IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0L9V49BGE9BOE4IYXIIV26RZIS7RT6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\UK2346Q4E08RPNV0H.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\UK2346Q4E08RPNV0H.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\UK2346Q4E08RPNV0H.exe
"C:\Users\user\AppData\Local\Temp\UK2346Q4E08RPNV0H.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.97.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store:443/apiK
unknown
http://185.215.113.16/off/def.exeIN
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.microsoft
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://necklacedmny.store/r_
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://necklacedmny.store/apiV
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16:80/off/def.exet7
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/:_
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://necklacedmny.store/apiH
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://necklacedmny.store/apif
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://necklacedmny.store:443/api
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
6164000
trusted library allocation
page read and write
12A4000
heap
page read and write
5C64000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
12A4000
heap
page read and write
5BB8000
trusted library allocation
page read and write
12A4000
heap
page read and write
14D7000
heap
page read and write
5BFB000
trusted library allocation
page read and write
630D000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
CBA000
unkown
page execute and read and write
623D000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
E59000
unkown
page execute and read and write
5BF3000
trusted library allocation
page read and write
61B8000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
61BA000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
6130000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
2DCE000
stack
page read and write
6118000
trusted library allocation
page read and write
14DC000
heap
page read and write
6331000
trusted library allocation
page read and write
12A4000
heap
page read and write
616A000
trusted library allocation
page read and write
5CB8000
trusted library allocation
page read and write
61BB000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
5C58000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6146000
trusted library allocation
page read and write
4C61000
heap
page read and write
611B000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5D58000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
4751000
heap
page read and write
5BCE000
trusted library allocation
page read and write
6058000
trusted library allocation
page read and write
268E000
stack
page read and write
605F000
trusted library allocation
page read and write
14D8000
heap
page read and write
5BFB000
trusted library allocation
page read and write
E56000
unkown
page execute and write copy
5C18000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
884000
heap
page read and write
A5E000
stack
page read and write
6055000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
60F4000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
605D000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
E93000
unkown
page execute and write copy
623B000
trusted library allocation
page read and write
6103000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
30E000
unkown
page execute and write copy
5BC5000
trusted library allocation
page read and write
4C61000
heap
page read and write
2FA0000
direct allocation
page read and write
4920000
direct allocation
page execute and read and write
605D000
trusted library allocation
page read and write
1459000
heap
page read and write
6124000
trusted library allocation
page read and write
CB0000
unkown
page read and write
F12000
unkown
page execute and write copy
60F2000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
61DE000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
3B4E000
stack
page read and write
14FB000
heap
page read and write
605E000
trusted library allocation
page read and write
5BB4000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
6144000
trusted library allocation
page read and write
61A4000
trusted library allocation
page read and write
6CEC000
stack
page read and write
26B0000
direct allocation
page read and write
41E000
unkown
page execute and write copy
605B000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
6053000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
60F2000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5BFD000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
CB6000
unkown
page write copy
5C28000
trusted library allocation
page read and write
61FD000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
6058000
trusted library allocation
page read and write
E45000
unkown
page execute and write copy
14E8000
heap
page read and write
12A4000
heap
page read and write
5BDA000
trusted library allocation
page read and write
ED8000
unkown
page execute and read and write
12A4000
heap
page read and write
61BD000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
4C61000
heap
page read and write
5BEB000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
61A2000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
605B000
trusted library allocation
page read and write
14CA000
heap
page read and write
378F000
stack
page read and write
6058000
trusted library allocation
page read and write
7D0000
heap
page read and write
770000
heap
page read and write
12A4000
heap
page read and write
5BDA000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
EBD000
unkown
page execute and read and write
488D000
trusted library allocation
page execute and read and write
6124000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
408E000
stack
page read and write
7BB000
heap
page read and write
5BFB000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
884000
heap
page read and write
5D90000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
