IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\5C18KRB735WCGR95JY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5C18KRB735WCGR95JY.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\5C18KRB735WCGR95JY.exe
"C:\Users\user~1\AppData\Local\Temp\5C18KRB735WCGR95JY.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api
188.114.96.3
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://necklacedmny.store/9
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://necklacedmny.store/)
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://necklacedmny.store:443/apil
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/api4
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://185.215.113.16/off/def.exee
unknown
https://necklacedmny.store/$$
unknown
http://crl.microsoftG
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.16/off/def.exee&
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/q
unknown
https://www.ecosia.org/newtab/
unknown
https://necklacedmny.store/apiN
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://necklacedmny.store:443/api.default-release/key4.dbPK
unknown
http://185.215.113.16/kK
unknown
http://185.215.113.16:80/off/def.exe
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://necklacedmny.store/I
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://necklacedmny.store/apit
unknown
http://185.215.113.16/off/def.exe
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
47E0000
direct allocation
page read and write
C8E000
stack
page read and write
7D5000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
790000
heap
page read and write
4640000
direct allocation
page read and write
5D3000
trusted library allocation
page read and write
7C6000
heap
page read and write
4E40000
remote allocation
page read and write
4351000
heap
page read and write
530D000
trusted library allocation
page read and write
5D9000
trusted library allocation
page read and write
564000
heap
page read and write
5318000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
7DD000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
7A2000
heap
page read and write
52F6000
trusted library allocation
page read and write
5D6000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
341E000
stack
page read and write
B29000
unkown
page write copy
5710000
trusted library allocation
page read and write
4651000
heap
page read and write
7C7000
heap
page read and write
719000
heap
page read and write
48F0000
direct allocation
page execute and read and write
E26000
unkown
page execute and read and write
531B000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
72B000
heap
page read and write
F26000
unkown
page execute and read and write
C92000
unkown
page execute and read and write
4960000
direct allocation
page execute and read and write
536F000
trusted library allocation
page read and write
419F000
stack
page read and write
75A000
heap
page read and write
5DC000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
3F5E000
stack
page read and write
75A000
heap
page read and write
7DA000
trusted library allocation
page read and write
737000
heap
page read and write
5D0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
7D1000
trusted library allocation
page read and write
7C5000
heap
page read and write
533A000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
7E1000
trusted library allocation
page read and write
4920000
heap
page read and write
8EC000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
47DC000
stack
page read and write
534B000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
6F9E000
stack
page read and write
7D1000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
EB4000
unkown
page execute and read and write
5360000
trusted library allocation
page read and write
47A0000
direct allocation
page read and write
8F5000
trusted library allocation
page read and write
78F000
heap
page read and write
5D9000
trusted library allocation
page read and write
5D9000
trusted library allocation
page read and write
541F000
trusted library allocation
page read and write
5DF000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
7BA000
heap
page read and write
4A40000
heap
page execute and read and write
737000
heap
page read and write
534B000
trusted library allocation
page read and write
5DD000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
5B64000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
EC5000
unkown
page execute and read and write
5705000
trusted library allocation
page read and write
8ED000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
7D8000
trusted library allocation
page read and write
EAE000
unkown
page execute and write copy
7D3000
trusted library allocation
page read and write
4783000
trusted library allocation
page execute and read and write
5D9000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
305E000
stack
page read and write
33DF000
stack
page read and write
734000
heap
page read and write
4340000
direct allocation
page read and write
5308000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
534F000
trusted library allocation
page read and write
7C0000
heap
page read and write
5363000
trusted library allocation
page read and write
5D8000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
7D7000
trusted library allocation
page read and write
7D5000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
E74000
unkown
page execute and read and write
530A000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
3DDF000
stack
page read and write
564000
heap
page read and write
5DA000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
4A50000
heap
page read and write
B2B000
unkown
page execute and write copy
7DE000
trusted library allocation
page read and write
7DC000
trusted library allocation
page read and write
E1D000
unkown
page execute and read and write
903000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
C9A000
unkown
page execute and write copy
25EF000
stack
page read and write
5308000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
8FF000
trusted library allocation
page read and write
DCF000
unkown
page execute and write copy
5341000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
DB5000
unkown
page execute and write copy
EBC000
unkown
page execute and read and write
C9A000
unkown
page execute and read and write
532E000
trusted library allocation
