IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\G5E9NUKC2KTUY7LAVOIZ5RDE8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://crisiwarny.store/apie
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://crisiwarny.store/pt
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://crisiwarny.store/apiE5
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://crisiwarny.store:443/api
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/p
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://crisiwarny.store/&
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://crisiwarny.store:443/api3
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://crisiwarny.store/apig_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://crisiwarny.store/apino
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
http://185.215.113.16/8
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/apid/
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Memdumps

Base Address
Regiontype
Protect
Malicious
7D1000
unkown
page execute and read and write
malicious
5BEF000
trusted library allocation
page read and write
362F000
stack
page read and write
56AA000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
AC4000
unkown
page execute and read and write
5A44000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
56A2000
trusted library allocation
page read and write
540F000
stack
page read and write
5AFD000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
5AFA000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
55C9000
trusted library allocation
page read and write
F4A000
heap
page read and write
5B22000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
F23000
heap
page read and write
55C3000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
837000
unkown
page execute and write copy
32AE000
stack
page read and write
55A2000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
55E4000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
E3B000
stack
page read and write
5A47000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
A37000
unkown
page execute and write copy
55E4000
trusted library allocation
page read and write
F42000
heap
page read and write
4671000
heap
page read and write
55B0000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
7B0000
direct allocation
page read and write
7B0000
direct allocation
page read and write
5C6C000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
5B26000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
55A2000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
5629000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
3A2E000
stack
page read and write
5650000
trusted library allocation
page read and write
508E000
stack
page read and write
5619000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
F4A000
heap
page read and write
55F8000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
A04000
unkown
page execute and write copy
F3C000
heap
page read and write
33EE000
stack
page read and write
55E4000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
29EF000
stack
page read and write
4C30000
direct allocation
page execute and read and write
5BEA000
trusted library allocation
page read and write
774000
heap
page read and write
55B4000
trusted library allocation
page read and write
456E000
stack
page read and write
56C9000
trusted library allocation
page read and write
402F000
stack
page read and write
55A4000
trusted library allocation
page read and write
F1B000
heap
page read and write
55D7000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
4E0D000
stack
page read and write
7D1000
unkown
page execute and write copy
F42000
heap
page read and write
55C3000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
4F4E000
stack
page read and write
7B0000
direct allocation
page read and write
F1A000
heap
page read and write
55E4000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
55EA000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
E40000
remote allocation
page read and write
99E000
unkown
page execute and read and write
F42000
heap
page read and write
5B54000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
2AEF000
stack
page read and write
55CC000
trusted library allocation
page read and write
774000
heap
page read and write
4AF0000
direct allocation
page read and write
55A2000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
F2B000
heap
page read and write
2EEE000
stack
page read and write
37AE000
stack
page read and write
55A2000
trusted library allocation
page read and write
BDE000
stack
page read and write
55D6000
trusted library allocation
page read and write
5B35000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
4DCE000
stack
page read and write
55E4000
trusted library allocation
page read and write
A2C000
unkown
page execute and read and write
2D6F000
stack
page read and write
55A2000
trusted library allocation
page read and write
316E000
stack
page read and write
312F000
stack
page read and write
55E4000
trusted library allocation
page read and write
55AC000
trusted library allocation
page read and write
774000
heap
page read and write
55FA000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
4671000
heap
page read and write
EB4000
heap
page read and write
55C3000
trusted library allocation
page read and write
5B31000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
774000
heap
page read and write
55A8000
trusted library allocation
page read and write
442E000
stack
page read and write
5A44000
trusted library allocation
page read and write
2C2F000
stack
page read and write
5A45000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
F37000
heap
page read and write
55E4000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
F42000
heap
page read and write
E9F000
heap
page read and write
9B4000
unkown
page execute and write copy
55C8000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
F4A000
heap
page read and write
55A2000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
518F000
stack
page read and write
5CAF000
trusted library allocation
page read and write
5B27000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
774000
heap
page read and write
55E4000
trusted library allocation
page read and write
E40000
remote allocation
