IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\EWN95FMNMHNBM2QR4BGAAUIG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EWN95FMNMHNBM2QR4BGAAUIG.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\EWN95FMNMHNBM2QR4BGAAUIG.exe
"C:\Users\user\AppData\Local\Temp\EWN95FMNMHNBM2QR4BGAAUIG.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://crisiwarny.store/a
unknown
http://185.215.113.16/off/def.exec
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/off/def.exe_
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://crisiwarny.store/O
unknown
http://185.215.113.16/off/def.exefa
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://crisiwarny.store/L
unknown
https://crisiwarny.store/~
unknown
https://crisiwarny.store:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/n
unknown
http://185.215.113.16/r
unknown
http://185.215.113.16/off/def.exem
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://crisiwarny.store/s
unknown
http://185.215.113.16/k
unknown
https://crisiwarny.store/t
unknown
https://crisiwarny.store/apiCC
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://crisiwarny.store//
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
DD1000
unkown
page execute and read and write
malicious
4721000
heap
page read and write
49E4000
trusted library allocation
page read and write
804000
heap
page read and write
1012000
unkown
page execute and write copy
326E000
stack
page read and write
DA0000
heap
page read and write
CB4000
heap
page read and write
6191000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
1585000
heap
page read and write
5D27000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
118E000
stack
page read and write
1082000
unkown
page execute and write copy
60A1000
trusted library allocation
page read and write
4730000
heap
page read and write
103B000
unkown
page execute and read and write
5DBC000
trusted library allocation
page read and write
53DE000
stack
page read and write
5DB1000
trusted library allocation
page read and write
5D2F000
trusted library allocation
page read and write
524F000
stack
page read and write
60AE000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5C9B000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
15A0000
heap
page read and write
5CA5000
trusted library allocation
page read and write
FAA000
unkown
page execute and write copy
CB4000
heap
page read and write
5D27000
trusted library allocation
page read and write
39AF000
stack
page read and write
60A2000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
61C9000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
4C81000
heap
page read and write
163B000
heap
page read and write
4C70000
direct allocation
page read and write
3D5F000
stack
page read and write
5CC7000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
CB4000
heap
page read and write
5D43000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
161E000
heap
page read and write
161D000
heap
page read and write
1036000
unkown
page execute and write copy
60A8000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
321F000
stack
page read and write
FB3000
unkown
page execute and write copy
4820000
heap
page read and write
5DB1000
trusted library allocation
page read and write
4B2F000
stack
page read and write
F9F000
unkown
page execute and read and write
60A9000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
5CBC000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
1122000
unkown
page execute and write copy
162D000
heap
page read and write
2FDF000
stack
page read and write
3FDF000
stack
page read and write
60A2000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
15A0000
heap
page read and write
60A7000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
CB4000
heap
page read and write
62AD000
trusted library allocation
page read and write
FB6000
unkown
page execute and write copy
5C95000
trusted library allocation
page read and write
160E000
heap
page read and write
61B3000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
6278000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
5D28000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
385F000
stack
page read and write
3EDE000
stack
page read and write
1080000
unkown
page execute and write copy
1621000
heap
page read and write
163B000
heap
page read and write
5D39000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
4710000
direct allocation
page read and write
60A5000
trusted library allocation
page read and write
5C9A000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
163B000
heap
page read and write
61E1000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
336F000
stack
page read and write
5D2D000
trusted library allocation
page read and write
CB4000
heap
page read and write
5D12000
trusted library allocation
page read and write
CB4000
heap
page read and write
61EC000
trusted library allocation
page read and write
1014000
unkown
page execute and write copy
153B000
stack
page read and write
E90000
unkown
page read and write
57DE000
stack
page read and write
5DB1000
trusted library allocation
page read and write
1132000
unkown
page execute and read and write
3C2F000
stack
page read and write
49DF000
stack
page read and write
5D32000
trusted library allocation
page read and write