page read and write
5D7000
trusted library allocation
page read and write
7CD000
heap
page read and write
329F000
stack
page read and write
5D4000
trusted library allocation
page read and write
7DB000
trusted library allocation
page read and write
75C000
heap
page read and write
564A000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
F48000
unkown
page execute and write copy
5411000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
7DE000
trusted library allocation
page read and write
7AA000
heap
page read and write
5D3000
trusted library allocation
page read and write
7C1000
heap
page read and write
F2E000
unkown
page execute and write copy
564000
heap
page read and write
5700000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
737000
heap
page read and write
5D7000
trusted library allocation
page read and write
4351000
heap
page read and write
5315000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
7A6000
heap
page read and write
799000
heap
page read and write
52F1000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
4640000
direct allocation
page read and write
2DDE000
stack
page read and write
5D3000
trusted library allocation
page read and write
72B000
heap
page read and write
564000
heap
page read and write
5437000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
5DE000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
7D7000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
E72000
unkown
page execute and write copy
5D6000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
4C6C000
trusted library allocation
page read and write
7C6000
heap
page read and write
3B5F000
stack
page read and write
532E000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
7D6000
trusted library allocation
page read and write
4B6A000
trusted library allocation
page read and write
32DE000
stack
page read and write
918000
trusted library allocation
page read and write
5D2000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
E91000
unkown
page execute and read and write
734000
heap
page read and write
5322000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5322000
trusted library allocation
page read and write
266E000
stack
page read and write
532E000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
289F000
stack
page read and write
351F000
stack
page read and write
535B000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
5D8000
trusted library allocation
page read and write
E90000
unkown
page execute and write copy
564000
heap
page read and write
5408000
trusted library allocation
page read and write
2690000
heap
page read and write
72B000
heap
page read and write
4C6F000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
7C1000
heap
page read and write
5351000
trusted library allocation
page read and write
5DD000
trusted library allocation
page read and write
5D3000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
E96000
unkown
page execute and read and write
7D0000
trusted library allocation
page read and write
737000
heap
page read and write
5346000
trusted library allocation
page read and write
75A000
heap
page read and write
5711000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
6CFE000
stack
page read and write
E67000
unkown
page execute and read and write
4640000
direct allocation
page read and write
EC6000
unkown
page execute and write copy
533A000
trusted library allocation
page read and write
EDE000
unkown
page execute and write copy
7DC000
trusted library allocation
page read and write
48DF000
stack
page read and write
5D1000
trusted library allocation
page read and write
C96000
unkown
page write copy
8FF000
trusted library allocation
page read and write
52F3000
trusted library allocation
page read and write
7DE000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
5326000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
369E000
stack
page read and write
5400000
trusted library allocation
page read and write
7DD000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
5DC000
trusted library allocation
page read and write
28DE000
stack
page read and write
710000
heap
page read and write
7D1000
trusted library allocation
page read and write
5DB000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
564000
heap
page read and write
7DA000
trusted library allocation
page read and write
AD0000
unkown
page readonly
52F9000
trusted library allocation
page read and write
E1D000
unkown
page execute and write copy
530D000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
4784000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
4351000
heap
page read and write
564000
heap
page read and write
7D0000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
75A000
heap
page read and write
DDD000
unkown
page execute and write copy
48F0000
trusted library allocation
page read and write
5D4000
trusted library allocation
page read and write
734000
heap
page read and write
CB3000
unkown
page execute and write copy
7DF000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
7B5000
heap
page read and write
52F8000
trusted library allocation
page read and write
71A000
heap
page read and write
570F000
trusted library allocation
page read and write
8EA000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
4351000
heap
page read and write
535E000
trusted library allocation
page read and write
6C9D000
stack
page read and write
5708000
trusted library allocation
page read and write
7D6000
trusted library allocation
page read and write
5DB000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
F46000
unkown
page execute and write copy
5303000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
2D9F000
stack
page read and write
7BA000
heap
page read and write
5DE000
trusted library allocation
page read and write
91A000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
564000
heap
page read and write
7DD000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
7D6000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
5337000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
4794000
trusted library allocation
page read and write
E59000
unkown
page execute and write copy
7D4000
trusted library allocation
page read and write
F38000
unkown
page execute and write copy
4340000
direct allocation
page read and write
4351000
heap
page read and write
4960000
direct allocation
page execute and read and write
7B4000
heap
