IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RFAILPVKEX8W9J53ZEEDEWLBCE6I.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFAILPVKEX8W9J53ZEEDEWLBCE6I.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\RFAILPVKEX8W9J53ZEEDEWLBCE6I.exe
"C:\Users\user\AppData\Local\Temp\RFAILPVKEX8W9J53ZEEDEWLBCE6I.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://crisiwarny.storea
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://crisiwarny.store/a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/off/def.exeV
unknown
https://crisiwarny.store/e
unknown
https://crisiwarny.store/apig
unknown
http://185.215.113.16/off/def.exeP
unknown
http://185.215.113.16/c;
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://crisiwarny.store/Y
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
http://185.215.113.16/off/def.exeB
unknown
http://crl.micro0
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://crisiwarny.store:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/d;
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/0.8
unknown
https://crisiwarny.store/s
unknown
https://crisiwarny.store/r
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
D31000
unkown
page execute and read and write
malicious
386E000
stack
page read and write
BF2000
heap
page read and write
5DE1000
trusted library allocation
page read and write
424F000
stack
page read and write
4880000
direct allocation
page read and write
48A2000
heap
page read and write
F6D000
unkown
page execute and write copy
704E000
stack
page read and write
583C000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
F07000
unkown
page execute and read and write
555E000
stack
page read and write
5D3E000
trusted library allocation
page read and write
58DC000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
BDF000
heap
page read and write
582C000
trusted library allocation
page read and write
4CA000
unkown
page execute and read and write
583C000
trusted library allocation
page read and write
52E000
unkown
page execute and write copy
5CA3000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
410F000
stack
page read and write
F14000
unkown
page execute and read and write
5DD2000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
5DA2000
trusted library allocation
page read and write
BF7000
heap
page read and write
5CA1000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
3AAF000
stack
page read and write
BF7000
heap
page read and write
BE4000
heap
page read and write
581B000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
F1F000
unkown
page execute and read and write
53AE000
stack
page read and write
B48000
heap
page read and write
5F11000
trusted library allocation
page read and write
487F000
stack
page read and write
5B0D000
trusted library allocation
page read and write
C0D000
heap
page read and write
4BE0000
heap
page read and write
4880000
direct allocation
page read and write
C06000
heap
page read and write
D30000
unkown
page readonly
D30000
unkown
page read and write
583C000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
DCE000
heap
page read and write
FA8000
unkown
page execute and read and write
582C000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
3C0E000
stack
page read and write
4811000
heap
page read and write
388E000
stack
page read and write
4D20000
direct allocation
page read and write
5F31000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
31EF000
stack
page read and write
3B0E000
stack
page read and write
4AD4000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5D82000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
BE4000
heap
page read and write
4B60000
heap
page execute and read and write
BE0000
heap
page read and write
2E6E000
stack
page read and write
BF0000
heap
page read and write
583C000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
58D6000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
58CD000
trusted library allocation
page read and write
11BE000
stack
page read and write
583C000
trusted library allocation
page read and write
4891000
heap
page read and write
58DD000
trusted library allocation
page read and write
400E000
stack
page read and write
565000
unkown
page execute and write copy
5B01000
trusted library allocation
page read and write
AFA000
stack
page read and write
2E8E000
stack
page read and write
5895000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
58CF000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
4CD000
unkown
page execute and write copy
4E4000
unkown
page execute and read and write
5860000
trusted library allocation
page read and write
503000
unkown
page execute and read and write
5EDB000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
5C76000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
58F8000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
5ED9000
trusted library allocation
page read and write
35AF000
stack
page read and write
583C000
trusted library allocation
page read and write
1020000
unkown
page execute and read and write
6514000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
6FCE000
stack
page read and write
D96000
unkown
page execute and read and write
51A0000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
F74000
unkown
page execute and read and write
5AC000
unkown
page execute and write copy
B10000
heap
page read and write
100F000
unkown
page execute and write copy
BEC000
heap
page read and write
7D4000
heap
page read and write
5D3C000
trusted library allocation
page read and write
D2D000
heap
page read and write
1037000
unkown
page execute and write copy
5DDF000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
58AC000
trusted library allocation
page read and write
590A000
trusted library allocation
page read and write
4811000
heap
page read and write
5CA5000
trusted library allocation
page read and write
11BE000
stack
page read and write
