IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7V52BG1QZHX6WU0LEYA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7V52BG1QZHX6WU0LEYA.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\7V52BG1QZHX6WU0LEYA.exe
"C:\Users\user~1\AppData\Local\Temp\7V52BG1QZHX6WU0LEYA.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.97.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.16/_
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/api~
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://necklacedmny.store/apiQ
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://necklacedmny.store/apiK
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://necklacedmny.store/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/Xf
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/Feb
unknown
https://necklacedmny.store/apiv
unknown
http://185.215.113.16/0
unknown
https://necklacedmny.store/api2
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.16/off/def.exed
unknown
https://necklacedmny.store/nm
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious
s-part-0032.t-0009.t-msedge.net
13.107.246.60
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
F91000
unkown
page execute and read and write
malicious
5CF9000
trusted library allocation
page read and write
129C000
unkown
page execute and write copy
5FB2000
trusted library allocation
page read and write
422E000
stack
page read and write
4D31000
heap
page read and write
6266000
trusted library allocation
page read and write
F64000
heap
page read and write
5DC3000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
D9E000
stack
page read and write
5D15000
trusted library allocation
page read and write
2C9F000
stack
page read and write
5CE7000
trusted library allocation
page read and write
167E000
stack
page read and write
5CF9000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
6268000
trusted library allocation
page read and write
F64000
heap
page read and write
5DFE000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5DC3000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
1575000
heap
page read and write
597E000
stack
page read and write
36DE000
stack
page read and write
5CBE000
trusted library allocation
page read and write
63AD000
trusted library allocation
page read and write
392F000
stack
page read and write
120D000
unkown
page execute and read and write
5CD1000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
9A9000
unkown
page execute and read and write
4900000
direct allocation
page read and write
6084000
trusted library allocation
page read and write
E0E000
heap
page read and write
5DDF000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
5DFD000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
628D000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
F64000
heap
page read and write
66BF000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
56FF000
stack
page read and write
5CD6000
trusted library allocation
page read and write
9BE000
unkown
page execute and write copy
118C000
unkown
page execute and write copy
5CEA000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
4A60000
direct allocation
page read and write
359E000
stack
page read and write
5D41000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
622D000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
4D31000
heap
page read and write
701B0000
unkown
page readonly
1575000
heap
page read and write
1575000
heap
page read and write
6161000
trusted library allocation
page read and write
345E000
stack
page read and write
5330000
direct allocation
page execute and read and write
5CC6000
trusted library allocation
page read and write
1569000
heap
page read and write
5CE1000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2B9E000
stack
page read and write
5CE3000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
565C000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
1188000
unkown
page execute and write copy
605C000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
55FE000
stack
page read and write
6358000
trusted library allocation
page read and write
573E000
stack
page read and write
4900000
direct allocation
page read and write
5CCF000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
4D31000
heap
page read and write
604C000
trusted library allocation
page read and write
C04000
heap
page read and write
6153000
trusted library allocation
page read and write
3CEF000
stack
page read and write
6155000
trusted library allocation
page read and write
547E000
stack
page read and write
3BDD000
stack
page read and write
52EF000
stack
page read and write
C04000
heap
page read and write
5CE5000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
E00000
heap
page read and write
5CB8000
trusted library allocation
page read and write
51A0000
remote allocation
page read and write
5DF7000
trusted library allocation
page read and write
36AF000
stack
page read and write
4D31000
heap
page read and write
631F000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
F64000
heap
page read and write
5DB1000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
5DFE000
trusted library allocation
page read and write
63CE000
trusted library allocation
page read and write
157A000
heap
page read and write
4AAF000
stack
page read and write
628E000
trusted library allocation
page read and write
1555000
heap
page read and write
5CD9000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
5FB6000
trusted library allocation
page read and write