5D27000
trusted library allocation
page read and write
61D2000
trusted library allocation
page read and write
5E5D000
trusted library allocation
page read and write
462F000
stack
page read and write
1581000
heap
page read and write
60AE000
trusted library allocation
page read and write
163C000
heap
page read and write
5D91000
trusted library allocation
page read and write
9DE000
stack
page read and write
4B6E000
stack
page read and write
5D31000
trusted library allocation
page read and write
101E000
unkown
page execute and read and write
5C95000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
5100000
remote allocation
page read and write
6163000
trusted library allocation
page read and write
CF0000
heap
page read and write
2D1F000
stack
page read and write
4C70000
direct allocation
page read and write
616A000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
2BDF000
stack
page read and write
10B5000
unkown
page execute and write copy
60A8000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
6176000
trusted library allocation
page read and write
CB4000
heap
page read and write
401E000
stack
page read and write
1630000
heap
page read and write
CB4000
heap
page read and write
28DF000
stack
page read and write
5D27000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
744000
heap
page read and write
5AE2000
trusted library allocation
page read and write
CB4000
heap
page read and write
163B000
heap
page read and write
5DD1000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
C8A000
stack
page read and write
439F000
stack
page read and write
5DC9000
trusted library allocation
page read and write
5CC9000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
3C6E000
stack
page read and write
630C000
trusted library allocation
page read and write
1631000
heap
page read and write
1573000
heap
page read and write
163B000
heap
page read and write
4C70000
direct allocation
page read and write
4B10000
heap
page read and write
10D5000
unkown
page execute and read and write
60A5000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
1039000
unkown
page execute and write copy
1063000
unkown
page execute and write copy
1612000
heap
page read and write
10D5000
unkown
page execute and write copy
5CA5000
trusted library allocation
page read and write
1052000
unkown
page execute and write copy
15C2000
heap
page read and write
5CB0000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
5100000
remote allocation
page read and write
65E4000
trusted library allocation
page read and write
39EE000
stack
page read and write
3F9000
stack
page read and write
1630000
heap
page read and write
362E000
stack
page read and write
60A6000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
5CCB000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
301E000
stack
page read and write
4C81000
heap
page read and write
804000
heap
page read and write
5D90000
trusted library allocation
page read and write
10A3000
unkown
page execute and write copy
15C2000
heap
page read and write
5DA9000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
4C90000
heap
page read and write
CB4000
heap
page read and write
5DB1000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
60AE000
trusted library allocation
page read and write
43EE000
stack
page read and write
163B000
heap
page read and write
804000
heap
page read and write
1625000
heap
page read and write
5F9B000
trusted library allocation
page read and write
161D000
heap
page read and write
61A2000
trusted library allocation
page read and write
488D000
trusted library allocation
page execute and read and write
702E000
stack
page read and write
619B000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
804000
heap
page read and write
4C6F000
stack
page read and write
1013000
unkown
page execute and read and write
5CF1000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
163C000
heap
page read and write
5AE9000
trusted library allocation
page read and write
5D92000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
FA2000
unkown
page execute and write copy
5CCA000
trusted library allocation
page read and write
555E000
stack
page read and write
3DAE000
stack
page read and write
4710000
direct allocation
page read and write
4C70000
direct allocation
page read and write
5D98000
trusted library allocation
page read and write
322F000
stack
page read and write
4C70000
direct allocation
page read and write
5DA0000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
10AC000
unkown
page execute and write copy
62B9000
trusted library allocation
page read and write
61A2000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
B1F000
stack
page read and write
5CB8000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
163E000
heap
page read and write
5DD1000
trusted library allocation
page read and write
5CB8000
trusted library allocation
page read and write
335F000
stack
page read and write
60A4000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
10E0000
heap
page read and write
60A6000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
4C81000
heap
page read and write
5E5B000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
5D44000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
4870000
direct allocation
page read and write
101D000
unkown