5900000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
C0D000
heap
page read and write
5DF6000
trusted library allocation
page read and write
3FEE000
stack
page read and write
508000
unkown
page execute and write copy
5EDD000
trusted library allocation
page read and write
28C0000
heap
page read and write
5D63000
trusted library allocation
page read and write
D31000
unkown
page execute and write copy
F93000
unkown
page execute and write copy
58F8000
trusted library allocation
page read and write
FA5000
unkown
page execute and write copy
57D0000
heap
page read and write
582C000
trusted library allocation
page read and write
4E5F000
stack
page read and write
C0E000
heap
page read and write
60A000
unkown
page execute and read and write
5895000
trusted library allocation
page read and write
5D92000
trusted library allocation
page read and write
F2F000
unkown
page execute and read and write
BDE000
heap
page read and write
BF1000
heap
page read and write
5CA2000
trusted library allocation
page read and write
463E000
stack
page read and write
5DEF000
trusted library allocation
page read and write
4D20000
direct allocation
page read and write
4AF0000
trusted library allocation
page read and write
C09000
heap
page read and write
5E43000
trusted library allocation
page read and write
C03000
heap
page read and write
5E8D000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
7D4000
heap
page read and write
5CA1000
trusted library allocation
page read and write
7D4000
heap
page read and write
5809000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
58A1000
trusted library allocation
page read and write
7D4000
heap
page read and write
5DB9000
trusted library allocation
page read and write
4BAC000
stack
page read and write
BEA000
heap
page read and write
D95000
unkown
page execute and write copy
580B000
trusted library allocation
page read and write
BE4000
heap
page read and write
5821000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
C06000
heap
page read and write
5D86000
trusted library allocation
page read and write
5B3E000
trusted library allocation
page read and write
5D9E000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5931000
trusted library allocation
page read and write
727E000
stack
page read and write
5DE2000
trusted library allocation
page read and write
285F000
stack
page read and write
5D74000
trusted library allocation
page read and write
588E000
trusted library allocation
page read and write
7D4000
heap
page read and write
58FD000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
7D4000
heap
page read and write
58A1000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
4CEE000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
39CE000
stack
page read and write
5899000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
BE4000
heap
page read and write
3FAF000
stack
page read and write
5907000
trusted library allocation
page read and write
C0E000
heap
page read and write
D27000
heap
page read and write
581B000
trusted library allocation
page read and write
BF6000
heap
page read and write
5899000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
58A6000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
5838000
trusted library allocation
page read and write
4811000
heap
page read and write
5D40000
trusted library allocation
page read and write
2F8F000
stack
page read and write
4E80000
direct allocation
page execute and read and write
583C000
trusted library allocation
page read and write
E08000
heap
page read and write
4891000
heap
page read and write
E00000
heap
page read and write
5859000
trusted library allocation
page read and write
43BE000
stack
page read and write
5CA2000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5E8F000
trusted library allocation
page read and write
7D4000
heap
page read and write
427E000
stack
page read and write
582B000
trusted library allocation
page read and write
30EE000
stack
page read and write
EEF000
unkown
page execute and read and write
5B07000
trusted library allocation
page read and write
FCA000
unkown
page execute and write copy
5896000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
4891000
heap
page read and write
60C000
unkown
page execute and write copy
4811000
heap
page read and write
60A000
unkown
page execute and write copy
4EA0000
direct allocation
page execute and read and write
582C000
trusted library allocation
page read and write
4D10000
remote allocation
page read and write
BE4000
heap
page read and write
4EAD000
stack
page read and write
34AE000
stack
page read and write
5CA5000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
3ACF000
stack
page read and write
C06000
heap
page read and write
7D4000
heap
page read and write
4880000
direct allocation
page read and write
4891000
heap
page read and write
36EF000
stack
page read and write
49A0000
heap
page read and write
F9B000
unkown
page execute and write copy
BE2000
heap
page read and write
BE8000
heap
page read and write
BE4000
heap
page read and write
5822000
trusted library allocation
page read and write
1027000
unkown
page execute and write copy
4EA0000
direct allocation
page execute and read and write
7D4000
heap
page read and write
591F000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
502000
unkown
page execute and write copy
DC0000
heap
page read and write
BFD000
heap
page read and write
58DC000
trusted library allocation
page read and write
5D88000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
5E0D000
trusted library allocation
page read and write
64B1000
trusted library allocation
page read and write
BEA000
heap
page read and write
12BF000
stack
page read and write
582C000
trusted library allocation
page read and write
382F000
stack
page read and write
44FE000
stack
page read and write
BE4000
heap
page read and write
5CA3000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