C04000
heap
page read and write
5D10000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
63CD000
trusted library allocation
page read and write
5FB7000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
A23000
unkown
page execute and read and write
1460000
direct allocation
page read and write
5536000
trusted library allocation
page read and write
45AF000
stack
page read and write
1460000
direct allocation
page read and write
6160000
trusted library allocation
page read and write
5FBC000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
3F5F000
stack
page read and write
5DB2000
trusted library allocation
page read and write
FEB000
unkown
page execute and read and write
5170000
heap
page read and write
4900000
direct allocation
page read and write
AAD000
unkown
page execute and write copy
6155000
trusted library allocation
page read and write
409F000
stack
page read and write
5DD3000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
62AE000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
622C000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
6244000
trusted library allocation
page read and write
5CB8000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
AC4000
unkown
page execute and write copy
816000
unkown
page write copy
5DD3000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
177F000
stack
page read and write
5CE2000
trusted library allocation
page read and write
5CC3000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5CC3000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
63CB000
trusted library allocation
page read and write
5D9000
stack
page read and write
5CCC000
trusted library allocation
page read and write
620D000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
608C000
trusted library allocation
page read and write
3CDF000
stack
page read and write
615B000
trusted library allocation
page read and write
4B40000
heap
page read and write
1563000
heap
page read and write
2E1E000
stack
page read and write
6220000
trusted library allocation
page read and write
4A44000
trusted library allocation
page read and write
631D000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
6FED000
stack
page read and write
61F4000
trusted library allocation
page read and write
9D2000
unkown
page execute and write copy
5CC3000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
61FE000
trusted library allocation
page read and write
F64000
heap
page read and write
FF7000
unkown
page execute and write copy
4CAC000
stack
page read and write
F64000
heap
page read and write
5D16000
trusted library allocation
page read and write
C04000
heap
page read and write
5CE1000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
4AEE000
stack
page read and write
600C000
trusted library allocation
page read and write
319F000
stack
page read and write
5D07000
trusted library allocation
page read and write
F64000
heap
page read and write
4CB0000
trusted library allocation
page read and write
6287000
trusted library allocation
page read and write
54BE000
stack
page read and write
1555000
heap
page read and write
4A9B000
stack
page read and write
615B000
trusted library allocation
page read and write
1575000
heap
page read and write
5CCF000
trusted library allocation
page read and write
1577000
heap
page read and write
125A000
unkown
page execute and read and write
129B000
unkown
page execute and read and write
5CD1000
trusted library allocation
page read and write
62C9000
trusted library allocation
page read and write
9F6000
unkown
page execute and write copy
51B0000
direct allocation
page read and write
69CC000
trusted library allocation
page read and write
30AD000
heap
page read and write
4900000
direct allocation
page read and write
F64000
heap
page read and write
355F000
stack
page read and write
5CE1000
trusted library allocation
page read and write
1206000
unkown
page execute and read and write
1576000
heap
page read and write
1547000
heap
page read and write
62CB000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
A39000
unkown
page execute and write copy
6156000
trusted library allocation
page read and write
14DF000
heap
page read and write
5D1B000
trusted library allocation
page read and write
1576000
heap
page read and write
9F0000
unkown
page execute and write copy
622A000
trusted library allocation
page read and write
5FB5000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
633E000
trusted library allocation
page read and write
9F5000
unkown
page execute and read and write
9AB000
unkown
page execute and read and write
5CC9000
trusted library allocation
page read and write
305F000
stack
page read and write
A6E000
unkown
page execute and write copy
14C5000
heap
page read and write
5CCD000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
615F000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5CFA000
trusted library allocation
page read and write
291E000
stack
page read and write
C04000
heap
page read and write
6158000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
14FA000
heap
page read and write
331E000
stack
page read and write
A60000
unkown
page execute and read and write
1167000
unkown
page execute and read and write
F64000
heap
page read and write
5DD7000
trusted library allocation
page read and write
5CB7000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
1577000
heap
page read and write
5CF9000
trusted library allocation
page read and write
11D8000
unkown
page execute and write copy
5CC0000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
