and write
3FEE000
stack
page read and write
49EE000
stack
page read and write
15FE000
heap
page read and write
63CF000
trusted library allocation
page read and write
63ED000
trusted library allocation
page read and write
166C000
heap
page read and write
4780000
heap
page read and write
1454000
heap
page read and write
4770000
direct allocation
page read and write
3C2E000
stack
page read and write
64B0000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
639D000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
5A0D000
stack
page read and write
4A30000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
655C000
trusted library allocation
page read and write
EF4000
unkown
page execute and read and write
63A4000
trusted library allocation
page read and write
1454000
heap
page read and write
647A000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
92A000
unkown
page execute and read and write
638D000
trusted library allocation
page read and write
39AE000
stack
page read and write
5E55000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
1681000
heap
page read and write
62B4000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
5CCE000
stack
page read and write
62B7000
trusted library allocation
page read and write
1695000
heap
page read and write
B15000
unkown
page execute and read and write
3B4000
heap
page read and write
1688000
heap
page read and write
63FC000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
62BA000
trusted library allocation
page read and write
D21000
unkown
page execute and write copy
1685000
heap
page read and write
4AEF000
stack
page read and write
62B9000
trusted library allocation
page read and write
D7B000
unkown
page execute and write copy
62B7000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
5E68000
trusted library allocation
page read and write
4EB1000
heap
page read and write
5EA9000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
291F000
stack
page read and write
409E000
stack
page read and write
B7E000
unkown
page execute and read and write
5E51000
trusted library allocation
page read and write
F84000
unkown
page execute and write copy
62B2000
trusted library allocation
page read and write
637F000
trusted library allocation
page read and write
64A3000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
5FCB000
trusted library allocation
page read and write
FA1000
unkown
page execute and read and write
62BA000
trusted library allocation
page read and write
F68000
unkown
page execute and write copy
3EAE000
stack
page read and write
412E000
stack
page read and write
4BEC000
stack
page read and write
62B7000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
926000
unkown
page write copy
45EE000
stack
page read and write
436F000
stack
page read and write
62BF000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
5F5E000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
DBC000
heap
page read and write
FBC000
unkown
page execute and read and write
48B3000
trusted library allocation
page execute and read and write
5F11000
trusted library allocation
page read and write
3B4000
heap
page read and write
63E0000
trusted library allocation
page read and write
640B000
trusted library allocation
page read and write
1454000
heap
page read and write
F8A000
unkown
page execute and read and write
61E9000
trusted library allocation
page read and write
5F41000
trusted library allocation
page read and write
1450000
heap
page read and write
62B4000
trusted library allocation
page read and write
1696000
heap
page read and write
5E29000
trusted library allocation
page read and write
64FE000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
2717000
heap
page read and write
5F5E000
trusted library allocation
page read and write
1682000
heap
page read and write
63C8000
trusted library allocation
page read and write
462E000
stack
page read and write
62B7000
trusted library allocation
page read and write
168E000
heap
page read and write
4EB1000
heap
page read and write
346F000
stack
page read and write
2F8E000
stack
page read and write
ABF000
unkown
page execute and write copy
B5B000
unkown
page execute and write copy
5E4C000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
AC9000
unkown
page execute and write copy
62B2000
trusted library allocation
page read and write
6382000
trusted library allocation
page read and write
1013000
unkown
page execute and write copy
D7B000
unkown
page execute and read and write
48AE000
stack
page read and write
1673000
heap
page read and write
64F7000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
44EE000
stack
page read and write
5E28000
trusted library allocation
page read and write
FBB000
unkown
page execute and write copy
5F29000
trusted library allocation
page read and write
5F76000
trusted library allocation
page read and write
1454000
heap
page read and write
3B4000
heap
page read and write
62B1000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
5E10000
trusted library allocation
page read and write
168E000
heap
page read and write
1454000
heap
page read and write
5EAA000
trusted library allocation
page read and write
55FD000
stack
page read and write
372E000
stack
page read and write
5ECD000
trusted library allocation
page read and write
63EF000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
F0A000
unkown
page execute and read and write
DA8000
heap
page read and write
BDA000
unkown
page execute and write copy
5C61000
trusted library allocation
page read and write
2C9E000
stack
page read and write
34AE000
stack
page read and write
62BA000
trusted library allocation
page read and write
5F4A000
trusted library allocation
page read and write
168E000
heap
page read and write
5EB1000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
5E56000
trusted library allocation
page read and write
1696000
heap
page read and write
F5D000
unkown
page execute and write copy
44AF000
stack
page read and write
10BB000
stack
page read and write
6365000
trusted library allocation
page read and write
15FE000
heap
page read and write
BC2000
unkown
page execute and write copy
5EA6000
trusted library allocation
page read and write
6DFD000
stack
page read and write
5F37000
trusted library allocation
page read and write
DB0000
heap
page read and write
5E1A000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
4A3B000
trusted library allocation
page execute and read and write
B37000
unkown
page execute and read and write
5F31000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
15F3000
heap
page read and write
F0C000
unkown
page execute and read and write
5F5E000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
15A0000
direct allocation
page read and write
63A6000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
1454000
heap
