IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\AU963ROPSBOYUMXP3FF.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AU963ROPSBOYUMXP3FF.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\AU963ROPSBOYUMXP3FF.exe
"C:\Users\user~1\AppData\Local\Temp\AU963ROPSBOYUMXP3FF.exe"
malicious

URLs

Name
IP
Malicious
https://crisiwarny.store/95hEL9zzrqbevk/6
unknown
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
https://crisiwarny.store/apiV
unknown
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
https://crisiwarny.store/p
unknown
malicious
https://crisiwarny.store/
unknown
malicious
thumbystriw.store
malicious
https://crisiwarny.store/s
unknown
malicious
crisiwarny.store
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.microsoft
unknown
http://185.215.113.16/off/def.exe8T
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.16/sOc
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
http://185.215.113.16/xOX
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.16/off/def.exe
unknown
http://185.215.113.16/off/def.exe.
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
741000
unkown
page execute and read and write
malicious
7BAD000
stack
page read and write
5D68000
trusted library allocation
page read and write
130C000
heap
page read and write
5D0C000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
5D86000
trusted library allocation
page read and write
517D000
stack
page read and write
5E01000
trusted library allocation
page read and write
131D000
heap
page read and write
100A000
unkown
page execute and read and write
1864000
heap
page read and write
628F000
trusted library allocation
page read and write
4D01000
heap
page read and write
55E0000
direct allocation
page read and write
5B48000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
5490000
heap
page read and write
5D09000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
6119000
trusted library allocation
page read and write
12FA000
heap
page read and write
5B4C000
trusted library allocation
page read and write
358F000
stack
page read and write
6115000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
5D68000
trusted library allocation
page read and write
126F000
unkown
page execute and read and write
484E000
stack
page read and write
5D56000
trusted library allocation
page read and write
131C000
stack
page read and write
611A000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
A49000
unkown
page execute and read and write
5310000
direct allocation
page execute and read and write
33FE000
stack
page read and write
94F000
unkown
page execute and write copy
611E000
trusted library allocation
page read and write
FFA000
stack
page read and write
1174000
unkown
page execute and read and write
5E01000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
637C000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
925000
unkown
page execute and read and write
61FA000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
384E000
stack
page read and write
6AB1000
trusted library allocation
page read and write
4D01000
heap
page read and write
3C0E000
stack
page read and write
5D39000
trusted library allocation
page read and write
555D000
stack
page read and write
5644000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
130D000
heap
page read and write
417F000
stack
page read and write
5D34000
trusted library allocation
page read and write
15FE000
stack
page read and write
5590000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
57F0000
remote allocation
page read and write
9B8000
unkown
page execute and read and write
61D0000
trusted library allocation
page read and write
453E000
stack
page read and write
5D7F000
trusted library allocation
page read and write
1326000
heap
page read and write
11B3000
unkown
page execute and read and write
5310000
direct allocation
page execute and read and write
130E000
heap
page read and write
6231000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
9AF000
unkown
page execute and read and write
5D65000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
1938000
heap
page read and write
4D01000
heap
page read and write
62FC000
trusted library allocation
page read and write
12F2000
heap
page read and write
11AE000
unkown
page execute and read and write
5350000
direct allocation
page execute and read and write
498F000
stack
page read and write
5D16000
trusted library allocation
page read and write
6204000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
55CD000
trusted library allocation
page execute and read and write
5E42000
trusted library allocation
page read and write
1864000
heap
page read and write
5D48000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
91C000
unkown
page execute and write copy
995000
unkown
page execute and write copy
1326000
heap
page read and write
6118000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
9B9000
unkown
page execute and write copy
611C000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
1860000
heap
page read and write
35CE000
stack
page read and write
6211000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
97D000
unkown
page execute and write copy
5E40000
trusted library allocation
page read and write
15BF000
stack
page read and write
1291000
heap
page read and write
5D1A000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
5D62000
trusted library allocation
page read and write
634F000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
5D39000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
1329000
heap
page read and write
5E19000
trusted library allocation
page read and write
62FD000
trusted library allocation
page read and write
5BF0000
heap
page read and write
4D01000
heap
page read and write
3A8F000
stack
page read and write
5D34000
trusted library allocation
page read and write
12A2000
unkown
page execute and write copy
1AEE000
stack
page read and write
61FC000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
40CF000
stack
page read and write