428E000
stack
page read and write
580E000
trusted library allocation
page read and write
564000
unkown
page execute and read and write
53ED000
stack
page read and write
50B000
unkown
page execute and read and write
B88000
heap
page read and write
1027000
unkown
page execute and write copy
4EF3000
trusted library allocation
page read and write
D20000
heap
page read and write
384F000
stack
page read and write
582A000
trusted library allocation
page read and write
1036000
unkown
page execute and write copy
583F000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
BE4000
heap
page read and write
58FE000
trusted library allocation
page read and write
50A5000
trusted library allocation
page read and write
396F000
stack
page read and write
58FE000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
BE6000
heap
page read and write
4230000
heap
page read and write
589A000
trusted library allocation
page read and write
7D0000
heap
page read and write
5896000
trusted library allocation
page read and write
B52000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
5CAC000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
5CA3000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
58C5000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
3BEF000
stack
page read and write
58E9000
trusted library allocation
page read and write
7D4000
heap
page read and write
583C000
trusted library allocation
page read and write
7D4000
heap
page read and write
FA3000
unkown
page execute and write copy
B4E000
stack
page read and write
5899000
trusted library allocation
page read and write
5A3C000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
B1A000
heap
page read and write
28B0000
direct allocation
page read and write
5D54000
trusted library allocation
page read and write
289E000
stack
page read and write
5919000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
F1E000
unkown
page execute and write copy
4AE0000
trusted library allocation
page read and write
1036000
unkown
page execute and read and write
59D000
unkown
page execute and read and write
5EC0000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
79B000
stack
page read and write
4910000
heap
page read and write
5D4E000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
322E000
stack
page read and write
5D3E000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
5CF1000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
4821000
heap
page read and write
2AAE000
stack
page read and write
B1E000
heap
page read and write
58A1000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
C0D000
heap
page read and write
5806000
trusted library allocation
page read and write
C0E000
heap
page read and write
2E4F000
stack
page read and write
5E45000
trusted library allocation
page read and write
414E000
stack
page read and write
5CA6000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
D8B000
unkown
page execute and write copy
565F000
stack
page read and write
5D7C000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
58E0000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
589E000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
BF6000
heap
page read and write
5806000
trusted library allocation
page read and write
117E000
stack
page read and write
583C000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
547000
unkown
page execute and read and write
346F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
5919000
trusted library allocation
page read and write
5E0F000
trusted library allocation
page read and write
BE4000
heap
page read and write
581B000
trusted library allocation
page read and write
69C000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
58EE000
trusted library allocation
page read and write
6E8D000
stack
page read and write
4D20000
direct allocation
page read and write
5901000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
F56000
unkown
page execute and read and write
4960000
direct allocation
page read and write
64A4000
trusted library allocation
page read and write
5833000
trusted library allocation
page read and write
588000
unkown
page execute and write copy
5CAA000
trusted library allocation
page read and write
7D4000
heap
page read and write
E52000
heap
page read and write
370F000
stack
page read and write
5EAE000
trusted library allocation
page read and write
4FED000
stack
page read and write
58CF000
trusted library allocation
page read and write
35EE000
stack
page read and write
5CA8000
trusted library allocation
page read and write
7D4000
heap
page read and write
5D84000
trusted library allocation
page read and write
4891000
heap
page read and write
5BE6000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
717E000
stack
page read and write
28B0000
direct allocation
page read and write
4D5C000
stack
page read and write
5908000
trusted library allocation
page read and write
BF0000
heap
page read and write
5CA5000
trusted library allocation
page read and write
4811000
heap
page read and write
620F000
trusted library allocation
page read and write
5EDF000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
5E8D000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
F94000
unkown
page execute and read and write
5D6F000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
F9C000
unkown
page execute and read and write
58E0000
trusted library allocation
page read and write
3E6F000
stack
page read and write
29CF000
stack
page read and write
5D96000
trusted library allocation
page read and write
4FB000
unkown
page execute and read and write
516E000
stack
page read and write
581B000
trusted library allocation
page read and write
C06000
heap
page read and write
582B000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
5F0F000
trusted library allocation
page read and write
4FA000
unkown
page execute and write copy
581B000
trusted library allocation