page execute and write copy
6158000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
634B000
trusted library allocation
page read and write
402E000
stack
page read and write
5C8F000
stack
page read and write
5D35000
trusted library allocation
page read and write
60AC000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
FB5000
unkown
page execute and read and write
5598000
trusted library allocation
page read and write
61B8000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
161E000
heap
page read and write
60A0000
trusted library allocation
page read and write
5CCB000
trusted library allocation
page read and write
4A2E000
stack
page read and write
412F000
stack
page read and write
4710000
direct allocation
page read and write
FF3000
unkown
page execute and read and write
5AE4000
trusted library allocation
page read and write
1581000
heap
page read and write
4721000
heap
page read and write
312F000
stack
page read and write
CB4000
heap
page read and write
4710000
direct allocation
page read and write
5C91000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
1132000
unkown
page execute and write copy
108F000
unkown
page execute and read and write
FF6000
unkown
page execute and write copy
6227000
trusted library allocation
page read and write
594E000
stack
page read and write
5B80000
heap
page read and write
106A000
unkown
page execute and read and write
5D27000
trusted library allocation
page read and write
48EE000
stack
page read and write
5C9B000
trusted library allocation
page read and write
5CB2000
trusted library allocation
page read and write
30DF000
stack
page read and write
61D7000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
670000
heap
page read and write
5CE1000
trusted library allocation
page read and write
6DE000
stack
page read and write
62B7000
trusted library allocation
page read and write
61A3000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
6F0000
heap
page read and write
5CC5000
trusted library allocation
page read and write
6275000
trusted library allocation
page read and write
34DE000
stack
page read and write
161F000
heap
page read and write
107A000
unkown
page execute and write copy
35EF000
stack
page read and write
4710000
direct allocation
page read and write
4A00000
trusted library allocation
page read and write
804000
heap
page read and write
103C000
unkown
page execute and write copy
60A9000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
1038000
unkown
page execute and read and write
5C9B000
trusted library allocation
page read and write
CB4000
heap
page read and write
5DA0000
trusted library allocation
page read and write
61DA000
trusted library allocation
page read and write
10BE000
unkown
page execute and write copy
5AE2000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
E96000
unkown
page write copy
49EF000
stack
page read and write
4C5C000
stack
page read and write
1631000
heap
page read and write
411F000
stack
page read and write
5CB0000
trusted library allocation
page read and write
100F000
unkown
page execute and write copy
617A000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
5CC2000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
5CBB000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
11F0000
heap
page read and write
625D000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
FE2000
unkown
page execute and read and write
804000
heap
page read and write
5DC9000
trusted library allocation
page read and write
4A07000
trusted library allocation
page execute and read and write
5CA6000
trusted library allocation
page read and write
541E000
stack
page read and write
6180000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
47AE000
stack
page read and write
DD0000
unkown
page readonly
804000
heap
page read and write
48DC000
stack
page read and write
163B000
heap
page read and write
6220000
trusted library allocation
page read and write
60AE000
trusted library allocation
page read and write
CB4000
heap
page read and write
43AF000
stack
page read and write
5CBB000
trusted library allocation
page read and write
27DF000
stack
page read and write
5CA3000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
1627000
heap
page read and write
5D45000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
5110000
direct allocation
page read and write
35DF000
stack
page read and write
4C70000
direct allocation
page read and write
60A3000
trusted library allocation
page read and write
5CB3000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
1059000
unkown
page execute and read and write
60B1000
trusted library allocation
page read and write
4C60000
trusted library allocation
page execute and read and write
339E000
stack
page read and write
804000
heap
page read and write
1007000
unkown
page execute and read and write
E92000
unkown
page execute and read and write
1635000
heap
page read and write
161E000
heap
page read and write
6198000
trusted library allocation
page read and write
800000
heap
page read and write
5DB1000
trusted library allocation
page read and write
529D000
stack
page read and write
1624000
heap
page read and write
628A000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
108F000
unkown
page execute and write copy
FB7000
unkown
page execute and read and write