page read and write
4640000
direct allocation
page read and write
5409000
trusted library allocation
page read and write
5DB000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
564000
heap
page read and write
53F8000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
8E3000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
7D6000
trusted library allocation
page read and write
5D3000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
7DC000
trusted library allocation
page read and write
2B5E000
stack
page read and write
530E000
trusted library allocation
page read and write
2A1E000
stack
page read and write
4640000
direct allocation
page read and write
570D000
trusted library allocation
page read and write
EB0000
unkown
page execute and read and write
2697000
heap
page read and write
71E000
heap
page read and write
E28000
unkown
page execute and write copy
531F000
trusted library allocation
page read and write
4351000
heap
page read and write
5D7000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
E12000
unkown
page execute and read and write
5322000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
48FA000
trusted library allocation
page execute and read and write
4651000
heap
page read and write
5411000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
7DE000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
7E1000
trusted library allocation
page read and write
7D5000
trusted library allocation
page read and write
94E000
stack
page read and write
319E000
stack
page read and write
DC5000
unkown
page execute and write copy
4340000
direct allocation
page read and write
6E3E000
stack
page read and write
8F7000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
7C6000
heap
page read and write
7B6000
heap
page read and write
52F9000
trusted library allocation
page read and write
4351000
heap
page read and write
4651000
heap
page read and write
7DF000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
531C000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
4351000
heap
page read and write
52F7000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
539000
stack
page read and write
47A0000
direct allocation
page read and write
405F000
stack
page read and write
4351000
heap
page read and write
7DA000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
AD1000
unkown
page execute and write copy
7D3000
trusted library allocation
page read and write
5DB000
trusted library allocation
page read and write
7DE000
trusted library allocation
page read and write
EA4000
unkown
page execute and write copy
7D2000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
7BB000
heap
page read and write
8F3000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
564000
heap
page read and write
7A6000
heap
page read and write
7DD000
trusted library allocation
page read and write
7C5000
heap
page read and write
43C000
stack
page read and write
564000
heap
page read and write
5D5000
trusted library allocation
page read and write
7D5000
trusted library allocation
page read and write
7DC000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
7A9000
heap
page read and write
753000
heap
page read and write
4651000
heap
page read and write
E97000
unkown
page execute and write copy
5411000
trusted library allocation
page read and write
7D6000
trusted library allocation
page read and write
7D1000
trusted library allocation
page read and write
EE1000
unkown
page execute and read and write
42DF000
stack
page read and write
535E000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
7DF000
trusted library allocation
page read and write
901000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
7B5000
heap
page read and write
478D000
trusted library allocation
page execute and read and write
531F000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
3E1E000
stack
page read and write
7D1000
trusted library allocation
page read and write
49B9000
trusted library allocation
page read and write
71F000
heap
page read and write
7D2000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
ECE000
unkown
page execute and read and write
5762000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
7A1000
heap
page read and write
7D3000
trusted library allocation
page read and write
7C1000
heap
page read and write
530E000
trusted library allocation
page read and write
7B5000
heap
page read and write
5612000
trusted library allocation
page read and write
5D5000
trusted library allocation
page read and write
4B5F000
stack
page read and write
901000
trusted library allocation
page read and write
E58000
unkown
page execute and read and write
5411000
trusted library allocation
page read and write
790000
heap
page read and write
52F6000
trusted library allocation
page read and write
7BC000
heap
page read and write
791000
heap
page read and write
4340000
direct allocation
page read and write
569A000
trusted library allocation
page read and write
5D7000
trusted library allocation
page read and write
5B85000
trusted library allocation
page read and write
75A000
heap
page read and write
4907000
trusted library allocation
page execute and read and write
56C2000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
E29000
unkown
page execute and read and write
5333000
trusted library allocation
page read and write
29DF000
stack
page read and write
5D5000
trusted library allocation
page read and write
6E50000
heap
page execute and read and write
536A000
trusted library allocation
page read and write
F46000
unkown
page execute and read and write
4660000
heap
page read and write
A4E000
stack
page read and write
7B5000
heap
page read and write
4340000
direct allocation
page read and write
5363000
trusted library allocation
page read and write
7DD000
trusted library allocation
page read and write
5D9000
trusted library allocation
page read and write
737000
heap
page read and write
7DF000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
315F000
stack
page read and write
E25000
unkown
page execute and write copy
4620000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
564000
heap
page read and write
279F000
stack
page read and write
531F000
trusted library allocation
page read and write
7CA000
heap
page read and write
7CA000
heap
page read and write
7DC000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
7DC000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