page read and write
DCA000
heap
page read and write
28B0000
direct allocation
page read and write
5CA0000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
51C6000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
58C8000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
5B26000
trusted library allocation
page read and write
C08000
heap
page read and write
5939000
trusted library allocation
page read and write
5838000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
BE6000
heap
page read and write
5838000
trusted library allocation
page read and write
54EE000
stack
page read and write
5CA2000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
7D4000
heap
page read and write
581B000
trusted library allocation
page read and write
372E000
stack
page read and write
28B0000
direct allocation
page read and write
5880000
trusted library allocation
page read and write
D6B000
stack
page read and write
5907000
trusted library allocation
page read and write
FB5000
unkown
page execute and write copy
7D4000
heap
page read and write
BE6000
heap
page read and write
5DF1000
trusted library allocation
page read and write
FD6000
unkown
page execute and read and write
5CA8000
trusted library allocation
page read and write
30CF000
stack
page read and write
DB0000
direct allocation
page read and write
398F000
stack
page read and write
583C000
trusted library allocation
page read and write
43CE000
stack
page read and write
4AEA000
trusted library allocation
page execute and read and write
5CA6000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
4960000
direct allocation
page read and write
589E000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
D97000
unkown
page execute and write copy
58A1000
trusted library allocation
page read and write
58C000
unkown
page execute and write copy
28B0000
direct allocation
page read and write
BE4000
heap
page read and write
4ACD000
trusted library allocation
page execute and read and write
52D000
unkown
page execute and read and write
4890000
heap
page read and write
7D4000
heap
page read and write
581B000
trusted library allocation
page read and write
58CA000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
C03000
heap
page read and write
28B0000
direct allocation
page read and write
5DDF000
trusted library allocation
page read and write
E54000
heap
page read and write
5DA0000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
B92000
heap
page read and write
2D4E000
stack
page read and write
5CAC000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
4CD0000
heap
page read and write
332F000
stack
page read and write
5DAB000
trusted library allocation
page read and write
B8C000
heap
page read and write
58A9000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
C03000
heap
page read and write
499B000
stack
page read and write
2E2F000
stack
page read and write
F28000
unkown
page execute and write copy
5CA7000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
5E3E000
trusted library allocation
page read and write
5BDE000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
3AEE000
stack
page read and write
542000
unkown
page execute and write copy
B48000
heap
page read and write
582C000
trusted library allocation
page read and write
360E000
stack
page read and write
4B10000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
4891000
heap
page read and write
58DB000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5E6D000
trusted library allocation
page read and write
52AD000
stack
page read and write
4950000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page execute and read and write
3D6E000
stack
page read and write
5E3A000
trusted library allocation
page read and write
FCC000
unkown
page execute and read and write
BEA000
heap
page read and write
582B000
trusted library allocation
page read and write
5896000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
B52000
heap
page read and write
4910000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
FB7000
unkown
page execute and read and write
700E000
stack
page read and write
4AC4000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
40EF000
stack
page read and write
581B000
trusted library allocation
page read and write
6397000
trusted library allocation
page read and write
BE4000
heap
page read and write
DAE000
stack
page read and write
BF6000
heap
page read and write
2BCF000
stack
page read and write
5CA8000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
C06000
heap
page read and write
477E000
stack
page read and write
FA4000
unkown
page execute and read and write
5908000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
CEF000
stack
page read and write
5DE4000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
EF1000
unkown
page execute and write copy
581F000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
573000
unkown
page execute and read and write
5839000
trusted library allocation
page read and write
7D4000
heap
page read and write
5CA2000
trusted library allocation
page read and write
3EAD000
stack
page read and write
362000
unkown
page execute and read and write
5BA000
unkown
page execute and read and write
BE8000
heap
page read and write
B43000
heap
page read and write
C0B000
heap
page read and write
583C000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
2D0F000
stack
page read and write
581B000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
1021000
unkown
page execute and write copy
5CAC000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
6ECE000
stack
page read and write
5DDD000
trusted library allocation
page read and write
7D4000
heap
page read and write
5D71000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
58A000
unkown
page execute and write copy
5DC9000
trusted library allocation
page read and write
7D4000
heap
page read and write
B70000
heap
page read and write
60C000