5D37000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
163B000
heap
page read and write
154E000
heap
page read and write
617E000
trusted library allocation
page read and write
5D28000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
1578000
heap
page read and write
10CF000
unkown
page execute and read and write
4C1E000
stack
page read and write
5CC8000
trusted library allocation
page read and write
10C0000
unkown
page execute and write copy
4C81000
heap
page read and write
5CCF000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
6168000
trusted library allocation
page read and write
569E000
stack
page read and write
60B0000
trusted library allocation
page read and write
CB4000
heap
page read and write
5D39000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
65D6000
trusted library allocation
page read and write
6165000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
61D9000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
CB4000
heap
page read and write
E90000
unkown
page readonly
6180000
trusted library allocation
page read and write
FDF000
unkown
page execute and write copy
5DE0000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5A4F000
stack
page read and write
4A6E000
stack
page read and write
160A000
heap
page read and write
DA7000
heap
page read and write
62AB000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
4C81000
heap
page read and write
60A7000
trusted library allocation
page read and write
372F000
stack
page read and write
5C95000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
1588000
heap
page read and write
73A000
heap
page read and write
5D39000
trusted library allocation
page read and write
579F000
stack
page read and write
60A3000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
6DCE000
stack
page read and write
5C9B000
trusted library allocation
page read and write
10A7000
unkown
page execute and write copy
60AB000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
1030000
unkown
page execute and read and write
14FE000
stack
page read and write
10CE000
unkown
page execute and write copy
58DD000
stack
page read and write
660000
heap
page read and write
61AC000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
1621000
heap
page read and write
2F9F000
stack
page read and write
61CB000
trusted library allocation
page read and write
10BD000
unkown
page execute and write copy
CB4000
heap
page read and write
349F000
stack
page read and write
5D39000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
4880000
direct allocation
page execute and read and write
610A000
trusted library allocation
page read and write
565F000
stack
page read and write
1049000
unkown
page execute and read and write
302D000
heap
page read and write
5CE9000
trusted library allocation
page read and write
452E000
stack
page read and write
60AA000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
60AC000
trusted library allocation
page read and write
4738000
heap
page read and write
5AEC000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
3020000
heap
page read and write
4C81000
heap
page read and write
10AB000
unkown
page execute and read and write
5CD0000
trusted library allocation
page read and write
1631000
heap
page read and write
5CB0000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
1046000
unkown
page execute and write copy
A1E000
stack
page read and write
5CE9000
trusted library allocation
page read and write
64C6000
trusted library allocation
page read and write
782000
heap
page read and write
6174000
trusted library allocation
page read and write
163B000
heap
page read and write
5C91000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
4721000
heap
page read and write
39DE000
stack
page read and write
60A1000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
804000
heap
page read and write
5CE2000
trusted library allocation
page read and write
5CBC000
trusted library allocation
page read and write
1626000
heap
page read and write
5DB1000
trusted library allocation
page read and write
1624000
heap
page read and write
4721000
heap
page read and write
158E000
heap
page read and write
4710000
direct allocation
page read and write
6169000
trusted library allocation
page read and write
1638000
heap
page read and write
1048000
unkown
page execute and write copy
60A7000
trusted library allocation
page read and write
416E000
stack
page read and write
10AE000
unkown
page execute and read and write
386F000
stack
page read and write
5CA3000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
6225000
trusted library allocation
page read and write
466E000
stack
page read and write
5C99000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
804000
heap
page read and write
42AE000
stack
page read and write
5100000
remote allocation
page read and write
6176000
trusted library allocation
page read and write
621D000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
3EEE000
stack
page read and write
5DC4000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
44EF000
stack
page read and write
5FD2000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
107F000
unkown
page execute and read and write
60A7000
trusted library allocation
page read and write
2FDE000
stack
page read and write
615A000
trusted library allocation
