IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\T4SWNFFH9VCKTA3D54ZZ0K.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\T4SWNFFH9VCKTA3D54ZZ0K.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\T4SWNFFH9VCKTA3D54ZZ0K.exe
"C:\Users\user\AppData\Local\Temp\T4SWNFFH9VCKTA3D54ZZ0K.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.97.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://185.215.113.16/off/def.exeS
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.215.113.16/off/def.exeI
unknown
http://185.215.113.16/off/def.exeA4T:
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/~dJ
unknown
https://necklacedmny.store/api-
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://185.215.113.16/off/def.exe&nT
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://185.215.113.16/off/def.exee
unknown
https://necklacedmny.store:443/api
unknown
http://185.215.113.16/k
unknown
https://necklacedmny.store/apiE
unknown
https://necklacedmny.store:443/apiK
unknown
http://185.215.113.16/off/def.exeeXn
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/apiA4T:
unknown
http://185.215.113.16:80/off/def.exeYw
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://necklacedmny.store/apiV
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://necklacedmny.store/apia
unknown
http://185.215.113.16/lg;
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://necklacedmny.store/apim
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store/0914k
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
191000
unkown
page execute and read and write
malicious
5468000
trusted library allocation
page read and write
543F000
trusted library allocation
page read and write
2770000
direct allocation
page read and write
544C000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
ABC000
heap
page read and write
5438000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
4FAE000
stack
page read and write
5441000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
4A60000
direct allocation
page execute and read and write
664000
heap
page read and write
54B9000
trusted library allocation
page read and write
4471000
heap
page read and write
59EB000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5C6E000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
2770000
direct allocation
page read and write
553B000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
40AF000
stack
page read and write
5E0000
heap
page read and write
5ACF000
trusted library allocation
page read and write
3D4000
unkown
page execute and write copy
546B000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
407000
unkown
page execute and read and write
2770000
direct allocation
page read and write
8EC000
unkown
page execute and read and write
54E8000
trusted library allocation
page read and write
3D1E000
stack
page read and write
545F000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
48B0000
heap
page read and write
5478000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
276F000
stack
page read and write
5478000
trusted library allocation
page read and write
6E2000
unkown
page execute and read and write
5458000
trusted library allocation
page read and write
30AE000
stack
page read and write
5478000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
ABA000
heap
page read and write
5468000
trusted library allocation
page read and write
561A000
trusted library allocation
page read and write
B0E000
stack
page read and write
5488000
trusted library allocation
page read and write
5C16000
trusted library allocation
page read and write
2790000
direct allocation
page read and write
377000
unkown
page execute and read and write
5A84000
trusted library allocation
page read and write
C0F000
stack
page read and write
59E4000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
AC7000
heap
page read and write
59E9000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
41DF000
stack
page read and write
543A000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
5478000
trusted library allocation
page read and write
305F000
stack
page read and write
91F000
unkown
page execute and read and write
59E2000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
2F1F000
stack
page read and write
5468000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
889000
unkown
page execute and write copy
59E3000
trusted library allocation
page read and write
4D2D000
stack
page read and write
5B15000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
381E000
stack
page read and write
59E5000
trusted library allocation
page read and write
AB2000
heap
page read and write
664000
heap
page read and write
48E0000
remote allocation
page read and write
5AEA000
trusted library allocation
page read and write
4B97000
trusted library allocation
page execute and read and write
4ABC000
trusted library allocation
page read and write
888000
unkown
page execute and read and write
CB0000
heap
page read and write
5478000
trusted library allocation
page read and write
4482000
heap
page read and write
3D3000
unkown
page execute and read and write
901000
unkown
page execute and write copy
543E000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
4AC000
stack
page read and write
544D000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
4A6B000
stack
page read and write
449E000
stack
page read and write
59EE000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
430000
unkown
page execute and read and write
5B91000
trusted library allocation
page read and write
5A9000
stack
page read and write
4471000
heap
page read and write
292E000
stack
page read and write
59E3000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
5E4000
heap
page read and write
543B000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
664000
heap
page read and write
54A7000
trusted library allocation
page read and write
992000
unkown