5D1000
trusted library allocation
page read and write
8E1000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
5359000
trusted library allocation
page read and write
7C6000
heap
page read and write
4640000
direct allocation
page read and write
5704000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
72B000
heap
page read and write
532E000
trusted library allocation
page read and write
5DF000
trusted library allocation
page read and write
5DB000
trusted library allocation
page read and write
38DF000
stack
page read and write
5D7000
trusted library allocation
page read and write
2C5F000
stack
page read and write
4E40000
remote allocation
page read and write
564000
heap
page read and write
564000
heap
page read and write
2F1E000
stack
page read and write
5400000
trusted library allocation
page read and write
4651000
heap
page read and write
53F1000
trusted library allocation
page read and write
7D8000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
7C9000
heap
page read and write
7CE000
heap
page read and write
564000
heap
page read and write
6CC0000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
F48000
unkown
page execute and write copy
541F000
trusted library allocation
page read and write
5305000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
90D000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
E88000
unkown
page execute and read and write
7E0000
trusted library allocation
page read and write
77E000
heap
page read and write
4960000
direct allocation
page execute and read and write
5349000
trusted library allocation
page read and write
4640000
direct allocation
page read and write
5429000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
7D9000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
564000
heap
page read and write
4351000
heap
page read and write
365F000
stack
page read and write
4790000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
E87000
unkown
page execute and write copy
788000
heap
page read and write
5DA000
trusted library allocation
page read and write
6B9C000
stack
page read and write
540A000
trusted library allocation
page read and write
2C9E000
stack
page read and write
5304000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
562A000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
7DC000
trusted library allocation
page read and write
7BB000
heap
page read and write
77C000
heap
page read and write
4940000
direct allocation
page execute and read and write
7DF000
trusted library allocation
page read and write
5DB000
trusted library allocation
page read and write
E04000
unkown
page execute and write copy
4640000
direct allocation
page read and write
262C000
stack
page read and write
7A9000
heap
page read and write
543D000
trusted library allocation
page read and write
7A6000
heap
page read and write
53F8000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
8EB000
trusted library allocation
page read and write
5D3000
trusted library allocation
page read and write
7DB000
trusted library allocation
page read and write
4351000
heap
page read and write
490B000
trusted library allocation
page execute and read and write
5D1000
trusted library allocation
page read and write
4351000
heap
page read and write
7A6000
heap
page read and write
5322000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
7DA000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
534C000
trusted library allocation
page read and write
409E000
stack
page read and write
53F1000
trusted library allocation
page read and write
E53000
unkown
page execute and write copy
5408000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
E9D000
unkown
page execute and read and write
8EF000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
773000
heap
page read and write
5D1000
trusted library allocation
page read and write
355E000
stack
page read and write
37DE000
stack
page read and write
534C000
trusted library allocation
page read and write
560000
heap
page read and write
564000
heap
page read and write
590000
heap
page read and write
4B61000
trusted library allocation
page read and write
8F1000
trusted library allocation
page read and write
5DE000
trusted library allocation
page read and write
56CA000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
5D6000
trusted library allocation
page read and write
7DC000
trusted library allocation
page read and write
3CDE000
stack
page read and write
4960000
direct allocation
page execute and read and write
5400000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
C96000
unkown
page write copy
5369000
trusted library allocation
page read and write
7A9000
heap
page read and write
6CB0000
trusted library allocation
page read and write
564000
heap
page read and write
7D0000
trusted library allocation
page read and write
CA6000
unkown
page execute and write copy
564000
heap
page read and write
564000
heap
page read and write
7DA000
trusted library allocation
page read and write
90F000
stack
page read and write
570F000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
564000
heap
page read and write
5400000
trusted library allocation
page read and write
783000
heap
page read and write
8F5000
trusted library allocation
page read and write
EB1000
unkown
page execute and write copy
53F3000
trusted library allocation
page read and write
EB5000
unkown
page execute and write copy
5411000
trusted library allocation
page read and write
7DE000
trusted library allocation
page read and write
90A000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
7DE000
trusted library allocation
page read and write
7C5000
heap
page read and write
5303000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
533E000
trusted library allocation
page read and write
8F1000
trusted library allocation
page read and write
7C3000
heap
page read and write
4340000
direct allocation
page read and write
7D0000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
301F000
stack
page read and write
533A000
trusted library allocation
page read and write
5D8000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
3A5E000
stack
page read and write
791000
heap
page read and write
771000
heap
page read and write
5321000
trusted library allocation
page read and write
7DB000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
EC4000
unkown
page execute and write copy
5321000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