page read and write
55A2000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
33AF000
stack
page read and write
55E1000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5BCF000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
774000
heap
page read and write
5B2F000
trusted library allocation
page read and write
556F000
stack
page read and write
55FD000
trusted library allocation
page read and write
F4D000
heap
page read and write
A3B000
unkown
page execute and read and write
55C3000
trusted library allocation
page read and write
F1B000
heap
page read and write
55A2000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
55AE000
trusted library allocation
page read and write
3B2F000
stack
page read and write
5B79000
trusted library allocation
page read and write
F3A000
heap
page read and write
4671000
heap
page read and write
5C6E000
trusted library allocation
page read and write
5B23000
trusted library allocation
page read and write
AAF000
unkown
page execute and read and write
5B70000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
3B6E000
stack
page read and write
5658000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
AB5000
unkown
page execute and write copy
5A45000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
55AD000
trusted library allocation
page read and write
F4A000
heap
page read and write
7AD000
heap
page read and write
56A3000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
F4B000
heap
page read and write
55A1000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
F21000
heap
page read and write
F4D000
heap
page read and write
5BD1000
trusted library allocation
page read and write
A81000
unkown
page execute and read and write
38EE000
stack
page read and write
5A43000
trusted library allocation
page read and write
AC5000
unkown
page execute and write copy
55AA000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
5603000
trusted library allocation
page read and write
6B0000
heap
page read and write
774000
heap
page read and write
5A51000
trusted library allocation
page read and write
9EF000
unkown
page execute and read and write
55CC000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
5B19000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
55E4000
trusted library allocation
page read and write
774000
heap
page read and write
3C6F000
stack
page read and write
F1F000
heap
page read and write
5A4A000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
55BF000
trusted library allocation
page read and write
F4A000
heap
page read and write
55F7000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
42EE000
stack
page read and write
5B72000
trusted library allocation
page read and write
A3C000
unkown
page execute and write copy
5B48000
trusted library allocation
page read and write
F42000
heap
page read and write
5A46000
trusted library allocation
page read and write
A9D000
unkown
page execute and write copy
5A4F000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
F2B000
heap
page read and write
F31000
heap
page read and write
60B0000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
55F3000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
774000
heap
page read and write
2C6E000
stack
page read and write
55A2000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
4671000
heap
page read and write
55DB000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
774000
heap
page read and write
5A44000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
F25000
heap
page read and write
F2D000
heap
page read and write
3DAF000
stack
page read and write
55D4000
trusted library allocation
page read and write
2EAF000
stack
page read and write
4C50000
direct allocation
page execute and read and write
5A4C000
trusted library allocation
page read and write
5B67000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
AC4000
unkown
page execute and write copy
55D0000
trusted library allocation
page read and write
4F0D000
stack
page read and write
E95000
heap
page read and write
5B54000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
43EF000
stack
page read and write
452F000
stack
page read and write
5B4D000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
56AA000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
5A45000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
5A45000
trusted library allocation
page read and write
4C9C000
trusted library allocation
page read and write
F4A000
heap
page read and write
55A2000
trusted library allocation
page read and write
416F000
stack
page read and write
EC8000
heap
page read and write
F4A000
heap
page read and write
5A42000
trusted library allocation
page read and write
A02000
unkown
page execute and write copy
5B71000
trusted library allocation
page read and write
4F39000
trusted library allocation
page read and write
5B56000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
F1F000
heap
page read and write
5B18000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
466F000
stack
page read and write
5A47000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
64A000
stack
page read and write
5B15000
trusted library allocation
page read and write
564C000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
F0E000
heap
page read and write
F35000
heap
page read and write
5646000
trusted library allocation
page read and write
7D0000
unkown
page read and write
4C40000
direct allocation
page execute and read and write
55E4000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
E9F000
heap
page read and write
4C2F000
stack
page read and write
55BB000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
5654000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
55DE000
trusted library allocation
page read and write
BE0000
direct allocation
page read and write
55E4000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
F3C000
heap
page read and write
7B0000
direct allocation
page read and write
55DC000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
774000
heap
page read and write
55D4000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
A10000
unkown
page execute and write copy
5A44000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
5BCF000
trusted library allocation
page read and write
5B8B000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