4D31000
heap
page read and write
1285000
unkown
page execute and read and write
5CBD000
trusted library allocation
page read and write
5AEF000
stack
page read and write
46EF000
stack
page read and write
14FA000
heap
page read and write
5DE9000
trusted library allocation
page read and write
128D000
unkown
page execute and write copy
5D1E000
trusted library allocation
page read and write
156B000
heap
page read and write
6218000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
1204000
unkown
page execute and read and write
6158000
trusted library allocation
page read and write
C04000
heap
page read and write
63CC000
trusted library allocation
page read and write
A31000
unkown
page execute and read and write
9BC000
unkown
page execute and write copy
14FA000
heap
page read and write
4D31000
heap
page read and write
2A5F000
stack
page read and write
1174000
unkown
page execute and write copy
6153000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
4D40000
heap
page read and write
C04000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
1561000
heap
page read and write
5DB1000
trusted library allocation
page read and write
1569000
heap
page read and write
C04000
heap
page read and write
30A7000
heap
page read and write
1577000
heap
page read and write
5CCE000
trusted library allocation
page read and write
63FE000
trusted library allocation
page read and write
6254000
trusted library allocation
page read and write
2950000
heap
page read and write
14B7000
heap
page read and write
A44000
unkown
page execute and read and write
148E000
heap
page read and write
810000
unkown
page read and write
5CFF000
trusted library allocation
page read and write
382E000
stack
page read and write
1460000
direct allocation
page read and write
6214000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
533D000
stack
page read and write
5D18000
trusted library allocation
page read and write
49AE000
stack
page read and write
AC6000
unkown
page execute and write copy
342F000
stack
page read and write
5DD3000
trusted library allocation
page read and write
157B000
heap
page read and write
5CB6000
trusted library allocation
page read and write
1207000
unkown
page execute and write copy
5FBB000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
BE0000
heap
page read and write
5DC3000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
5CF3000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
E3B000
stack
page read and write
FF6000
unkown
page execute and read and write
5D16000
trusted library allocation
page read and write
6094000
trusted library allocation
page read and write
66B1000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
7040000
heap
page execute and read and write
1460000
direct allocation
page read and write
6263000
trusted library allocation
page read and write
F64000
heap
page read and write
6239000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5CB5000
trusted library allocation
page read and write
4D31000
heap
page read and write
3E6E000
stack
page read and write
E3F000
heap
page read and write
5CCF000
trusted library allocation
page read and write
31EE000
stack
page read and write
F64000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
9F8000
unkown
page execute and read and write
626B000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
F64000
heap
page read and write
702E000
stack
page read and write
F64000
heap
page read and write
5CF6000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
810000
unkown
page readonly
5DC3000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
5CB5000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
3A6F000
stack
page read and write
1560000
heap
page read and write
6220000
trusted library allocation
page read and write
5CCC000
trusted library allocation
page read and write
4CF0000
heap
page execute and read and write
615C000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
5350000
direct allocation
page execute and read and write
FFF000
stack
page read and write
629C000
trusted library allocation
page read and write
F90000
unkown
page read and write
1186000
unkown
page execute and write copy
41DF000
stack
page read and write
5D18000
trusted library allocation
page read and write
1561000
heap
page read and write
9BD000
unkown
page execute and read and write
6400000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
4D31000
heap
page read and write
6295000
trusted library allocation
page read and write
62A4000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
1217000
unkown
page execute and read and write
6155000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
14C5000
heap
page read and write
6153000
trusted library allocation
page read and write
4D31000
heap
page read and write
5DD3000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
28DB000
stack
page read and write
5DC3000
trusted library allocation
page read and write
F64000
heap
page read and write
5FBA000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
F60000
heap
page read and write
2DDF000
stack
page read and write
6285000
trusted library allocation
page read and write
6284000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
32DF000
stack
page read and write
6157000
trusted library allocation
page read and write
2F5E000
stack
page read and write
155A000
heap
page read and write
5D1A000
trusted library allocation
page read and write
AB3000
unkown
page execute and write copy
3B9F000
stack
page read and write
5CC6000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