670000
heap
page read and write
E92000
unkown
page execute and write copy
533A000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
3B9E000
stack
page read and write
5308000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
7C7000
heap
page read and write
5419000
trusted library allocation
page read and write
4351000
heap
page read and write
5321000
trusted library allocation
page read and write
3C9F000
stack
page read and write
5306000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
7D8000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
6F5F000
stack
page read and write
5411000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
755000
heap
page read and write
4960000
direct allocation
page execute and read and write
5AF1000
trusted library allocation
page read and write
90B000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
4950000
direct allocation
page execute and read and write
7C3000
heap
page read and write
5DE000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
7A9000
heap
page read and write
5371000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
6DD000
stack
page read and write
5D9000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
7E1000
trusted library allocation
page read and write
532C000
trusted library allocation
page read and write
7BA000
heap
page read and write
E3A000
unkown
page execute and read and write
901000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
4C86000
trusted library allocation
page read and write
4930000
direct allocation
page execute and read and write
5372000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
7DB000
trusted library allocation
page read and write
709F000
stack
page read and write
570B000
trusted library allocation
page read and write
7A9000
heap
page read and write
7D8000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
7DE000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
700000
heap
page read and write
2EDF000
stack
page read and write
7D6000
trusted library allocation
page read and write
5E1000
trusted library allocation
page read and write
4351000
heap
page read and write
5702000
trusted library allocation
page read and write
55F9000
trusted library allocation
page read and write
497E000
stack
page read and write
7B2000
heap
page read and write
7BC000
heap
page read and write
542C000
trusted library allocation
page read and write
737000
heap
page read and write
8EF000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
C90000
unkown
page read and write
E02000
unkown
page execute and read and write
5435000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
7D6000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
DB8000
unkown
page execute and write copy
3A1E000
stack
page read and write
7C1000
heap
page read and write
7D6000
trusted library allocation
page read and write
7A9000
heap
page read and write
5D4000
trusted library allocation
page read and write
5DA000
trusted library allocation
page read and write
7B9000
heap
page read and write
790000
heap
page read and write
765000
heap
page read and write
7DC000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
7D7000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
379F000
stack
page read and write
4351000
heap
page read and write
72B000
heap
page read and write
5328000
trusted library allocation
page read and write
5D8000
trusted library allocation
page read and write
4C7C000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
90C000
trusted library allocation
page read and write
F38000
unkown
page execute and write copy
5D8000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
7D5000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
78F000
heap
page read and write
5DD000
trusted library allocation
page read and write
4A20000
heap
page read and write
5359000
trusted library allocation
page read and write
5335000
trusted library allocation
page read and write
4651000
heap
page read and write
E36000
unkown
page execute and write copy
734000
heap
page read and write
5D2000
trusted library allocation
page read and write
EA6000
unkown
page execute and read and write
7D5000
trusted library allocation
page read and write
7D2000
trusted library allocation
page read and write
6DFF000
stack
page read and write
5361000
trusted library allocation
page read and write
7B4000
heap
page read and write
C92000
unkown
page execute and write copy
4C93000
trusted library allocation
page read and write
41DE000
stack
page read and write
532E000
trusted library allocation
page read and write
47A0000
direct allocation
page read and write
4640000
direct allocation
page read and write
5368000
trusted library allocation
page read and write
734000
heap
page read and write
5411000
trusted library allocation
page read and write
4351000
heap
page read and write
5D2000
trusted library allocation
page read and write
4930000
direct allocation
page execute and read and write
7D9000
trusted library allocation
page read and write
7D9000
trusted library allocation
page read and write
C90000
unkown
page readonly
5363000
trusted library allocation
page read and write
391E000
stack
page read and write
4650000
heap
page read and write
F25000
unkown
page execute and write copy
531A000
trusted library allocation
page read and write
734000
heap
page read and write
7B2000
heap
page read and write
5D6000
trusted library allocation
page read and write
7BC000
heap
page read and write
52F8000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
4340000
direct allocation
page read and write
5D4000
trusted library allocation
page read and write
7C6000
heap
page read and write
5D5000
trusted library allocation
page read and write
7C6000
heap
page read and write
4351000
heap
page read and write
5308000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
3F1F000
stack
page read and write
52F6000
trusted library allocation
page read and write
75A000
heap
page read and write
7D4000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
7A9000
heap
page read and write
7CD000
heap
page read and write
2B1F000
stack
page read and write
5702000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
4960000
direct allocation
page execute and read and write
5333000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
7D3000
trusted library allocation
page read and write
There are 823 hidden memdumps, click here to show them.