page execute and write copy
864000
unkown
page execute and read and write
4B80000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
47D000
unkown
page execute and write copy
4C4C000
stack
page read and write
59E1000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
374000
unkown
page execute and write copy
2800000
direct allocation
page read and write
27FB000
stack
page read and write
5F0000
heap
page read and write
2800000
direct allocation
page read and write
57E2000
trusted library allocation
page read and write
5DB4000
trusted library allocation
page read and write
2817000
heap
page read and write
9DA000
heap
page read and write
5B21000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
59E7000
trusted library allocation
page read and write
4D76000
trusted library allocation
page read and write
AB1000
heap
page read and write
544E000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
5E4000
heap
page read and write
494000
unkown
page execute and write copy
543A000
trusted library allocation
page read and write
5E4000
heap
page read and write
5478000
trusted library allocation
page read and write
5E4000
heap
page read and write
907000
unkown
page execute and read and write
5460000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
5B1F000
trusted library allocation
page read and write
59E4000
trusted library allocation
page read and write
900000
unkown
page execute and read and write
5541000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
9DE000
heap
page read and write
5478000
trusted library allocation
page read and write
ACB000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
5467000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
446F000
stack
page read and write
3E8000
unkown
page execute and read and write
3B9F000
stack
page read and write
885000
unkown
page execute and write copy
38B000
unkown
page execute and read and write
5A9B000
trusted library allocation
page read and write
48E0000
heap
page read and write
2CEE000
stack
page read and write
5C40000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
5B1F000
trusted library allocation
page read and write
992000
unkown
page execute and read and write
5468000
trusted library allocation
page read and write
4471000
heap
page read and write
36DE000
stack
page read and write
59E8000
trusted library allocation
page read and write
C93000
heap
page read and write
5C95000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
2F5E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
8C3000
unkown
page execute and read and write
5C57000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
ABB000
heap
page read and write
49E0000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
31EE000
stack
page read and write
441000
unkown
page execute and write copy
5434000
trusted library allocation
page read and write
3E5E000
stack
page read and write
5536000
trusted library allocation
page read and write
4B9B000
trusted library allocation
page execute and read and write
2800000
direct allocation
page read and write
59E6000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
121E000
stack
page read and write
5478000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
A36000
heap
page read and write
59E2000
trusted library allocation
page read and write
4A13000
trusted library allocation
page execute and read and write
887000
unkown
page execute and write copy
8E6000
unkown
page execute and read and write
59EE000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
40EE000
stack
page read and write
664000
heap
page read and write
4A30000
direct allocation
page read and write
5478000
trusted library allocation
page read and write
8C4000
unkown
page execute and write copy
546A000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
E8E000
stack
page read and write
3D2E000
stack
page read and write
5ACB000
trusted library allocation
page read and write
48E1000
heap
page read and write
5490000
trusted library allocation
page read and write
664000
heap
page read and write
5458000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
3B5000
unkown
page execute and read and write
59E7000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
2B6F000
stack
page read and write
543C000
trusted library allocation
page read and write
4D7F000
stack
page read and write
3F5F000
stack
page read and write
8A4000
unkown
page execute and read and write
AC5000
heap
page read and write
ABA000
heap
page read and write
4B80000
direct allocation
page execute and read and write
4471000
heap
page read and write
5453000
trusted library allocation
page read and write
48E0000
remote allocation
page read and write
664000
heap
page read and write
AB6000
heap
page read and write
4A80000
direct allocation
page execute and read and write
59EE000
trusted library allocation
page read and write
5572000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
4A1D000
trusted library allocation
page execute and read and write
5532000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
90F000
unkown
page execute and write copy
543C000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
AB1000
heap
page read and write
5499000
trusted library allocation
page read and write
6F6000
unkown
page execute and write copy
6E6000
unkown
page write copy
5AE0000
trusted library allocation
page read and write
46C000
unkown
page execute and write copy
8CD000
unkown
page execute and read and write
5B5D000
trusted library allocation
page read and write
721E000
stack
page read and write
4471000
heap
page read and write
5468000
trusted library allocation
page read and write
AB6000
heap
page read and write
5E4000
heap
page read and write
56AA000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
AC8000
heap
page read and write
5459000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
493000
unkown
page execute and write copy
32EF000
stack