155A000
heap
page read and write
5D15000
trusted library allocation
page read and write
9A6000
unkown
page execute and write copy
1203000
unkown
page execute and write copy
5CE1000
trusted library allocation
page read and write
DFE000
stack
page read and write
395E000
stack
page read and write
A21000
unkown
page execute and write copy
5CD1000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
5CFA000
trusted library allocation
page read and write
2F1F000
stack
page read and write
F64000
heap
page read and write
40EE000
stack
page read and write
5DFE000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
6326000
trusted library allocation
page read and write
1569000
heap
page read and write
62A2000
trusted library allocation
page read and write
14C3000
heap
page read and write
701B1000
unkown
page execute read
496F000
stack
page read and write
5DB3000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
5CCF000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
1532000
heap
page read and write
5D25000
trusted library allocation
page read and write
35AE000
stack
page read and write
5CCC000
trusted library allocation
page read and write
2920000
heap
page read and write
1575000
heap
page read and write
5DC9000
trusted library allocation
page read and write
587D000
stack
page read and write
129B000
unkown
page execute and write copy
5CF9000
trusted library allocation
page read and write
826000
unkown
page execute and write copy
157D000
heap
page read and write
FEB000
unkown
page execute and write copy
51EC000
stack
page read and write
5CB6000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
5384000
trusted library allocation
page read and write
37EF000
stack
page read and write
4B2E000
stack
page read and write
5CB5000
trusted library allocation
page read and write
629A000
trusted library allocation
page read and write
623D000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
C04000
heap
page read and write
4A60000
direct allocation
page read and write
F64000
heap
page read and write
6150000
trusted library allocation
page read and write
5CFC000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
3AAE000
stack
page read and write
6328000
trusted library allocation
page read and write
6264000
trusted library allocation
page read and write
12A0000
heap
page read and write
C04000
heap
page read and write
391F000
stack
page read and write
C5D000
stack
page read and write
431F000
stack
page read and write
332E000
stack
page read and write
5CE2000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
4D40000
heap
page read and write
5360000
direct allocation
page execute and read and write
5CD4000
trusted library allocation
page read and write
5CA0000
heap
page read and write
6152000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
3F6F000
stack
page read and write
5CC9000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
5CE2000
trusted library allocation
page read and write
635F000
trusted library allocation
page read and write
2F5E000
stack
page read and write
E47000
heap
page read and write
6151000
trusted library allocation
page read and write
155A000
heap
page read and write
5D23000
trusted library allocation
page read and write
14CE000
heap
page read and write
5370000
direct allocation
page execute and read and write
F90000
unkown
page readonly
3D1E000
stack
page read and write
381E000
stack
page read and write
E5E000
heap
page read and write
5D1A000
trusted library allocation
page read and write
5E75000
trusted library allocation
page read and write
AB3000
unkown
page execute and write copy
564F000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
629D000
trusted library allocation
page read and write
724F000
stack
page read and write
36EE000
stack
page read and write
5DF5000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
1557000
heap
page read and write
5D07000
trusted library allocation
page read and write
F64000
heap
page read and write
4910000
heap
page read and write
B00000
heap
page read and write
5FB5000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
4911000
heap
page read and write
615D000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
157E000
heap
page read and write
62FE000
trusted library allocation
page read and write
C04000
heap
page read and write
1557000
heap
page read and write
4A4D000
trusted library allocation
page execute and read and write
1460000
direct allocation
page read and write
5FB0000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
9A2000
unkown
page execute and write copy
5D02000
trusted library allocation
page read and write
341F000
stack
page read and write
627C000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
3F9E000
stack
page read and write
5CE6000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
432F000
stack
page read and write
6156000
trusted library allocation
page read and write
4C6E000
stack
page read and write
5DE9000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
621A000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
6160000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
C04000
heap
page read and write
6293000
trusted library allocation
page read and write
999000
unkown
page execute and read and write
615E000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
5CCC000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
701C6000
unkown
page readonly
5CD6000
trusted library allocation
page read and write
157D000
heap
page read and write
F91000
unkown