4C30000
heap
page read and write
5A4D000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
F39000
heap
page read and write
4F5D000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
A03000
unkown
page execute and read and write
5A46000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
5A47000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
E89000
heap
page read and write
5A4A000
trusted library allocation
page read and write
4B2B000
stack
page read and write
F3C000
heap
page read and write
5CB1000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
34EF000
stack
page read and write
5B15000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
55D3000
trusted library allocation
page read and write
F4B000
heap
page read and write
5A41000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
406E000
stack
page read and write
55B0000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
774000
heap
page read and write
5B52000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
774000
heap
page read and write
BF0000
direct allocation
page execute and read and write
7B0000
direct allocation
page read and write
5AEB000
trusted library allocation
page read and write
55BF000
trusted library allocation
page read and write
55FE000
trusted library allocation
page read and write
55BF000
trusted library allocation
page read and write
42AF000
stack
page read and write
F3C000
heap
page read and write
82B000
unkown
page execute and write copy
55A2000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
A3F000
unkown
page execute and read and write
75E000
stack
page read and write
4671000
heap
page read and write
55AE000
trusted library allocation
page read and write
3CAE000
stack
page read and write
5781000
trusted library allocation
page read and write
55FC000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
774000
heap
page read and write
E91000
heap
page read and write
F1C000
heap
page read and write
55E4000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
774000
heap
page read and write
5620000
trusted library allocation
page read and write
F4A000
heap
page read and write
4C40000
direct allocation
page execute and read and write
A9B000
unkown
page execute and write copy
F4A000
heap
page read and write
55A4000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
F42000
heap
page read and write
AB5000
unkown
page execute and write copy
55E4000
trusted library allocation
page read and write
366E000
stack
page read and write
55D4000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
530E000
stack
page read and write
55A9000
trusted library allocation
page read and write
5A44000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
F4D000
heap
page read and write
F3F000
heap
page read and write
4F37000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
561A000
trusted library allocation
page read and write
3EEF000
stack
page read and write
EB6000
heap
page read and write
55B0000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
39EF000
stack
page read and write
2DAE000
stack
page read and write
55A2000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
E5A000
heap
page read and write
AAB000
unkown
page execute and write copy
55B3000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55E6000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
F4B000
heap
page read and write
104F000
stack
page read and write
7A0000
heap
page read and write
5624000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
55A4000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
52CD000
stack
page read and write
55B0000
trusted library allocation
page read and write
2FEF000
stack
page read and write
55D4000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
3F2E000
stack
page read and write
5629000
trusted library allocation
page read and write
7A7000
heap
page read and write
4682000
heap
page read and write
5A45000
trusted library allocation
page read and write
55DA000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
55FC000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5632000
trusted library allocation
page read and write
F4A000
heap
page read and write
EB4000
heap
page read and write
56AC000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
4CCD000
stack
page read and write
4670000
heap
page read and write
55C3000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
562A000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
AAB000
unkown
page execute and write copy
55C6000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
4C80000
direct allocation
page execute and read and write
F1D000
heap
page read and write
55A2000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
55BF000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
A2D000
unkown
page execute and write copy
E99000
heap
page read and write
F37000
heap
page read and write
3DEE000
stack
page read and write
55CF000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
56A6000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
F4A000
heap
page read and write
55A2000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
F4D000
heap
page read and write
F3E000
heap
page read and write
EC8000
heap
page read and write
5A44000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
F4E000
heap
page read and write
5A4C000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
55FA000
trusted library allocation
page read and write
F35000
heap
page read and write
55BA000
trusted library allocation
page read and write
4671000
heap
page read and write
55D0000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
4671000
heap
page read and write
55A2000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
F4D000
heap
page read and write
5B77000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
302E000
stack
page read and write
774000
heap
page read and write
82B000
unkown
page execute and read and write
55FB000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
7B0000
direct allocation
page read and write
55D4000
trusted library allocation
page read and write
EB5000
heap
page read and write
5B37000
trusted library allocation
page read and write
A48000
unkown
page execute and read and write
5A48000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