5D88000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
430E000
stack
page read and write
5C1D000
trusted library allocation
page read and write
4884000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
14DB000
heap
page read and write
6127000
trusted library allocation
page read and write
610B000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
418F000
stack
page read and write
6058000
trusted library allocation
page read and write
66C1000
trusted library allocation
page read and write
6061000
trusted library allocation
page read and write
409000
unkown
page execute and write copy
CB2000
unkown
page execute and read and write
6051000
trusted library allocation
page read and write
18B000
unkown
page execute and write copy
6323000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
610A000
trusted library allocation
page read and write
6141000
trusted library allocation
page read and write
404F000
stack
page read and write
354E000
stack
page read and write
6059000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
6126000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5568000
trusted library allocation
page read and write
5BC9000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
61FB000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
4CB1000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
61AF000
trusted library allocation
page read and write
630B000
trusted library allocation
page read and write
6061000
trusted library allocation
page read and write
12A4000
heap
page read and write
605A000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
6161000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
6058000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
42E000
unkown
page execute and write copy
52AB000
trusted library allocation
page read and write
605C000
trusted library allocation
page read and write
6109000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
14DF000
heap
page read and write
5C20000
trusted library allocation
page read and write
61FD000
trusted library allocation
page read and write
5CB2000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
14DB000
heap
page read and write
5BC0000
trusted library allocation
page read and write
605E000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
2FC0000
direct allocation
page read and write
5BDA000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
632F000
trusted library allocation
page read and write
EE9000
unkown
page execute and write copy
6133000
trusted library allocation
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
5C18000
trusted library allocation
page read and write
CC6000
unkown
page execute and write copy
130000
unkown
page readonly
6145000
trusted library allocation
page read and write
61AC000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
60FC000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
364F000
stack
page read and write
5BF8000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
14E3000
heap
page read and write
5BDB000
trusted library allocation
page read and write
884000
heap
page read and write
5C3B000
trusted library allocation
page read and write
14E3000
heap
page read and write
5C13000
trusted library allocation
page read and write
631E000
trusted library allocation
page read and write
12A4000
heap
page read and write
5240000
direct allocation
page execute and read and write
6061000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
6123000
trusted library allocation
page read and write
6057000
trusted library allocation
page read and write
F42000
unkown
page execute and write copy
14D9000
heap
page read and write
605F000
trusted library allocation
page read and write
7B2000
heap
page read and write
26B0000
direct allocation
page read and write
6F9000
stack
page read and write
5C2B000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
605D000
trusted library allocation
page read and write
605C000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
14F2000
heap
page read and write
6053000
trusted library allocation
page read and write
2690000
direct allocation
page read and write
5BE9000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6051000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
5BBB000
trusted library allocation
page read and write
12A4000
heap
page read and write
884000
heap
page read and write
48F0000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
2FC0000
direct allocation
page read and write
12A4000
heap
page read and write
5BDB000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
12A4000
heap
page read and write
5BB8000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
390E000
stack
page read and write
3DCF000
stack
page read and write
5BFE000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
4751000
heap
page read and write
884000
heap
page read and write
2F0E000
stack
page read and write
2C8E000
stack
page read and write
5CB6000
trusted library allocation
page read and write
6E2E000
stack
page read and write
5C0B000
trusted library allocation
page read and write
884000
heap
page read and write
605D000
trusted library allocation
page read and write
350F000
stack
page read and write
5C23000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
5BF6000
trusted library allocation
page read and write
4ACE000
stack
page read and write
5C18000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
613C000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
EDE000
unkown
page execute and write copy
61B9000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
12A4000
heap
page read and write
614D000
trusted library allocation
page read and write
5BCB000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
14EA000
heap
page read and write
5BFD000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
E4C000
unkown
page execute and read and write
880000
heap
page read and write
6306000
trusted library allocation
page read and write
12A4000
heap
page read and write
5BDA000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
7C5000
heap
page read and write
884000
heap
page read and write
48A0000
direct allocation