page read and write
543E000
trusted library allocation
page read and write
521F000
stack
page read and write
5461000
trusted library allocation
page read and write
5B8F000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
913000
unkown
page execute and read and write
545A000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
3FD000
unkown
page execute and read and write
664000
heap
page read and write
435E000
stack
page read and write
59EC000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
3F2000
unkown
page execute and read and write
4A30000
direct allocation
page read and write
93C000
unkown
page execute and write copy
3A2000
unkown
page execute and read and write
5B0D000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
395E000
stack
page read and write
47C000
unkown
page execute and read and write
4A60000
direct allocation
page execute and read and write
59E9000
trusted library allocation
page read and write
48E1000
heap
page read and write
ABE000
heap
page read and write
4BB0000
trusted library allocation
page read and write
C50000
heap
page read and write
191000
unkown
page execute and write copy
5BB8000
trusted library allocation
page read and write
664000
heap
page read and write
436E000
stack
page read and write
544C000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
620000
heap
page read and write
5478000
trusted library allocation
page read and write
359E000
stack
page read and write
8C2000
unkown
page execute and write copy
5496000
trusted library allocation
page read and write
9D0000
heap
page read and write
5AFD000
trusted library allocation
page read and write
31AF000
stack
page read and write
32DF000
stack
page read and write
59E1000
trusted library allocation
page read and write
AB2000
heap
page read and write
6AE000
stack
page read and write
5449000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
2E1E000
stack
page read and write
AB2000
heap
page read and write
A3C000
heap
page read and write
5E4000
heap
page read and write
5449000
trusted library allocation
page read and write
5453000
trusted library allocation
page read and write
37A000
unkown
page execute and write copy
5458000
trusted library allocation
page read and write
A52000
heap
page read and write
8AB000
unkown
page execute and write copy
5478000
trusted library allocation
page read and write
2770000
direct allocation
page read and write
544D000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
AC8000
heap
page read and write
5478000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
AA6000
heap
page read and write
36AF000
stack
page read and write
5ADF000
trusted library allocation
page read and write
3DF000
unkown
page execute and read and write
A26000
heap
page read and write
D4E000
stack
page read and write
5488000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
AA4000
heap
page read and write
5E4000
heap
page read and write
59E2000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
3A6F000
stack
page read and write
414000
unkown
page execute and read and write
994000
unkown
page execute and write copy
70DF000
stack
page read and write
5478000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
59E6000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
5468000
trusted library allocation
page read and write
459F000
stack
page read and write
5468000
trusted library allocation
page read and write
545C000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5B74000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
8E7000
unkown
page execute and write copy
3E2F000
stack
page read and write
ABB000
heap
page read and write
6F4D000
stack
page read and write
546E000
trusted library allocation
page read and write
AB1000
heap
page read and write
8FA000
stack
page read and write
2770000
direct allocation
page read and write
5480000
trusted library allocation
page read and write
389000
unkown
page execute and read and write
88C000
unkown
page execute and read and write
8A1000
unkown
page execute and write copy
445F000
stack
page read and write
5AB6000
trusted library allocation
page read and write
5E4000
heap
page read and write
547C000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
3CDE000
stack
page read and write
2770000
direct allocation
page read and write
8C6000
unkown
page execute and read and write
5442000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
355F000
stack
page read and write
5468000
trusted library allocation
page read and write
35AE000
stack
page read and write
543C000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
46E000
unkown
page execute and write copy
5AD5000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
984000
unkown
page execute and write copy
5435000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
31DE000
stack
page read and write
2800000
direct allocation
page read and write
422E000
stack
page read and write
54AF000
trusted library allocation
page read and write
6EA000
unkown
page execute and write copy
54B0000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
392F000
stack
page read and write
5A91000
trusted library allocation
page read and write
ABB000
heap
page read and write
5468000
trusted library allocation
page read and write
AB0000
heap
page read and write
D8E000
stack
page read and write
2F6E000
stack
page read and write
2800000
direct allocation
page read and write
5478000
trusted library allocation
page read and write
3A0000
unkown
page execute and write copy
4B90000
trusted library allocation
page read and write
886000
unkown
page execute and read and write
5A8F000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
5E4000
heap
page read and write
2770000
direct allocation
page read and write
3D1000
unkown
page execute and write copy
27A7000
heap
page read and write
5431000
trusted library allocation
page read and write
2790000
direct allocation
page read and write