F4A000
heap
page read and write
5B25000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
7D0000
unkown
page readonly
55A2000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
55FC000
trusted library allocation
page read and write
774000
heap
page read and write
5B79000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
114E000
stack
page read and write
5B65000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
51CE000
stack
page read and write
5613000
trusted library allocation
page read and write
5A4A000
trusted library allocation
page read and write
F4A000
heap
page read and write
5624000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
F4D000
heap
page read and write
5A4D000
trusted library allocation
page read and write
F1A000
heap
page read and write
7B0000
direct allocation
page read and write
55CC000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
54B000
stack
page read and write
55D3000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
790000
heap
page read and write
55A2000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
4F4F000
trusted library allocation
page read and write
326F000
stack
page read and write
5A42000
trusted library allocation
page read and write
5B1A000
trusted library allocation
page read and write
E40000
remote allocation
page read and write
55E4000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
987000
unkown
page execute and write copy
5BD2000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
71E000
stack
page read and write
774000
heap
page read and write
985000
unkown
page execute and read and write
F4D000
heap
page read and write
55A8000
trusted library allocation
page read and write
5751000
trusted library allocation
page read and write
F1F000
heap
page read and write
9E4000
unkown
page execute and write copy
E99000
heap
page read and write
F31000
heap
page read and write
55C3000
trusted library allocation
page read and write
A29000
unkown
page execute and write copy
F42000
heap
page read and write
5B2A000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
774000
heap
page read and write
55E4000
trusted library allocation
page read and write
5739000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
38AF000
stack
page read and write
5C90000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5A45000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
9AB000
unkown
page execute and write copy
55C3000
trusted library allocation
page read and write
F41000
heap
page read and write
55A9000
trusted library allocation
page read and write
F10000
heap
page read and write
9B6000
unkown
page execute and read and write
5C58000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
F4A000
heap
page read and write
4C40000
direct allocation
page execute and read and write
A08000
unkown
page execute and read and write
55E4000
trusted library allocation
page read and write
A9F000
unkown
page execute and write copy
55C3000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
4E45000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
A1B000
unkown
page execute and read and write
5A43000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55AD000
trusted library allocation
page read and write
E5E000
heap
page read and write
55A2000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
55EC000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
5B55000
trusted library allocation
page read and write
E40000
direct allocation
page execute and read and write
55A2000
trusted library allocation
page read and write
9A2000
unkown
page execute and read and write
55E1000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
352E000
stack
page read and write
2B2E000
stack
page read and write
5658000
trusted library allocation
page read and write
5842000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
5645000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
A40000
unkown
page execute and write copy
5A40000
trusted library allocation
page read and write
4671000
heap
page read and write
4C70000
direct allocation
page execute and read and write
55A2000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
41AE000
stack
page read and write
F1F000
heap
page read and write
F3F000
heap
page read and write
55C8000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
6A0000
heap
page read and write
55CB000
trusted library allocation
page read and write
A2E000
unkown
page execute and read and write
5A4E000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
F39000
heap
page read and write
504F000
stack
page read and write
5613000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
EC8000
heap
page read and write
774000
heap
page read and write
55D4000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
E50000
heap
page read and write
55D4000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
55BF000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
774000
heap
page read and write
774000
heap
page read and write
774000
heap
page read and write
55A2000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
F1A000
heap
page read and write
55BF000
trusted library allocation
page read and write
376F000
stack
page read and write
55F8000
trusted library allocation
page read and write
546E000
stack
page read and write
55A2000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
F23000
heap
page read and write
5B01000
trusted library allocation
page read and write
5613000
trusted library allocation
page read and write
4AB0000
heap
page read and write
F3C000
heap
page read and write
5779000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
AB0000
unkown
page execute and write copy
55E4000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
F3A000
heap
page read and write
5AFA000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
9AC000
unkown
page execute and read and write
5A46000
trusted library allocation
page read and write
9A0000
unkown
page execute and write copy
F1F000
heap
page read and write
55E4000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
770000
heap
page read and write
5A45000
trusted library allocation
page read and write
F42000
heap
page read and write
55E4000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
There are 821 hidden memdumps, click here to show them.