unkown
page execute and write copy
B5E000
heap
page read and write
FF3000
unkown
page execute and read and write
5D50000
trusted library allocation
page read and write
44BF000
stack
page read and write
5CA8000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
3FCF000
stack
page read and write
F14000
unkown
page execute and write copy
582C000
trusted library allocation
page read and write
B8B000
heap
page read and write
5D73000
trusted library allocation
page read and write
F86000
unkown
page execute and write copy
5B05000
trusted library allocation
page read and write
BE4000
heap
page read and write
5F3000
unkown
page execute and write copy
3D4F000
stack
page read and write
51B8000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
BEA000
heap
page read and write
5896000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
5EFF000
trusted library allocation
page read and write
DFE000
heap
page read and write
E3C000
heap
page read and write
2CEF000
stack
page read and write
58E9000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
E1C000
heap
page read and write
5AD000
unkown
page execute and read and write
59B000
unkown
page execute and write copy
580A000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
3D2F000
stack
page read and write
4880000
direct allocation
page read and write
360000
unkown
page read and write
5CAD000
trusted library allocation
page read and write
3C4E000
stack
page read and write
5EAC000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
BE4000
heap
page read and write
5DBB000
trusted library allocation
page read and write
360000
unkown
page readonly
34CE000
stack
page read and write
58D9000
trusted library allocation
page read and write
502D000
stack
page read and write
5DBD000
trusted library allocation
page read and write
336E000
stack
page read and write
5D52000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
BE6000
heap
page read and write
5D69000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
536000
unkown
page execute and read and write
581F000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
B5E000
heap
page read and write
BEA000
heap
page read and write
5EBE000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
5D93000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5FB000
unkown
page execute and write copy
5E0E000
trusted library allocation
page read and write
107E000
stack
page read and write
BEA000
heap
page read and write
5937000
trusted library allocation
page read and write
BEA000
heap
page read and write
320F000
stack
page read and write
4D10000
remote allocation
page read and write
5DCB000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
30AF000
stack
page read and write
F4D000
unkown
page execute and write copy
5DCF000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
4891000
heap
page read and write
799000
stack
page read and write
44CF000
stack
page read and write
581B000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
4810000
heap
page read and write
5806000
trusted library allocation
page read and write
E10000
heap
page read and write
366000
unkown
page write copy
583C000
trusted library allocation
page read and write
562000
unkown
page execute and write copy
5939000
trusted library allocation
page read and write
58A9000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
BB0000
heap
page read and write
5826000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
4EF000
unkown
page execute and read and write
58B2000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
58F8000
trusted library allocation
page read and write
57BF000
stack
page read and write
7D4000
heap
page read and write
5800000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
BFF000
heap
page read and write
583C000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5FB000
unkown
page execute and write copy
4891000
heap
page read and write
5CA3000
trusted library allocation
page read and write
362000
unkown
page execute and write copy
310E000
stack
page read and write
5E6B000
trusted library allocation
page read and write
F7E000
unkown
page execute and read and write
58D0000
trusted library allocation
page read and write
437F000
stack
page read and write
583C000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
5896000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
C0B000
heap
page read and write
4880000
direct allocation
page read and write
5CAF000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
412E000
stack
page read and write
5901000
trusted library allocation
page read and write
A00000
heap
page read and write
4AC3000
trusted library allocation
page execute and read and write
2ACF000
stack
page read and write
583C000
trusted library allocation
page read and write
581000
unkown
page execute and read and write
5CAB000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
FD5000
unkown
page execute and write copy
2BEB000
stack
page read and write
583D000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
7D4000
heap
page read and write
581B000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
B70000
heap
page read and write
3C2E000
stack
page read and write
BFF000
heap
page read and write
FA9000
unkown
page execute and write copy
2C0E000
stack
page read and write
CE0000
heap
page read and write
BDE000
heap
page read and write
5CA3000
trusted library allocation
page read and write
56F000
unkown
page execute and read and write
5F01000
trusted library allocation
page read and write
5B9000
unkown
page execute and write copy
589E000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
570000
unkown
page execute and write copy
5F18000
trusted library allocation
page read and write
BF3000
heap
page read and write
7D4000
heap
page read and write
5833000
trusted library allocation
page read and write
45FF000
stack
page read and write
5839000
trusted library allocation