page read and write
6151000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
6147000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
12A4000
heap
page read and write
14ED000
heap
page read and write
5BFE000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
CB2000
unkown
page execute and write copy
5BE4000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
4751000
heap
page read and write
624D000
trusted library allocation
page read and write
6119000
trusted library allocation
page read and write
4751000
heap
page read and write
E38000
unkown
page execute and write copy
5BF8000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
12A4000
heap
page read and write
5BB2000
trusted library allocation
page read and write
F56000
unkown
page execute and write copy
48A0000
direct allocation
page read and write
5BFB000
trusted library allocation
page read and write
6057000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
4C61000
heap
page read and write
49AE000
stack
page read and write
E5D000
unkown
page execute and read and write
F15000
unkown
page execute and read and write
1459000
heap
page read and write
E43000
unkown
page execute and read and write
6055000
trusted library allocation
page read and write
4751000
heap
page read and write
884000
heap
page read and write
5C1B000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
4907000
trusted library allocation
page execute and read and write
60F4000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
3B8E000
stack
page read and write
605F000
trusted library allocation
page read and write
5C31000
trusted library allocation
page read and write
61BF000
trusted library allocation
page read and write
5C13000
trusted library allocation
page read and write
14DD000
heap
page read and write
F66000
unkown
page execute and read and write
884000
heap
page read and write
614A000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
14F1000
heap
page read and write
5BB1000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
14FA000
heap
page read and write
189000
unkown
page write copy
5D80000
trusted library allocation
page read and write
368E000
stack
page read and write
48DC000
stack
page read and write
5BFB000
trusted library allocation
page read and write
884000
heap
page read and write
6058000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
F50000
unkown
page execute and write copy
60FA000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6EC0000
heap
page execute and read and write
5C1C000
trusted library allocation
page read and write
5C13000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
6149000
trusted library allocation
page read and write
26C7000
heap
page read and write
E88000
unkown
page execute and read and write
6134000
trusted library allocation
page read and write
61BF000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
CB6000
unkown
page write copy
5C13000
trusted library allocation
page read and write
6058000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
6057000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
14FB000
heap
page read and write
5BFB000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
CB0000
unkown
page readonly
60F8000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
6261000
trusted library allocation
page read and write
33CF000
stack
page read and write
6132000
trusted library allocation
page read and write
884000
heap
page read and write
3A4E000
stack
page read and write
6FCE000
stack
page read and write
5BB8000
trusted library allocation
page read and write
5CB6000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
EF2000
unkown
page execute and write copy
5BFB000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
41CE000
stack
page read and write
5BDA000
trusted library allocation
page read and write
615F000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
147D000
heap
page read and write
40B000
unkown
page execute and write copy
E42000
unkown
page execute and write copy
5CB7000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
42CF000
stack
page read and write
5BCE000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
3A0F000
stack
page read and write
4751000
heap
page read and write
4760000
heap
page read and write
E98000
unkown
page execute and write copy
4C61000
heap
page read and write
5BFB000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
48F0000
direct allocation
page execute and read and write
6321000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
6EAE000
stack
page read and write
28CF000
stack
page read and write
5BFB000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
418000
unkown
page execute and write copy
EB3000
unkown
page execute and write copy
61C1000
trusted library allocation
page read and write
CBA000
unkown
page execute and write copy
5BFB000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
106F000
stack
page read and write
147D000
heap
page read and write
14EC000
heap
page read and write
5BCE000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
5BF4000
trusted library allocation
page read and write
6057000
trusted library allocation
page read and write
14E4000
heap
page read and write
5BDB000
trusted library allocation
page read and write
60FE000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
625F000
trusted library allocation
page read and write
6108000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
4751000
heap
page read and write
14DE000
heap
page read and write
5BDA000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
6128000
trusted library allocation
page read and write
C9E000
stack
page read and write
14DF000
heap
page read and write
884000
heap
page read and write
6057000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
264B000
stack
page read and write
6168000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
61AD000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
EB6000
unkown
page execute and read and write
5BCE000
trusted library allocation
page read and write
ED3000
unkown
page execute and write copy
5BFB000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