page read and write
161B000
heap
page read and write
4890000
heap
page read and write
5CF2000
trusted library allocation
page read and write
62DB000
trusted library allocation
page read and write
FE3000
unkown
page execute and write copy
163E000
heap
page read and write
1012000
unkown
page execute and read and write
163C000
heap
page read and write
CB4000
heap
page read and write
361E000
stack
page read and write
5DC9000
trusted library allocation
page read and write
1624000
heap
page read and write
1095000
unkown
page execute and write copy
5AAE000
stack
page read and write
619A000
trusted library allocation
page read and write
620E000
trusted library allocation
page read and write
D9C000
stack
page read and write
60B0000
trusted library allocation
page read and write
375E000
stack
page read and write
10C5000
unkown
page execute and write copy
5DB1000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
4A00000
direct allocation
page execute and read and write
E2E000
stack
page read and write
60A3000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
50C0000
heap
page read and write
163B000
heap
page read and write
158E000
heap
page read and write
60A8000
trusted library allocation
page read and write
F89000
unkown
page execute and read and write
1134000
unkown
page execute and write copy
4C70000
direct allocation
page read and write
5CE1000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
1081000
unkown
page execute and read and write
1624000
heap
page read and write
5C84000
trusted library allocation
page read and write
6182000
trusted library allocation
page read and write
5D27000
trusted library allocation
page read and write
163B000
heap
page read and write
4710000
direct allocation
page read and write
6167000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
60AE000
trusted library allocation
page read and write
6F20000
heap
page execute and read and write
5CA1000
trusted library allocation
page read and write
CB4000
heap
page read and write
60A9000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
1053000
unkown
page execute and read and write
E9A000
unkown
page execute and read and write
69A9000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
6499000
trusted library allocation
page read and write
CB4000
heap
page read and write
46F0000
direct allocation
page read and write
5FA1000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
804000
heap
page read and write
5CEB000
trusted library allocation
page read and write
3E9F000
stack
page read and write
5D97000
trusted library allocation
page read and write
15C2000
heap
page read and write
4721000
heap
page read and write
706E000
stack
page read and write
5C91000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
5CBB000
trusted library allocation
page read and write
100C000
unkown
page execute and write copy
804000
heap
page read and write
60A7000
trusted library allocation
page read and write
5FF2000
trusted library allocation
page read and write
618D000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
627A000
trusted library allocation
page read and write
48AF000
stack
page read and write
5DB1000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
60A8000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
1585000
heap
page read and write
3ADE000
stack
page read and write
1019000
unkown
page execute and read and write
5F96000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
3027000
heap
page read and write
10B8000
unkown
page execute and read and write
10A9000
unkown
page execute and write copy
5AE0000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
1097000
unkown
page execute and read and write
4710000
direct allocation
page read and write
5C9F000
trusted library allocation
page read and write
1628000
heap
page read and write
325E000
stack
page read and write
4C70000
direct allocation
page read and write
5CE9000
trusted library allocation
page read and write
621B000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
60AD000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
EA6000
unkown
page execute and write copy
5CA3000
trusted library allocation
page read and write
160C000
heap
page read and write
389E000
stack
page read and write
1624000
heap
page read and write
161D000
heap
page read and write
5D37000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
6ECE000
stack
page read and write
CB4000
heap
page read and write
5DC9000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
1624000
heap
page read and write
60A4000
trusted library allocation
page read and write
1050000
unkown
page execute and read and write
4C70000
direct allocation
page read and write
6D80000
trusted library allocation
page read and write
162D000
heap
page read and write
5CCA000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
61BF000
trusted library allocation
page read and write
1094000
unkown
page execute and read and write
618A000
trusted library allocation
page read and write
E6E000
stack
page read and write
61EE000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
61B6000
trusted library allocation
page read and write
6167000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
E2B000
unkown
page execute and write copy
429E000
stack
page read and write
5D93000
trusted library allocation