AB1000
heap
page read and write
5E4000
heap
page read and write
544D000
trusted library allocation
page read and write
366000
unkown
page execute and write copy
511E000
stack
page read and write
59EB000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
59EF000
trusted library allocation
page read and write
431F000
stack
page read and write
59E3000
trusted library allocation
page read and write
492C000
stack
page read and write
C5A000
heap
page read and write
3E1000
unkown
page execute and write copy
5AFF000
trusted library allocation
page read and write
5E4000
heap
page read and write
5489000
trusted library allocation
page read and write
410000
unkown
page execute and write copy
5AC4000
trusted library allocation
page read and write
543F000
trusted library allocation
page read and write
5E4000
heap
page read and write
5454000
trusted library allocation
page read and write
4BAE000
stack
page read and write
AA2000
heap
page read and write
5468000
trusted library allocation
page read and write
2770000
direct allocation
page read and write
5B23000
trusted library allocation
page read and write
664000
heap
page read and write
8D8000
unkown
page execute and read and write
5458000
trusted library allocation
page read and write
3E1F000
stack
page read and write
543B000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
396E000
stack
page read and write
6E6000
unkown
page write copy
4C50000
trusted library allocation
page execute and read and write
5458000
trusted library allocation
page read and write
2A1F000
stack
page read and write
A3B000
heap
page read and write
5467000
trusted library allocation
page read and write
1F7000
unkown
page execute and write copy
AA6000
heap
page read and write
984000
unkown
page execute and write copy
AC5000
heap
page read and write
5441000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
AB1000
heap
page read and write
5467000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
4470000
heap
page read and write
5478000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
ABF000
heap
page read and write
3EF000
unkown
page execute and write copy
59E4000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
AB6000
heap
page read and write
342F000
stack
page read and write
549F000
trusted library allocation
page read and write
AB6000
heap
page read and write
548F000
trusted library allocation
page read and write
379000
unkown
page execute and read and write
93F000
unkown
page execute and read and write
AA5000
heap
page read and write
5481000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
2C9F000
stack
page read and write
5457000
trusted library allocation
page read and write
404000
unkown
page execute and write copy
AB6000
heap
page read and write
660000
heap
page read and write
5E4000
heap
page read and write
6E0000
unkown
page readonly
59EA000
trusted library allocation
page read and write
ACC000
heap
page read and write
4A00000
trusted library allocation
page read and write
2A2F000
stack
page read and write
5441000
trusted library allocation
page read and write
50AD000
stack
page read and write
5467000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
91B000
unkown
page execute and write copy
56E3000
trusted library allocation
page read and write
37B000
unkown
page execute and read and write
5E4000
heap
page read and write
59F0000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
4A6D000
stack
page read and write
664000
heap
page read and write
4A50000
direct allocation
page execute and read and write
5490000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
A52000
heap
page read and write
3F3000
unkown
page execute and write copy
59E3000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
A15000
heap
page read and write
3F6000
unkown
page execute and write copy
5AFF000
trusted library allocation
page read and write
6EA000
unkown
page execute and read and write
851000
unkown
page execute and write copy
54C8000
trusted library allocation
page read and write
C3E000
stack
page read and write
5478000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
610000
heap
page read and write
8FF000
unkown
page execute and write copy
AC8000
heap
page read and write
2A6E000
stack
page read and write
59E4000
trusted library allocation
page read and write
664000
heap
page read and write
5B5F000
trusted library allocation
page read and write
4D68000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
CA3000
heap
page read and write
5442000
trusted library allocation
page read and write
664000
heap
page read and write
5448000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
36EE000
stack
page read and write
54B7000
trusted library allocation
page read and write
4471000
heap
page read and write
2770000
direct allocation
page read and write
41EF000
stack
page read and write
59E4000
trusted library allocation
page read and write
4471000
heap
page read and write
543C000
trusted library allocation
page read and write
664000
heap
page read and write
5453000
trusted library allocation
page read and write
319F000
stack
page read and write
48E0000
remote allocation
page read and write
59ED000
trusted library allocation
page read and write
3A9E000
stack
page read and write
59EC000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
6E0000
unkown
page read and write
59EC000
trusted library allocation
page read and write
5B27000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
4D8C000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
4471000
heap
page read and write
44D000
unkown
page execute and read and write
54AF000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
5453000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
6FD0000
heap
page execute and read and write
664000
heap
page read and write
731F000
stack
page read and write
59EA000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5320000
heap