page read and write
2DDE000
stack
page read and write
F87000
unkown
page execute and write copy
5EA9000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
15BA000
heap
page read and write
160F000
heap
page read and write
62B3000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
37DE000
stack
page read and write
5F47000
trusted library allocation
page read and write
11BA000
stack
page read and write
D9E000
heap
page read and write
329F000
stack
page read and write
62B7000
trusted library allocation
page read and write
62BA000
trusted library allocation
page read and write
6359000
trusted library allocation
page read and write
6409000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5F06000
trusted library allocation
page read and write
62BA000
trusted library allocation
page read and write
4770000
direct allocation
page read and write
16AB000
heap
page read and write
52F0000
heap
page read and write
62B5000
trusted library allocation
page read and write
4EB1000
heap
page read and write
63EC000
trusted library allocation
page read and write
1454000
heap
page read and write
48D0000
direct allocation
page read and write
6151000
trusted library allocation
page read and write
92A000
unkown
page execute and write copy
62B6000
trusted library allocation
page read and write
63C4000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
379F000
stack
page read and write
57C5000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
636E000
trusted library allocation
page read and write
102C000
unkown
page execute and write copy
5FC0000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
62BA000
trusted library allocation
page read and write
F9D000
unkown
page execute and read and write
102B000
unkown
page execute and read and write
5F5E000
trusted library allocation
page read and write
63BA000
trusted library allocation
page read and write
4C50000
heap
page read and write
6111000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
5E5A000
trusted library allocation
page read and write
D60000
heap
page read and write
1692000
heap
page read and write
DAA000
heap
page read and write
62B4000
trusted library allocation
page read and write
1454000
heap
page read and write
5F5E000
trusted library allocation
page read and write
63A3000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
635D000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
6459000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
5E5B000
trusted library allocation
page read and write
3B4000
heap
page read and write
63C6000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
315F000
stack
page read and write
167C000
heap
page read and write
BDC000
unkown
page execute and write copy
62BE000
trusted library allocation
page read and write
62B8000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
AF8000
unkown
page execute and write copy
6FFE000
stack
page read and write
16AC000
heap
page read and write
391E000
stack
page read and write
640C000
trusted library allocation
page read and write
5EAD000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
F78000
unkown
page execute and read and write
58BE000
stack
page read and write
16A2000
heap
page read and write
54A0000
direct allocation
page execute and read and write
1454000
heap
page read and write
5EF6000
trusted library allocation
page read and write
6569000
trusted library allocation
page read and write
16A7000
heap
page read and write
4770000
direct allocation
page read and write
5C85000
trusted library allocation
page read and write
3F5E000
stack
page read and write
1681000
heap
page read and write
3B4000
heap
page read and write
3CDE000
stack
page read and write
62B9000
trusted library allocation
page read and write
4B2E000
stack
page read and write
4770000
direct allocation
page read and write
341E000
stack
page read and write
F07000
unkown
page execute and write copy
70FF000
stack
page read and write
426E000
stack
page read and write
5E40000
trusted library allocation
page read and write
2D9F000
stack
page read and write
5E28000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
4EC0000
heap
page read and write
4A60000
direct allocation
page execute and read and write
4A37000
trusted library allocation
page execute and read and write
1692000
heap
page read and write
F67000
unkown
page execute and read and write
5E28000
trusted library allocation
page read and write
BC4000
unkown
page execute and write copy
15B0000
heap
page read and write
63DB000
trusted library allocation
page read and write
15F8000
heap
page read and write
B11000
unkown
page execute and write copy
38DF000
stack
page read and write
611A000
trusted library allocation
page read and write
3B4000
heap
page read and write
15A0000
direct allocation
page read and write
6118000
trusted library allocation
page read and write
61A7000
trusted library allocation
page read and write
62B8000
trusted library allocation
page read and write
3B9E000
stack
page read and write
332F000
stack
page read and write
3B4000
heap
page read and write
3A1F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
5E36000
trusted library allocation
page read and write
F1E000
unkown
page execute and read and write
F92000
unkown
page execute and write copy
5F5E000
trusted library allocation
page read and write
62BA000
trusted library allocation
page read and write
16AB000
heap
page read and write
BDC000
unkown
page execute and write copy
5E55000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
6171000
trusted library allocation
page read and write
4781000
heap
page read and write
5F31000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
61F9000
trusted library allocation
page read and write
281F000
stack
page read and write
54B0000
direct allocation
page execute and read and write
A9C000
unkown
page execute and write copy
6500000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
ABD000
unkown
page execute and read and write
168E000
heap
page read and write
5F5E000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
D6E000
heap
page read and write
5F49000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
5F17000
trusted library allocation
page read and write
6538000
trusted library allocation
page read and write
5F5E000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
4781000
heap
page read and write
5E28000
trusted library allocation
page read and write
6374000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
6116000
trusted library allocation
page read and write
4EB1000
heap
page read and write
5F31000
trusted library allocation
page read and write
62B9000
trusted library allocation
page read and write
635B000
trusted library allocation
page read and write
168E000
heap
page read and write
There are 969 hidden memdumps, click here to show them.