page execute and write copy
59EE000
stack
page read and write
5D0B000
trusted library allocation
page read and write
C04000
heap
page read and write
6155000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
30A0000
heap
page read and write
621E000
trusted library allocation
page read and write
309B000
stack
page read and write
4B30000
trusted library allocation
page execute and read and write
9FC000
unkown
page execute and read and write
6202000
trusted library allocation
page read and write
6154000
trusted library allocation
page read and write
4B60000
heap
page read and write
A5E000
unkown
page execute and write copy
5CD0000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
995000
unkown
page execute and read and write
14B7000
heap
page read and write
61F1000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
F3A000
stack
page read and write
633C000
trusted library allocation
page read and write
6256000
trusted library allocation
page read and write
346E000
stack
page read and write
4900000
direct allocation
page read and write
5D33000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
701CD000
unkown
page read and write
5CE1000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
F64000
heap
page read and write
1460000
direct allocation
page read and write
11A5000
unkown
page execute and read and write
5CE1000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
5CBE000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
11A6000
unkown
page execute and write copy
14C3000
heap
page read and write
C04000
heap
page read and write
5DC3000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
A6C000
unkown
page execute and write copy
44AE000
stack
page read and write
C04000
heap
page read and write
14CE000
heap
page read and write
6158000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
3BEE000
stack
page read and write
5DFE000
trusted library allocation
page read and write
9A2000
unkown
page execute and read and write
6150000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
3E5E000
stack
page read and write
6224000
trusted library allocation
page read and write
62E8000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
A1B000
unkown
page execute and write copy
11D1000
unkown
page execute and write copy
5CC6000
trusted library allocation
page read and write
4C2E000
stack
page read and write
980000
unkown
page execute and write copy
5D10000
trusted library allocation
page read and write
3A5F000
stack
page read and write
1174000
unkown
page execute and read and write
629F000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
C04000
heap
page read and write
148A000
heap
page read and write
5D1B000
trusted library allocation
page read and write
120E000
unkown
page execute and write copy
6300000
trusted library allocation
page read and write
C04000
heap
page read and write
623B000
trusted library allocation
page read and write
638D000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
812000
unkown
page execute and read and write
5DB3000
trusted library allocation
page read and write
622B000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5DB2000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
F64000
heap
page read and write
5D04000
trusted library allocation
page read and write
1286000
unkown
page execute and write copy
5CCE000
trusted library allocation
page read and write
A3A000
unkown
page execute and read and write
6152000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
C04000
heap
page read and write
5CE9000
trusted library allocation
page read and write
41EF000
stack
page read and write
51B0000
direct allocation
page read and write
459F000
stack
page read and write
5C4F000
stack
page read and write
1575000
heap
page read and write
4E51000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
3E2F000
stack
page read and write
3D2E000
stack
page read and write
5DC3000
trusted library allocation
page read and write
659F000
trusted library allocation
page read and write
1560000
heap
page read and write
5DB3000
trusted library allocation
page read and write
472E000
stack
page read and write
5CB7000
trusted library allocation
page read and write
156F000
heap
page read and write
5CC8000
trusted library allocation
page read and write
1548000
heap
page read and write
5CCE000
trusted library allocation
page read and write
51A0000
remote allocation
page read and write
5DC3000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
728E000
stack
page read and write
5DBD000
trusted library allocation
page read and write
156B000
heap
page read and write
812000
unkown
page execute and write copy
5CF3000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
31DE000
stack
page read and write
6269000
trusted library allocation
page read and write
97E000
unkown
page execute and read and write
11DB000
unkown
page execute and read and write
5CCE000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
124E000
unkown
page execute and read and write
5CC3000
trusted library allocation
page read and write
4BEF000
stack
page read and write
5DB2000
trusted library allocation
page read and write
289F000
stack
page read and write
63E4000
trusted library allocation
page read and write
9A8000
unkown
page execute and write copy
5DB1000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
155A000
heap
page read and write
C00000
heap
page read and write
F64000
heap
page read and write
356F000
stack
page read and write
6416000
trusted library allocation
page read and write
6254000