page read and write
4A0B000
trusted library allocation
page execute and read and write
5D35000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5CA5000
trusted library allocation
page read and write
5E5D000
trusted library allocation
page read and write
5E09000
trusted library allocation
page read and write
3B1E000
stack
page read and write
61AC000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
1626000
heap
page read and write
5CA5000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
6FA000
heap
page read and write
60A5000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
CB4000
heap
page read and write
5DA0000
trusted library allocation
page read and write
625F000
trusted library allocation
page read and write
1625000
heap
page read and write
606A000
trusted library allocation
page read and write
60AF000
trusted library allocation
page read and write
10D6000
unkown
page execute and write copy
751000
heap
page read and write
1540000
heap
page read and write
311E000
stack
page read and write
60AD000
trusted library allocation
page read and write
3FEF000
stack
page read and write
10AC000
unkown
page execute and write copy
60A8000
trusted library allocation
page read and write
61A5000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
29DF000
stack
page read and write
5CDB000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
62EB000
trusted library allocation
page read and write
11EE000
stack
page read and write
5DA0000
trusted library allocation
page read and write
1084000
unkown
page execute and read and write
FE0000
unkown
page execute and read and write
62DD000
trusted library allocation
page read and write
804000
heap
page read and write
102F000
unkown
page execute and write copy
804000
heap
page read and write
5CF1000
trusted library allocation
page read and write
3AEF000
stack
page read and write
5D3C000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5CB8000
trusted library allocation
page read and write
60AC000
trusted library allocation
page read and write
1019000
unkown
page execute and write copy
5AEC000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
4710000
direct allocation
page read and write
5D01000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
804000
heap
page read and write
5D2D000
trusted library allocation
page read and write
371F000
stack
page read and write
426F000
stack
page read and write
399F000
stack
page read and write
61D0000
trusted library allocation
page read and write
61DF000
trusted library allocation
page read and write
CB4000
heap
page read and write
5D33000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
6165000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
38AE000
stack
page read and write
61BD000
trusted library allocation
page read and write
10C5000
unkown
page execute and write copy
5DA9000
trusted library allocation
page read and write
1625000
heap
page read and write
4884000
trusted library allocation
page read and write
618C000
trusted library allocation
page read and write
DEE000
stack
page read and write
415E000
stack
page read and write
5D39000
trusted library allocation
page read and write
E92000
unkown
page execute and write copy
5FBA000
trusted library allocation
page read and write
3D6F000
stack
page read and write
1621000
heap
page read and write
5D45000
trusted library allocation
page read and write
3EAF000
stack
page read and write
FE1000
unkown
page execute and write copy
1624000
heap
page read and write
5C93000
trusted library allocation
page read and write
2C1E000
stack
page read and write
5D43000
trusted library allocation
page read and write
15A0000
heap
page read and write
5C96000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
804000
heap
page read and write
5DA9000
trusted library allocation
page read and write
3D9E000
stack
page read and write
5E47000
trusted library allocation
page read and write
2E5F000
stack
page read and write
5D9A000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
5CBE000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
D5E000
stack
page read and write
3B2E000
stack
page read and write
5C9F000
trusted library allocation
page read and write
60AF000
trusted library allocation
page read and write
E70000
heap
page read and write
F8B000
unkown
page execute and write copy
100E000
unkown
page execute and read and write
61D8000
trusted library allocation
page read and write
FA3000
unkown
page execute and read and write
49F0000
trusted library allocation
page read and write
5CD5000
trusted library allocation
page read and write
6F0E000
stack
page read and write
61F1000
trusted library allocation
page read and write
154A000
heap
page read and write
60A2000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
804000
heap
page read and write
618E000
trusted library allocation
page read and write
61C7000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
6174000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
1589000
heap
page read and write
5D91000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
2ADF000
stack
page read and write
FAA000
unkown
page execute and read and write
5CF2000
trusted library allocation
page read and write
5CB6000
trusted library allocation
page read and write
1628000
heap
page read and write
60A0000