4D01000
heap
page read and write
6041000
trusted library allocation
page read and write
1002000
unkown
page execute and read and write
61D8000
trusted library allocation
page read and write
1864000
heap
page read and write
4D10000
heap
page read and write
5D46000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
2F3D000
heap
page read and write
62FB000
trusted library allocation
page read and write
5D7D000
trusted library allocation
page read and write
5B47000
trusted library allocation
page read and write
3E4F000
stack
page read and write
2F30000
heap
page read and write
3B3F000
stack
page read and write
1326000
heap
page read and write
5D81000
trusted library allocation
page read and write
1305000
heap
page read and write
5D1A000
trusted library allocation
page read and write
6251000
trusted library allocation
page read and write
4680000
heap
page read and write
6116000
trusted library allocation
page read and write
54B0000
heap
page read and write
353E000
stack
page read and write
6203000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
1268000
heap
page read and write
5D49000
trusted library allocation
page read and write
377F000
stack
page read and write
1326000
heap
page read and write
740000
unkown
page read and write
5480000
direct allocation
page read and write
61F8000
trusted library allocation
page read and write
4D01000
heap
page read and write
5D29000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
1231000
unkown
page execute and write copy
6110000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
6218000
trusted library allocation
page read and write
93A000
unkown
page execute and read and write
1015000
unkown
page execute and read and write
61F2000
trusted library allocation
page read and write
123F000
unkown
page execute and read and write
5E10000
trusted library allocation
page read and write
1206000
unkown
page execute and read and write
1864000
heap
page read and write
11FD000
unkown
page execute and read and write
5A2E000
stack
page read and write
303F000
stack
page read and write
59D0000
trusted library allocation
page execute and read and write
5D39000
trusted library allocation
page read and write
73D0F000
unkown
page readonly
5E10000
trusted library allocation
page read and write
6A19000
trusted library allocation
page read and write
1275000
heap
page read and write
55E0000
direct allocation
page read and write
6115000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
120D000
unkown
page execute and read and write
438E000
stack
page read and write
5D46000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
3B7E000
stack
page read and write
6114000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
510F000
stack
page read and write
1317000
heap
page read and write
5D10000
trusted library allocation
page read and write
5B4D000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
129E000
heap
page read and write
575E000
stack
page read and write
926000
unkown
page execute and write copy
6249000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
5E29000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
624B000
trusted library allocation
page read and write
A4A000
unkown
page execute and write copy
180E000
stack
page read and write
62D8000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
61D1000
trusted library allocation
page read and write
740000
unkown
page readonly
3DFE000
stack
page read and write
5E21000
trusted library allocation
page read and write
1313000
heap
page read and write
5D39000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
7DEE000
stack
page read and write
5D39000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
1390000
heap
page read and write
5D3E000
trusted library allocation
page read and write
5E3E000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
6116000
trusted library allocation
page read and write
5340000
direct allocation
page execute and read and write
6205000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
4FCF000
stack
page read and write
5D41000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
1176000
unkown
page execute and write copy
4CF0000
direct allocation
page read and write
130D000
heap
page read and write
5E10000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
5CFF000
stack
page read and write
61CF000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
51CC000
stack
page read and write
49CE000
stack
page read and write
8FE000
unkown
page execute and write copy
420F000
stack
page read and write
5330000
direct allocation
page execute and read and write
611A000
trusted library allocation
page read and write
5D5E000
trusted library allocation
page read and write
1207000
unkown
page execute and write copy
5D0C000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
123A000
heap
page read and write
7DAE000
stack
page read and write
1312000
heap
page read and write
6210000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
467F000
stack
page read and write
950000
unkown
page execute and read and write
8FC000
unkown
page execute and read and write
5B42000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
982000
unkown
page execute and read and write
5D1A000
trusted library allocation
page read and write
11F5000
unkown
page execute and write copy
131B000
heap
page read and write
6007000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
631A000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
4D01000
heap
page read and write
6287000
trusted library allocation
page read and write
1327000
heap
page read and write
562F000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
192F000
heap
page read and write
5E19000
trusted library allocation
page read and write
130E000
heap
page read and write
6112000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
1329000
heap
page read and write
1329000
heap
page read and write
1002000
unkown
page execute and write copy
6029000
trusted library allocation
page read and write
1329000
heap
page read and write