trusted library allocation
page read and write
61F9000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
A4C000
unkown
page execute and write copy
6157000
trusted library allocation
page read and write
11CF000
unkown
page execute and write copy
5DB1000
trusted library allocation
page read and write
1575000
heap
page read and write
5CFB000
trusted library allocation
page read and write
2CDE000
stack
page read and write
5CE2000
trusted library allocation
page read and write
11B8000
unkown
page execute and read and write
E23000
heap
page read and write
5CFA000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
9E3000
unkown
page execute and read and write
5CB8000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
445F000
stack
page read and write
5CE9000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
C04000
heap
page read and write
5CC6000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
F64000
heap
page read and write
1575000
heap
page read and write
1450000
heap
page read and write
AC4000
unkown
page execute and read and write
628C000
trusted library allocation
page read and write
11D0000
unkown
page execute and read and write
6151000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
5CCB000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
55BD000
stack
page read and write
5DB2000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
A12000
unkown
page execute and write copy
6268000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
32EF000
stack
page read and write
A4F000
unkown
page execute and read and write
5B4E000
stack
page read and write
9AA000
unkown
page execute and write copy
11A4000
unkown
page execute and write copy
5DFE000
trusted library allocation
page read and write
5647000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
3BAF000
stack
page read and write
4E4E000
stack
page read and write
40DE000
stack
page read and write
615A000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
128D000
unkown
page execute and write copy
486E000
stack
page read and write
5CEC000
trusted library allocation
page read and write
5CC4000
trusted library allocation
page read and write
1577000
heap
page read and write
5CE4000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
714E000
stack
page read and write
5DB2000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
6124000
trusted library allocation
page read and write
A71000
unkown
page execute and read and write
5DFE000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
118B000
unkown
page execute and read and write
5CC4000
trusted library allocation
page read and write
6253000
trusted library allocation
page read and write
14B3000
heap
page read and write
F64000
heap
page read and write
5DB0000
trusted library allocation
page read and write
1187000
unkown
page execute and read and write
6414000
trusted library allocation
page read and write
48E0000
direct allocation
page read and write
1460000
direct allocation
page read and write
5DBB000
trusted library allocation
page read and write
A42000
unkown
page execute and write copy
615B000
trusted library allocation
page read and write
5CEA000
trusted library allocation
page read and write
A0B000
unkown
page execute and read and write
5D16000
trusted library allocation
page read and write
627D000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
1460000
direct allocation
page read and write
5DFD000
trusted library allocation
page read and write
6244000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
156E000
heap
page read and write
114C000
unkown
page execute and write copy
4A60000
direct allocation
page read and write
1276000
unkown
page execute and write copy
4A54000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
1285000
unkown
page execute and write copy
5D0D000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
3A9E000
stack
page read and write
5CD6000
trusted library allocation
page read and write
142E000
stack
page read and write
5DC3000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
5FEC000
trusted library allocation
page read and write
3E1F000
stack
page read and write
628E000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
81A000
unkown
page execute and write copy
5CE1000
trusted library allocation
page read and write
629C000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
638B000
trusted library allocation
page read and write
1190000
unkown
page execute and read and write
6156000
trusted library allocation
page read and write
1550000
heap
page read and write
14E6000
heap
page read and write
1552000
heap
page read and write
623B000
trusted library allocation
page read and write
1575000
heap
page read and write
4AC7000
trusted library allocation
page execute and read and write
4900000
direct allocation
page read and write
5DC3000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
61F2000
trusted library allocation
page read and write
C04000
heap
page read and write
5CFA000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
435E000
stack
page read and write
5DFE000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
F64000
heap
page read and write
6158000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
446F000
stack
page read and write
4A43000
trusted library allocation
page execute and read and write
816000
unkown
page write copy
45EE000
stack
page read and write
3FAE000
stack
page read and write
4D3E000
stack
page read and write
4900000
direct allocation
page read and write
6154000
trusted library allocation
page read and write