page read and write
4B5E000
stack
page read and write
582C000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
B9E000
stack
page read and write
4EA0000
direct allocation
page execute and read and write
C08000
heap
page read and write
58FE000
trusted library allocation
page read and write
5CAC000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
BEA000
heap
page read and write
BFF000
heap
page read and write
7D4000
heap
page read and write
583C000
trusted library allocation
page read and write
FAD000
unkown
page execute and read and write
36A000
unkown
page execute and write copy
5DD3000
trusted library allocation
page read and write
35CF000
stack
page read and write
5CA5000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
4EE000
unkown
page execute and write copy
58A2000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
BF0000
heap
page read and write
6005000
trusted library allocation
page read and write
59A2000
trusted library allocation
page read and write
376000
unkown
page execute and write copy
5D63000
trusted library allocation
page read and write
422F000
stack
page read and write
334F000
stack
page read and write
5D54000
trusted library allocation
page read and write
7D4000
heap
page read and write
348F000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
BEA000
heap
page read and write
5BD6000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5D94000
trusted library allocation
page read and write
1020000
unkown
page execute and write copy
39AE000
stack
page read and write
504000
unkown
page execute and write copy
5CF4000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
28B0000
direct allocation
page read and write
5CA4000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
366000
unkown
page write copy
5828000
trusted library allocation
page read and write
3E8F000
stack
page read and write
5F2F000
trusted library allocation
page read and write
512D000
stack
page read and write
507000
unkown
page execute and read and write
583C000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page execute and read and write
5859000
trusted library allocation
page read and write
526F000
stack
page read and write
5CA7000
trusted library allocation
page read and write
3D8E000
stack
page read and write
5DEC000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
521000
unkown
page execute and write copy
BE8000
heap
page read and write
2FCE000
stack
page read and write
5CA0000
trusted library allocation
page read and write
51B1000
trusted library allocation
page read and write
D2E000
stack
page read and write
58D5000
trusted library allocation
page read and write
D8B000
unkown
page execute and read and write
338E000
stack
page read and write
BF0000
heap
page read and write
5B02000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
B00000
heap
page read and write
BEA000
heap
page read and write
BA7000
heap
page read and write
2F6F000
stack
page read and write
582C000
trusted library allocation
page read and write
B54000
heap
page read and write
4960000
direct allocation
page read and write
BE4000
heap
page read and write
580E000
trusted library allocation
page read and write
2BAF000
stack
page read and write
58FE000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
B54000
heap
page read and write
AE0000
heap
page read and write
58DA000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
592000
unkown
page execute and read and write
5B07000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
7D4000
heap
page read and write
F7B000
unkown
page execute and write copy
5D7E000
trusted library allocation
page read and write
583C000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
2D2E000
stack
page read and write
5CA5000
trusted library allocation
page read and write
4CF1000
trusted library allocation
page read and write
374E000
stack
page read and write
4ED0000
direct allocation
page execute and read and write
5898000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
BE4000
heap
page read and write
BE6000
heap
page read and write
5BAE000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
3ECE000
stack
page read and write
582C000
trusted library allocation
page read and write
5D85000
trusted library allocation
page read and write
F8B000
unkown
page execute and read and write
5919000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
2FAE000
stack
page read and write
B88000
heap
page read and write
BE4000
heap
page read and write
5829000
trusted library allocation
page read and write
BF0000
heap
page read and write
589000
unkown
page execute and read and write
BE4000
heap
page read and write
28B0000
direct allocation
page read and write
583C000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
4D10000
remote allocation
page read and write
56BE000
stack
page read and write
57F000
unkown
page execute and write copy
324E000
stack
page read and write
6211000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
58B000
unkown
page execute and read and write
473F000
stack
page read and write
36A000
unkown
page execute and read and write
58D6000
trusted library allocation
page read and write
BE8000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
5901000
trusted library allocation
page read and write
BE4000
heap
page read and write
5D83000
trusted library allocation
page read and write
BE4000
heap
page read and write
5CA2000
trusted library allocation
page read and write
438F000
stack
page read and write
5CA1000
trusted library allocation
page read and write
7070000
heap
page execute and read and write
28C7000
heap
page read and write
582B000
trusted library allocation
page read and write
4811000
heap
page read and write
5D5D000
trusted library allocation
page read and write
4AF7000
trusted library allocation
page execute and read and write
4AAE000
stack
page read and write
There are 956 hidden memdumps, click here to show them.