45CF000
stack
page read and write
611F000
trusted library allocation
page read and write
73CF1000
unkown
page execute read
5D08000
trusted library allocation
page read and write
5491000
heap
page read and write
5D1E000
trusted library allocation
page read and write
5D0C000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
126D000
unkown
page execute and write copy
61E9000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
60D9000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
1314000
heap
page read and write
1230000
heap
page read and write
3ACE000
stack
page read and write
6116000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
55C3000
trusted library allocation
page execute and read and write
5B4F000
trusted library allocation
page read and write
18AE000
stack
page read and write
6114000
trusted library allocation
page read and write
9D5000
unkown
page execute and read and write
5491000
heap
page read and write
37BE000
stack
page read and write
6500000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
5B4E000
trusted library allocation
page read and write
1327000
heap
page read and write
11BF000
unkown
page execute and write copy
4CF0000
direct allocation
page read and write
6116000
trusted library allocation
page read and write
61CE000
trusted library allocation
page read and write
5D2F000
trusted library allocation
page read and write
5AAF000
stack
page read and write
12FA000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1312000
heap
page read and write
5E21000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
5E1A000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
14BE000
stack
page read and write
620F000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
91C000
unkown
page execute and read and write
3BCF000
stack
page read and write
5E3E000
trusted library allocation
page read and write
327F000
stack
page read and write
1186000
unkown
page execute and read and write
407E000
stack
page read and write
61D9000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
4A8E000
stack
page read and write
5E2F000
trusted library allocation
page read and write
1271000
heap
page read and write
5E49000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
622C000
trusted library allocation
page read and write
38BF000
stack
page read and write
583D000
stack
page read and write
5D0F000
trusted library allocation
page read and write
A34000
unkown
page execute and write copy
5D56000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
91A000
unkown
page execute and write copy
611A000
trusted library allocation
page read and write
18F0000
heap
page read and write
5D0C000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
4D00000
heap
page read and write
628D000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
61F5000
trusted library allocation
page read and write
1864000
heap
page read and write
1000000
unkown
page readonly
5630000
trusted library allocation
page read and write
3E8E000
stack
page read and write
36CF000
stack
page read and write
3C7F000
stack
page read and write
1BEE000
stack
page read and write
913000
unkown
page execute and read and write
621B000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
41BE000
stack
page read and write
5B0E000
stack
page read and write
434F000
stack
page read and write
11C6000
unkown
page execute and write copy
57DF000
stack
page read and write
4D01000
heap
page read and write
5A90000
heap
page execute and read and write
42FD000
stack
page read and write
5D13000
trusted library allocation
page read and write
5D1F000
trusted library allocation
page read and write
43FF000
stack
page read and write
6248000
trusted library allocation
page read and write
130E000
heap
page read and write
4B0E000
stack
page read and write
3FCE000
stack
page read and write
5480000
direct allocation
page read and write
620B000
trusted library allocation
page read and write
39FF000
stack
page read and write
5B49000
trusted library allocation
page read and write
9C1000
unkown
page execute and read and write
11C0000
unkown
page execute and read and write
3EFF000
stack
page read and write
424E000
stack
page read and write
611D000
trusted library allocation
page read and write
363F000
stack
page read and write
1864000
heap
page read and write
56DE000
stack
page read and write
5E39000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
4D01000
heap
page read and write
1305000
heap
page read and write
5D06000
trusted library allocation
page read and write
73CF0000
unkown
page readonly
6AD5000
trusted library allocation
page read and write
637A000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
5D0C000
trusted library allocation
page read and write
1326000
heap
page read and write
57F0000
remote allocation
page read and write
55D4000
trusted library allocation
page read and write
938000
unkown
page execute and read and write
6116000
trusted library allocation
page read and write
6222000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
A24000
unkown
page execute and write copy
6114000
trusted library allocation
page read and write
635C000
trusted library allocation
page read and write
1864000
heap
page read and write
5D45000
trusted library allocation
page read and write
7EEF000
stack
page read and write
6220000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
34FF000
stack
page read and write
5D48000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
4C4E000
stack
page read and write
5D1C000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
611B000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
1313000
heap
page read and write
6206000
trusted library allocation
page read and write
9CF000
unkown
page execute and write copy
61D6000
trusted library allocation
page read and write
5A6E000
stack
page read and write
46CE000
stack
page read and write
6318000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
1322000
heap
page read and write
6118000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