340E000
stack
page read and write
26B0000
direct allocation
page read and write
147D000
heap
page read and write
605D000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
6058000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
605B000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
5BFB000
trusted library allocation
page read and write
4894000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
5BDC000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
EE2000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
605E000
trusted library allocation
page read and write
77A000
heap
page read and write
77E000
heap
page read and write
5BFB000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
6056000
trusted library allocation
page read and write
14E8000
heap
page read and write
6DED000
stack
page read and write
5BDB000
trusted library allocation
page read and write
14C8000
heap
page read and write
440F000
stack
page read and write
48FA000
trusted library allocation
page execute and read and write
611A000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
12A4000
heap
page read and write
614F000
trusted library allocation
page read and write
60FE000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
14ED000
heap
page read and write
5BFD000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
6148000
trusted library allocation
page read and write
1463000
heap
page read and write
6053000
trusted library allocation
page read and write
E24000
unkown
page execute and read and write
5BFB000
trusted library allocation
page read and write
14F8000
heap
page read and write
60F1000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
5BC6000
trusted library allocation
page read and write
5BCC000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
32CE000
stack
page read and write
4CAE000
stack
page read and write
7B4000
heap
page read and write
5BDB000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
884000
heap
page read and write
6056000
trusted library allocation
page read and write
E35000
unkown
page execute and read and write
5BB1000
trusted library allocation
page read and write
4751000
heap
page read and write
5BEC000
trusted library allocation
page read and write
E5A000
unkown
page execute and write copy
4960000
heap
page execute and read and write
EF5000
unkown
page execute and read and write
14E1000
heap
page read and write
5CB3000
trusted library allocation
page read and write
2C4F000
stack
page read and write
5C28000
trusted library allocation
page read and write
6055000
trusted library allocation
page read and write
61C1000
trusted library allocation
page read and write
2ECF000
stack
page read and write
5C1B000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
12A4000
heap
page read and write
4C61000
heap
page read and write
3FE000
stack
page read and write
F68000
unkown
page execute and write copy
5BC0000
trusted library allocation
page read and write
5C13000
trusted library allocation
page read and write
6147000
trusted library allocation
page read and write
4BA0000
heap
page read and write
5C58000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5BF3000
trusted library allocation
page read and write
14E4000
heap
page read and write
12A4000
heap
page read and write
605C000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
14D7000
heap
page read and write
621B000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
5CD5000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
131000
unkown
page execute and write copy
1463000
heap
page read and write
5BF1000
trusted library allocation
page read and write
4940000
heap
page read and write
5CE8000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
37CE000
stack
page read and write
26B0000
direct allocation
page read and write
5250000
direct allocation
page execute and read and write
884000
heap
page read and write
6126000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
605C000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
2B4E000
stack
page read and write
5BDA000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
380000
heap
page read and write
5C58000
trusted library allocation
page read and write
61A5000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
61FB000
trusted library allocation
page read and write
E96000
unkown
page execute and read and write
12A4000
heap
page read and write
61BD000
trusted library allocation
page read and write
38CF000
stack
page read and write
4B70000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
29CF000
stack
page read and write
605E000
trusted library allocation
page read and write
6166000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
12A4000
heap
page read and write
6122000
trusted library allocation
page read and write
31C000
stack
page read and write
4C61000
heap
page read and write
26B0000
direct allocation
page read and write
5CBC000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
60F6000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
6056000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
F56000
unkown
page execute and write copy
5C06000
trusted library allocation
page read and write
605C000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
61C7000
trusted library allocation
page read and write
14CA000
heap
page read and write
14F1000
heap
page read and write
14CA000
heap
page read and write
61BF000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
14F3000
heap
page read and write
14C4000
heap
page read and write
5BF6000
trusted library allocation
page read and write
4750000
heap
page read and write
EB7000
unkown
page execute and write copy
5BDA000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
328F000
stack
page read and write
614F000
trusted library allocation
page read and write
760000
heap
page read and write
26B0000
direct allocation
page read and write
605C000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
60F3000
trusted library allocation
page read and write
60FC000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
70CE000
stack
page read and write
5BDB000
trusted library allocation