page read and write
544D000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
2CAF000
stack
page read and write
5B70000
trusted library allocation
page read and write
266E000
stack
page read and write
A3B000
heap
page read and write
2770000
direct allocation
page read and write
5464000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
3F5000
unkown
page execute and read and write
5457000
trusted library allocation
page read and write
28EF000
stack
page read and write
356F000
stack
page read and write
590000
heap
page read and write
664000
heap
page read and write
AC0000
heap
page read and write
5B17000
trusted library allocation
page read and write
332E000
stack
page read and write
421E000
stack
page read and write
9DD000
stack
page read and write
2810000
heap
page read and write
F1F000
stack
page read and write
547F000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
432F000
stack
page read and write
59E4000
trusted library allocation
page read and write
5E4000
heap
page read and write
5431000
trusted library allocation
page read and write
5B8F000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
4C0E000
stack
page read and write
664000
heap
page read and write
543D000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
341F000
stack
page read and write
59E6000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
54A7000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
27AC000
heap
page read and write
34B000
unkown
page execute and read and write
27EB000
stack
page read and write
8B7000
unkown
page execute and read and write
5E4000
heap
page read and write
5A8F000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
8CA000
unkown
page execute and write copy
5441000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
3F6F000
stack
page read and write
5466000
trusted library allocation
page read and write
1F6000
unkown
page execute and read and write
59E6000
trusted library allocation
page read and write
4B6F000
stack
page read and write
5C3E000
trusted library allocation
page read and write
580000
heap
page read and write
59EA000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5E4000
heap
page read and write
5457000
trusted library allocation
page read and write
372000
unkown
page execute and write copy
4C70000
heap
page read and write
5AB3000
trusted library allocation
page read and write
6F8E000
stack
page read and write
3FAE000
stack
page read and write
5A9D000
trusted library allocation
page read and write
5E4000
heap
page read and write
5B4D000
trusted library allocation
page read and write
A09000
heap
page read and write
59EE000
trusted library allocation
page read and write
34D000
unkown
page execute and write copy
391F000
stack
page read and write
5468000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
8E0000
unkown
page execute and write copy
59EB000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
345E000
stack
page read and write
2770000
direct allocation
page read and write
ABA000
heap
page read and write
54F2000
trusted library allocation
page read and write
4BC0000
heap
page read and write
2800000
direct allocation
page read and write
5467000
trusted library allocation
page read and write
59E8000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
2B5F000
stack
page read and write
38A000
unkown
page execute and write copy
5438000
trusted library allocation
page read and write
1F5000
unkown
page execute and write copy
42E000
unkown
page execute and write copy
4DA0000
heap
page execute and read and write
54B0000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
364000
unkown
page execute and read and write
59EB000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
4CED000
stack
page read and write
542F000
stack
page read and write
ABA000
heap
page read and write
5AA2000
trusted library allocation
page read and write
5A9E000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
385000
unkown
page execute and write copy
5447000
trusted library allocation
page read and write
C9B000
heap
page read and write
5472000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
57DE000
stack
page read and write
2A5E000
stack
page read and write
372000
unkown
page execute and read and write
5A9D000
trusted library allocation
page read and write
37DF000
stack
page read and write
2E2E000
stack
page read and write
4471000
heap
page read and write
59E3000
trusted library allocation
page read and write
5A89000
trusted library allocation
page read and write
1EB000
unkown
page execute and write copy
486000
unkown
page execute and write copy
5BD5000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
664000
heap
page read and write
5442000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
3A4000
unkown
page execute and write copy
59E1000
trusted library allocation
page read and write
527E000
stack
page read and write
5478000
trusted library allocation
page read and write
52B000
stack
page read and write
ACC000
heap
page read and write
442000
unkown
page execute and read and write
6FCE000
stack
page read and write
4D80000
heap
page read and write
369F000
stack
page read and write
5441000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
AB1000
heap
page read and write
5496000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
3E6E000
stack
page read and write
5B20000
trusted library allocation
page read and write
3A5F000
stack
page read and write
5485000
trusted library allocation
page read and write
4E6E000
stack
page read and write
544C000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
547A000
trusted library allocation
page read and write
664000
heap
page read and write
A52000
heap
page read and write
5478000
trusted library allocation
page read and write
3BAF000
stack
page read and write
C5E000
heap
page read and write
59E2000
trusted library allocation
page read and write
190000
unkown
page read and write