4D01000
heap
page read and write
4D01000
heap
page read and write
55B0000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
1291000
heap
page read and write
1322000
heap
page read and write
5D29000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
16FF000
stack
page read and write
EFB000
stack
page read and write
5D58000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
470F000
stack
page read and write
5D07000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
625E000
trusted library allocation
page read and write
6212000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
52CF000
stack
page read and write
5D13000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
13A0000
heap
page read and write
4CF0000
direct allocation
page read and write
6340000
trusted library allocation
page read and write
5E02000
trusted library allocation
page read and write
1271000
heap
page read and write
5D33000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
73D06000
unkown
page readonly
1329000
heap
page read and write
1290000
unkown
page execute and read and write
5E4D000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
6116000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
6116000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
3DBF000
stack
page read and write
5B41000
trusted library allocation
page read and write
348F000
stack
page read and write
18EC000
stack
page read and write
4D01000
heap
page read and write
5D47000
trusted library allocation
page read and write
A33000
unkown
page execute and read and write
5E29000
trusted library allocation
page read and write
912000
unkown
page execute and write copy
629E000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
5491000
heap
page read and write
4CF0000
direct allocation
page read and write
12B0000
unkown
page execute and write copy
5E00000
trusted library allocation
page read and write
394F000
stack
page read and write
5D1C000
trusted library allocation
page read and write
5D0C000
trusted library allocation
page read and write
131B000
heap
page read and write
488E000
stack
page read and write
5D2A000
trusted library allocation
page read and write
3CBE000
stack
page read and write
633E000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
5460000
direct allocation
page read and write
1235000
unkown
page execute and read and write
38FE000
stack
page read and write
5D43000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
127F000
heap
page read and write
3F8F000
stack
page read and write
4D01000
heap
page read and write
317E000
stack
page read and write
5620000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
1931000
heap
page read and write
967000
unkown
page execute and read and write
536E000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
57BE000
stack
page read and write
79B000
unkown
page execute and read and write
5D06000
trusted library allocation
page read and write
564B000
trusted library allocation
page execute and read and write
403F000
stack
page read and write
5E39000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
128F000
unkown
page execute and write copy
6924000
trusted library allocation
page read and write
18FE000
heap
page read and write
6347000
trusted library allocation
page read and write
61F7000
trusted library allocation
page read and write
7A6000
unkown
page execute and read and write
5D56000
trusted library allocation
page read and write
55E0000
direct allocation
page read and write
32BE000
stack
page read and write
5D10000
trusted library allocation
page read and write
5AA0000
heap
page execute and read and write
620D000
trusted library allocation
page read and write
4C0F000
stack
page read and write
5480000
direct allocation
page read and write
13A5000
heap
page read and write
5D16000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
94D000
unkown
page execute and read and write
59F0000
trusted library allocation
page read and write
1327000
heap
page read and write
474E000
stack
page read and write
5D29000
trusted library allocation
page read and write
1014000
unkown
page execute and write copy
531D000
stack
page read and write
741000
unkown
page execute and write copy
1864000
heap
page read and write
5491000
heap
page read and write
6111000
trusted library allocation
page read and write
9AD000
unkown
page execute and write copy
5E18000
trusted library allocation
page read and write
131C000
heap
page read and write
936000
unkown
page execute and write copy
1864000
heap
page read and write
622E000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
5491000
heap
page read and write
58C0000
heap
page read and write
4D01000
heap
page read and write
611C000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
12A2000
unkown
page execute and write copy
5310000
direct allocation
page execute and read and write
443E000
stack
page read and write
1307000
heap
page read and write
5D09000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
1360000
heap
page read and write
6115000
trusted library allocation
page read and write
1193000
unkown
page execute and write copy
5B4E000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
1840000
heap
page read and write
5D66000
trusted library allocation
page read and write
6689000
trusted library allocation
page read and write
1230000
unkown
page execute and read and write
2F2C000
stack
page read and write
1327000
heap
page read and write
6061000
trusted library allocation
page read and write
460E000
stack
page read and write
5E29000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
1942000
heap
page read and write
5D52000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
18FA000
heap
page read and write
9A3000
unkown
page execute and write copy
5D29000
trusted library allocation
page read and write
124E000
unkown
page execute and write copy
611D000
trusted library allocation
page read and write
622B000
trusted library allocation
page read and write
121D000
unkown
page execute and read and write
12F3000
heap