4ACB000
trusted library allocation
page execute and read and write
583F000
stack
page read and write
9A7000
unkown
page execute and read and write
5CD6000
trusted library allocation
page read and write
449E000
stack
page read and write
C04000
heap
page read and write
738E000
stack
page read and write
6261000
trusted library allocation
page read and write
157D000
heap
page read and write
1574000
heap
page read and write
4900000
direct allocation
page read and write
40AF000
stack
page read and write
5D1E000
trusted library allocation
page read and write
155F000
heap
page read and write
63E6000
trusted library allocation
page read and write
14DF000
heap
page read and write
9FA000
unkown
page execute and write copy
5CE6000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
482F000
stack
page read and write
615A000
trusted library allocation
page read and write
51A0000
remote allocation
page read and write
5CC6000
trusted library allocation
page read and write
A20000
unkown
page execute and read and write
5CD6000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
6256000
trusted library allocation
page read and write
436E000
stack
page read and write
6155000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
4900000
direct allocation
page read and write
31AF000
stack
page read and write
997000
unkown
page execute and write copy
5DD3000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
11DC000
unkown
page execute and write copy
1480000
heap
page read and write
5DE7000
trusted library allocation
page read and write
6361000
trusted library allocation
page read and write
61F7000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
156B000
heap
page read and write
4D2F000
stack
page read and write
5CCC000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
620F000
trusted library allocation
page read and write
A2C000
unkown
page execute and write copy
5DD3000
trusted library allocation
page read and write
AC6000
unkown
page execute and write copy
6150000
trusted library allocation
page read and write
1576000
heap
page read and write
5CEA000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
E50000
heap
page read and write
5D14000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
9BF000
unkown
page execute and read and write
5DFE000
trusted library allocation
page read and write
63AB000
trusted library allocation
page read and write
5FD4000
trusted library allocation
page read and write
1380000
heap
page read and write
62DD000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
1533000
heap
page read and write
51B0000
direct allocation
page read and write
4911000
heap
page read and write
1205000
unkown
page execute and write copy
615F000
trusted library allocation
page read and write
6356000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
FF4000
unkown
page execute and write copy
62B0000
trusted library allocation
page read and write
629A000
trusted library allocation
page read and write
1548000
heap
page read and write
6216000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
4922000
heap
page read and write
114A000
unkown
page execute and read and write
5DB3000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
F64000
heap
page read and write
5CC2000
trusted library allocation
page read and write
2B5F000
stack
page read and write
5CE1000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
A6D000
unkown
page execute and read and write
5CD9000
trusted library allocation
page read and write
155D000
heap
page read and write
369F000
stack
page read and write
C04000
heap
page read and write
396E000
stack
page read and write
F64000
heap
page read and write
37DF000
stack
page read and write
C04000
heap
page read and write
6290000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
A07000
unkown
page execute and write copy
6282000
trusted library allocation
page read and write
4ABA000
trusted library allocation
page execute and read and write
5CD6000
trusted library allocation
page read and write
E0A000
heap
page read and write
5DD3000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
1532000
heap
page read and write
4D30000
heap
page read and write
5DE1000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
13EE000
stack
page read and write
4900000
direct allocation
page read and write
5DFE000
trusted library allocation
page read and write
61FC000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
5DFE000
trusted library allocation
page read and write
309E000
stack
page read and write
5D0A000
trusted library allocation
page read and write
6152000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
2957000
heap
page read and write
11D7000
unkown
page execute and read and write
1460000
direct allocation
page read and write
4D31000
heap
page read and write
81A000
unkown
page execute and read and write
11E0000
unkown
page execute and read and write
5DC9000
trusted library allocation
page read and write
701CF000
unkown
page readonly
5FB5000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
627E000
trusted library allocation
page read and write
421E000
stack
page read and write
A14000
unkown
page execute and read and write
1460000
direct allocation
page read and write
5CE9000
trusted library allocation
page read and write
D5E000
stack
page read and write
4DC000
stack
page read and write
305F000
stack
page read and write
5CE1000
trusted library allocation
page read and write
124D000
unkown
page execute and write copy
There are 1042 hidden memdumps, click here to show them.