trusted library allocation
page read and write
1050000
unkown
page execute and write copy
5CCF000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5D27000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
5D39000
trusted library allocation
page read and write
6FE000
heap
page read and write
6156000
trusted library allocation
page read and write
618F000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
163B000
heap
page read and write
15C2000
heap
page read and write
6277000
trusted library allocation
page read and write
376E000
stack
page read and write
1065000
unkown
page execute and read and write
4721000
heap
page read and write
111B000
unkown
page execute and write copy
5D28000
trusted library allocation
page read and write
34AF000
stack
page read and write
60AC000
trusted library allocation
page read and write
425F000
stack
page read and write
60A5000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
E37000
unkown
page execute and write copy
619D000
trusted library allocation
page read and write
1636000
heap
page read and write
DD1000
unkown
page execute and write copy
5C96000
trusted library allocation
page read and write
4C81000
trusted library allocation
page read and write
551D000
stack
page read and write
160A000
heap
page read and write
E2B000
unkown
page execute and read and write
52B0000
direct allocation
page execute and read and write
60A4000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
33AE000
stack
page read and write
3C5E000
stack
page read and write
5C95000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
61A4000
trusted library allocation
page read and write
4883000
trusted library allocation
page execute and read and write
6072000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
1578000
heap
page read and write
163E000
heap
page read and write
4C70000
heap
page execute and read and write
60A9000
trusted library allocation
page read and write
4C81000
heap
page read and write
5CF9000
trusted library allocation
page read and write
FF3000
unkown
page execute and read and write
4C80000
heap
page read and write
5DA9000
trusted library allocation
page read and write
615A000
trusted library allocation
page read and write
DD0000
unkown
page read and write
60A5000
trusted library allocation
page read and write
4C81000
heap
page read and write
5DF1000
trusted library allocation
page read and write
173E000
stack
page read and write
5D45000
trusted library allocation
page read and write
3C1F000
stack
page read and write
5CA0000
trusted library allocation
page read and write
514B000
stack
page read and write
1613000
heap
page read and write
716E000
stack
page read and write
2D5E000
stack
page read and write
5D29000
trusted library allocation
page read and write
4740000
heap
page read and write
101C000
unkown
page execute and read and write
CB0000
heap
page read and write
5D10000
trusted library allocation
page read and write
1122000
unkown
page execute and write copy
5CE1000
trusted library allocation
page read and write
158E000
heap
page read and write
52A0000
direct allocation
page execute and read and write
5CB8000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
1620000
heap
page read and write
5D36000
trusted library allocation
page read and write
34EE000
stack
page read and write
5DC7000
trusted library allocation
page read and write
1630000
heap
page read and write
5D93000
trusted library allocation
page read and write
4C81000
heap
page read and write
1134000
unkown
page execute and write copy
476F000
stack
page read and write
5CBB000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
E9A000
unkown
page execute and write copy
163E000
heap
page read and write
5C9B000
trusted library allocation
page read and write
10A6000
unkown
page execute and read and write
60AB000
trusted library allocation
page read and write
1040000
unkown
page execute and read and write
5CCA000
trusted library allocation
page read and write
804000
heap
page read and write
2FC000
stack
page read and write
61CD000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
4720000
heap
page read and write
49FA000
trusted library allocation
page execute and read and write
5D2F000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
10C2000
unkown
page execute and read and write
5CC7000
trusted library allocation
page read and write
160F000
heap
page read and write
10A8000
unkown
page execute and read and write
10BD000
unkown
page execute and read and write
B8B000
stack
page read and write
60A7000
trusted library allocation
page read and write
634D000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
2E9E000
stack
page read and write
CB4000
heap
page read and write
5D44000
trusted library allocation
page read and write
114E000
stack
page read and write
5C81000
trusted library allocation
page read and write
6D7D000
stack
page read and write
55B1000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
E96000
unkown
page write copy
5CE1000
trusted library allocation
page read and write
1611000
heap
page read and write
5C92000
trusted library allocation
page read and write
1063000
unkown
page execute and write copy
733000
heap
page read and write
5CCB000
trusted library allocation
page read and write
There are 979 hidden memdumps, click here to show them.