page read and write
4CF0000
direct allocation
page read and write
A33000
unkown
page execute and write copy
5D63000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
480E000
stack
page read and write
9E4000
unkown
page execute and read and write
5D50000
trusted library allocation
page read and write
4D01000
heap
page read and write
5E08000
trusted library allocation
page read and write
1323000
heap
page read and write
131D000
heap
page read and write
6204000
trusted library allocation
page read and write
120E000
unkown
page execute and write copy
5518000
trusted library allocation
page read and write
1864000
heap
page read and write
569E000
stack
page read and write
61D7000
trusted library allocation
page read and write
1319000
heap
page read and write
6111000
trusted library allocation
page read and write
313F000
stack
page read and write
6244000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
927000
unkown
page execute and read and write
A49000
unkown
page execute and write copy
5D29000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
11AD000
unkown
page execute and write copy
6010000
trusted library allocation
page read and write
79B000
unkown
page execute and write copy
5D5F000
trusted library allocation
page read and write
95A000
unkown
page execute and write copy
42BF000
stack
page read and write
1322000
heap
page read and write
9B0000
unkown
page execute and write copy
5D1E000
trusted library allocation
page read and write
A3A000
unkown
page execute and write copy
6110000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
52F0000
direct allocation
page execute and read and write
5E21000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
4E8F000
stack
page read and write
1329000
heap
page read and write
1864000
heap
page read and write
130A000
heap
page read and write
5D66000
trusted library allocation
page read and write
11B1000
unkown
page execute and write copy
6234000
trusted library allocation
page read and write
4CD0000
heap
page read and write
4CF0000
direct allocation
page read and write
194D000
heap
page read and write
4CF0000
direct allocation
page read and write
62A0000
trusted library allocation
page read and write
6116000
trusted library allocation
page read and write
122A000
unkown
page execute and write copy
490F000
stack
page read and write
2EEE000
stack
page read and write
4B8F000
stack
page read and write
611B000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
910000
unkown
page execute and read and write
624B000
trusted library allocation
page read and write
1864000
heap
page read and write
1864000
heap
page read and write
448F000
stack
page read and write
61F6000
trusted library allocation
page read and write
1864000
heap
page read and write
5647000
trusted library allocation
page execute and read and write
6114000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
921000
unkown
page execute and write copy
6112000
trusted library allocation
page read and write
123E000
heap
page read and write
1326000
heap
page read and write
130A000
heap
page read and write
1275000
heap
page read and write
1016000
unkown
page execute and write copy
1250000
unkown
page execute and read and write
5E21000
trusted library allocation
page read and write
12F2000
heap
page read and write
5D29000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
5E1E000
trusted library allocation
page read and write
33BF000
stack
page read and write
5D07000
trusted library allocation
page read and write
11D7000
unkown
page execute and read and write
5D1F000
trusted library allocation
page read and write
130A000
heap
page read and write
1268000
heap
page read and write
5B46000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
1306000
heap
page read and write
11E6000
unkown
page execute and read and write
5E31000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
13FE000
stack
page read and write
5D3E000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
621A000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
11E1000
unkown
page execute and write copy
5D04000
trusted library allocation
page read and write
990000
unkown
page execute and write copy
61D5000
trusted library allocation
page read and write
4A4F000
stack
page read and write
5D3A000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
593E000
stack
page read and write
5D29000
trusted library allocation
page read and write
4ECE000
stack
page read and write
1322000
heap
page read and write
5480000
direct allocation
page read and write
1193000
unkown
page execute and read and write
3D4E000
stack
page read and write
5D59000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
1864000
heap
page read and write
4D01000
heap
page read and write
5D39000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
1205000
unkown
page execute and write copy
600A000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
939000
unkown
page execute and write copy
1380000
heap
page read and write
73D0D000
unkown
page read and write
5D66000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
5650000
heap
page read and write
6358000
trusted library allocation
page read and write
1305000
heap
page read and write
6116000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
1830000
heap
page read and write
1326000
heap
page read and write
561C000
stack
page read and write
1299000
unkown
page execute and write copy
4CCF000
stack
page read and write
6246000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
997000
unkown
page execute and read and write
5E3E000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
57F0000
remote allocation
page read and write
5D75000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
123D000
unkown
page execute and write copy
5B4A000
trusted library allocation
page read and write
6931000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
1864000
heap
page read and write
62D6000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
130E000
heap
page read and write
1864000
heap