page read and write
5BEC000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
14DF000
heap
page read and write
5BFB000
trusted library allocation
page read and write
48A0000
direct allocation
page read and write
5BCE000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
3CCE000
stack
page read and write
2D8F000
stack
page read and write
314F000
stack
page read and write
2FA0000
direct allocation
page read and write
14FB000
heap
page read and write
26C0000
heap
page read and write
5554000
trusted library allocation
page read and write
4930000
trusted library allocation
page execute and read and write
2FA0000
direct allocation
page read and write
5BFB000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
6057000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
884000
heap
page read and write
60FC000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
6055000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
14D6000
heap
page read and write
6116000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
1463000
heap
page read and write
4850000
trusted library allocation
page read and write
300F000
stack
page read and write
6055000
trusted library allocation
page read and write
6145000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
50E0000
direct allocation
page read and write
6055000
trusted library allocation
page read and write
E75000
unkown
page execute and write copy
F66000
unkown
page execute and write copy
884000
heap
page read and write
3F0F000
stack
page read and write
3C8F000
stack
page read and write
5BEB000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
E39000
unkown
page execute and read and write
6308000
trusted library allocation
page read and write
49C0000
heap
page read and write
605E000
trusted library allocation
page read and write
6E6E000
stack
page read and write
5BE6000
trusted library allocation
page read and write
18B000
unkown
page execute and write copy
5220000
direct allocation
page execute and read and write
61B7000
trusted library allocation
page read and write
6124000
trusted library allocation
page read and write
E26000
unkown
page execute and write copy
5C1D000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
6163000
trusted library allocation
page read and write
5BDC000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
4C61000
heap
page read and write
14FB000
heap
page read and write
304E000
stack
page read and write
5BFB000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
390000
heap
page read and write
5BBB000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
884000
heap
page read and write
884000
heap
page read and write
6143000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
6143000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
5C23000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
F43000
unkown
page execute and read and write
318E000
stack
page read and write
E9B000
unkown
page execute and read and write
5BB2000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
50D0000
remote allocation
page read and write
F68000
unkown
page execute and write copy
6059000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
3F4E000
stack
page read and write
5CB1000
trusted library allocation
page read and write
605E000
trusted library allocation
page read and write
2A0E000
stack
page read and write
14F2000
heap
page read and write
5230000
direct allocation
page execute and read and write
5C13000
trusted library allocation
page read and write
61C9000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
12A4000
heap
page read and write
EC6000
unkown
page execute and write copy
5BBB000
trusted library allocation
page read and write
4883000
trusted library allocation
page execute and read and write
6057000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
61BB000
trusted library allocation
page read and write
6101000
trusted library allocation
page read and write
884000
heap
page read and write
74E000
stack
page read and write
6159000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
6053000
trusted library allocation
page read and write
14DC000
heap
page read and write
6111000
trusted library allocation
page read and write
6281000
trusted library allocation
page read and write
12A4000
heap
page read and write
5BDA000
trusted library allocation
page read and write
6053000
trusted library allocation
page read and write
14F8000
heap
page read and write
5C0B000
trusted library allocation
page read and write
EEB000
unkown
page execute and read and write
5BFB000
trusted library allocation
page read and write
6052000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
6051000
trusted library allocation
page read and write
26B0000
direct allocation
page read and write
5C12000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5BF6000
trusted library allocation
page read and write
ECA000
unkown
page execute and read and write
60FA000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
61A7000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
14F5000
heap
page read and write
605A000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
884000
heap
page read and write
5E52000
trusted library allocation
page read and write
1459000
heap
page read and write
6058000
trusted library allocation
page read and write
6122000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
490B000
trusted library allocation
page execute and read and write
5BBC000
trusted library allocation
page read and write
613A000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
14E8000
heap
page read and write
2B0F000
stack
page read and write
5BEC000
trusted library allocation
page read and write
27CF000
stack
page read and write
5BFB000
trusted library allocation
page read and write
884000
heap
page read and write
71CE000
stack
page read and write
12A4000
heap
page read and write
5BB5000
trusted library allocation
page read and write
3E0E000
stack
page read and write
6059000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
5BEC000
trusted library allocation
page read and write
There are 891 hidden memdumps, click here to show them.