664000
heap
page read and write
5457000
trusted library allocation
page read and write
3BEE000
stack
page read and write
5438000
trusted library allocation
page read and write
2B9E000
stack
page read and write
1EB000
unkown
page execute and write copy
5E4000
heap
page read and write
5C14000
trusted library allocation
page read and write
A9C000
heap
page read and write
5457000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
AC9000
heap
page read and write
2770000
direct allocation
page read and write
5530000
trusted library allocation
page read and write
8E2000
unkown
page execute and write copy
544B000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
4B8A000
trusted library allocation
page execute and read and write
A1F000
heap
page read and write
378000
unkown
page execute and write copy
3AAD000
stack
page read and write
5467000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
5E4000
heap
page read and write
5478000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
664000
heap
page read and write
2770000
direct allocation
page read and write
5458000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
190000
unkown
page readonly
5449000
trusted library allocation
page read and write
C91000
heap
page read and write
4A24000
trusted library allocation
page read and write
4A70000
direct allocation
page execute and read and write
59E4000
trusted library allocation
page read and write
664000
heap
page read and write
5AA0000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
A33000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
2DDF000
stack
page read and write
544B000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
48F0000
direct allocation
page read and write
5478000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
664000
heap
page read and write
27A0000
heap
page read and write
367000
unkown
page execute and read and write
86F000
unkown
page execute and read and write
5534000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
306F000
stack
page read and write
4A60000
direct allocation
page execute and read and write
1EB000
unkown
page execute and read and write
5A86000
trusted library allocation
page read and write
2DEF000
stack
page read and write
54E9000
trusted library allocation
page read and write
8E1000
unkown
page execute and read and write
5438000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
ACB000
heap
page read and write
59E1000
trusted library allocation
page read and write
309E000
stack
page read and write
546B000
trusted library allocation
page read and write
97B000
unkown
page execute and write copy
57E0000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
48F2000
heap
page read and write
5470000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
71DE000
stack
page read and write
59E0000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
3BDE000
stack
page read and write
409F000
stack
page read and write
4BEE000
stack
page read and write
4A2F000
stack
page read and write
AC5000
heap
page read and write
2800000
direct allocation
page read and write
994000
unkown
page execute and write copy
543F000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
9F0000
direct allocation
page read and write
5468000
trusted library allocation
page read and write
2BAE000
stack
page read and write
549A000
trusted library allocation
page read and write
C4E000
stack
page read and write
5A91000
trusted library allocation
page read and write
5E4000
heap
page read and write
6E2000
unkown
page execute and write copy
84F000
unkown
page execute and read and write
5478000
trusted library allocation
page read and write
8C9000
unkown
page execute and read and write
544F000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
2F2F000
stack
page read and write
6C0000
heap
page read and write
4C6C000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
52EE000
stack
page read and write
5E4000
heap
page read and write
5490000
trusted library allocation
page read and write
3F9E000
stack
page read and write
486000
unkown
page execute and write copy
5478000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
382E000
stack
page read and write
544C000
trusted library allocation
page read and write
5BD3000
trusted library allocation
page read and write
4E2F000
stack
page read and write
86F000
unkown
page execute and write copy
59E1000
trusted library allocation
page read and write
5E4000
heap
page read and write
40DE000
stack
page read and write
AC0000
heap
page read and write
2CDE000
stack
page read and write
8C7000
unkown
page execute and write copy
A9C000
heap
page read and write
AA6000
heap
page read and write
5B2B000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
59E3000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
ABA000
heap
page read and write
5492000
trusted library allocation
page read and write
331E000
stack
page read and write
5468000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
2770000
direct allocation
page read and write
664000
heap
page read and write
5E4000
heap
page read and write
5468000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
5E4000
heap
page read and write
4F6F000
stack
page read and write
A9E000
heap
page read and write
5453000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
5ACD000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
8D6000
unkown
page execute and write copy
3CEF000
stack
page read and write
59E0000
trusted library allocation
page read and write
47C000
unkown
page execute and write copy
37EF000
stack
page read and write
291F000
stack
page read and write
4D66000
trusted library allocation
page read and write
59E4000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
ACB000
heap
page read and write
59E7000
trusted library allocation
page read and write
346E000
stack
page read and write
There are 999 hidden memdumps, click here to show them.