page read and write
3F3E000
stack
page read and write
131B000
heap
page read and write
5B4D000
trusted library allocation
page read and write
59AE000
stack
page read and write
5E34000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
12FA000
heap
page read and write
6118000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
1305000
heap
page read and write
62FA000
trusted library allocation
page read and write
6356000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
6AB4000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
130D000
heap
page read and write
5D0E000
trusted library allocation
page read and write
559E000
stack
page read and write
4D01000
heap
page read and write
5630000
direct allocation
page execute and read and write
127F000
heap
page read and write
6253000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
5D88000
trusted library allocation
page read and write
994000
unkown
page execute and read and write
12B0000
unkown
page execute and read and write
1864000
heap
page read and write
5D4B000
trusted library allocation
page read and write
500E000
stack
page read and write
6113000
trusted library allocation
page read and write
197D000
heap
page read and write
634D000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
1322000
heap
page read and write
5D1C000
trusted library allocation
page read and write
3A3E000
stack
page read and write
129E000
heap
page read and write
5D51000
trusted library allocation
page read and write
A3A000
unkown
page execute and write copy
9A6000
unkown
page execute and read and write
1350000
heap
page read and write
130E000
heap
page read and write
130E000
heap
page read and write
9E2000
unkown
page execute and write copy
5D02000
trusted library allocation
page read and write
1006000
unkown
page write copy
668B000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
6815000
trusted library allocation
page read and write
59AC000
stack
page read and write
61F4000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
130C000
heap
page read and write
1264000
heap
page read and write
1864000
heap
page read and write
47CF000
stack
page read and write
6179000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
59B0000
heap
page read and write
A27000
unkown
page execute and write copy
60B1000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
7A5000
unkown
page execute and write copy
3D0F000
stack
page read and write
6114000
trusted library allocation
page read and write
1837000
heap
page read and write
5D0C000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
1219000
unkown
page execute and write copy
5D1E000
trusted library allocation
page read and write
130C000
heap
page read and write
5D34000
trusted library allocation
page read and write
1211000
unkown
page execute and read and write
100A000
unkown
page execute and write copy
370E000
stack
page read and write
5491000
heap
page read and write
44CE000
stack
page read and write
4D01000
heap
page read and write
6116000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
55C4000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
A01000
unkown
page execute and read and write
5D37000
trusted library allocation
page read and write
635E000
trusted library allocation
page read and write
4BCE000
stack
page read and write
5E10000
trusted library allocation
page read and write
1000000
unkown
page read and write
5D63000
trusted library allocation
page read and write
1329000
heap
page read and write
410E000
stack
page read and write
2F37000
heap
page read and write
1864000
heap
page read and write
1306000
heap
page read and write
1864000
heap
page read and write
5D5D000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
16F9000
stack
page read and write
367E000
stack
page read and write
6229000
trusted library allocation
page read and write
58BE000
stack
page read and write
5D10000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
457E000
stack
page read and write
6113000
trusted library allocation
page read and write
130A000
heap
page read and write
6236000
trusted library allocation
page read and write
5D19000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
5770000
direct allocation
page execute and read and write
55D0000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
494E000
stack
page read and write
5D34000
trusted library allocation
page read and write
1006000
unkown
page write copy
5D16000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
5D19000
trusted library allocation
page read and write
130A000
heap
page read and write
54A0000
heap
page read and write
61F5000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
6119000
trusted library allocation
page read and write
563A000
trusted library allocation
page execute and read and write
94C000
unkown
page execute and write copy
60E9000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
611D000
trusted library allocation
page read and write
380F000
stack
page read and write
5D2A000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
4ACF000
stack
page read and write
4D4F000
stack
page read and write
4D01000
heap
page read and write
1310000
heap
page read and write
5B4B000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
61D7000
trusted library allocation
page read and write
7CAE000
stack
page read and write
6111000
trusted library allocation
page read and write
545D000
stack
page read and write
6349000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
6249000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
4D8E000
stack
page read and write
5E29000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
7A7000
unkown
page execute and write copy
5E3D000
trusted library allocation
page read and write
398E000
stack
page read and write
5D39000
trusted library allocation
page read and write
1322000
heap
page read and write
5D1C000
trusted library allocation
page read and write
6112000
trusted library allocation
page read and write
There are 962 hidden memdumps, click here to show them.