IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\TAW4YM7XHY64JPKK4AWZZOV.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TAW4YM7XHY64JPKK4AWZZOV.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\TAW4YM7XHY64JPKK4AWZZOV.exe
"C:\Users\user\AppData\Local\Temp\TAW4YM7XHY64JPKK4AWZZOV.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://crisiwarny.store/_
unknown
https://presticitpo.store:443/apia
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://crisiwarny.store/a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://crisiwarny.store/h
unknown
http://185.215.113.16/off/def.exeDa
unknown
https://crisiwarny.store/apiV4I
unknown
https://crisiwarny.store/apig1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://crisiwarny.store:443/apiohrz.default-release/key4.dbPK
unknown
https://crisiwarny.store/apipw
unknown
https://crisiwarny.store:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/apia5
unknown
http://185.215.113.16:80/off/def.exerosoft
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://crisiwarny.store/apit
unknown
https://crisiwarny.store:443/apitxtPK
unknown
https://crisiwarny.store/api.
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://presticitpo.store:443/api
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://crisiwarny.store/fijngjgc
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/aping
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
5E71000
trusted library allocation
page read and write
malicious
D81000
unkown
page execute and read and write
malicious
5E71000
trusted library allocation
page read and write
malicious
5E71000
trusted library allocation
page read and write
malicious
4D90000
direct allocation
page read and write
F33000
unkown
page execute and read and write
6316000
trusted library allocation
page read and write
18D5000
heap
page read and write
63FF000
trusted library allocation
page read and write
EF1000
unkown
page execute and write copy
177F000
stack
page read and write
EE8000
unkown
page execute and read and write
1938000
heap
page read and write
192A000
heap
page read and write
5EA6000
trusted library allocation
page read and write
6474000
trusted library allocation
page read and write
3EBF000
stack
page read and write
5EA4000
trusted library allocation
page read and write
5F9F000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
6443000
trusted library allocation
page read and write
189E000
heap
page read and write
5E72000
trusted library allocation
page read and write
5E8F000
trusted library allocation
page read and write
1945000
heap
page read and write
5BCE000
stack
page read and write
F65000
unkown
page execute and read and write
6320000
trusted library allocation
page read and write
5EA8000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
E8C000
unkown
page execute and write copy
18D6000
heap
page read and write
649E000
trusted library allocation
page read and write
18EF000
heap
page read and write
1883000
heap
page read and write
6401000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
5F4A000
trusted library allocation
page read and write
631E000
trusted library allocation
page read and write
631F000
trusted library allocation
page read and write
64A2000
trusted library allocation
page read and write
5FA7000
trusted library allocation
page read and write
1947000
heap
page read and write
5E8A000
trusted library allocation
page read and write
1674000
heap
page read and write
1932000
heap
page read and write
194E000
heap
page read and write
617C000
trusted library allocation
page read and write
3C7E000
stack
page read and write
6313000
trusted library allocation
page read and write
1927000
heap
page read and write
4ECE000
stack
page read and write
6458000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
F6F000
unkown
page execute and read and write
1001000
unkown
page execute and write copy
644E000
trusted library allocation
page read and write
FF8000
unkown
page execute and read and write
619E000
trusted library allocation
page read and write
1938000
heap
page read and write
30DF000
stack
page read and write
193F000
heap
page read and write
43DE000
stack
page read and write
1674000
heap
page read and write
F12000
unkown
page execute and write copy
10FE000
heap
page read and write
5E72000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
194C000
heap
page read and write
1947000
heap
page read and write
766E000
stack
page read and write
5E7D000
trusted library allocation
page read and write
BA4000
heap
page read and write
5EA6000
trusted library allocation
page read and write
18D8000
heap
page read and write
63FA000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
1927000
heap
page read and write
5E8D000
trusted library allocation
page read and write
5F48000
trusted library allocation
page read and write
6321000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
39FE000
stack
page read and write
5340000
heap
page read and write
631C000
trusted library allocation
page read and write
1946000
heap
page read and write
631D000
trusted library allocation
page read and write
189E000
heap
page read and write
10DE000
heap
page read and write
4C42000
heap
page read and write
5EB9000
trusted library allocation
page read and write
1840000
direct allocation
page read and write
CEA000
unkown
page execute and read and write
1888000
heap
page read and write
1840000
direct allocation
page read and write
193F000
heap
page read and write
F57000
unkown
page execute and read and write
1102000
heap
page read and write
5EA8000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
43BF000
stack
page read and write
5F1E000
trusted library allocation
page read and write
4F01000
heap
page read and write
1674000
heap
page read and write
4C20000
direct allocation
page read and write
5EA6000
trusted library allocation
page read and write
63D2000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
411F000
stack
page read and write
4FC0000
heap
page read and write
4EE0000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
F9B000
unkown
page execute and write copy
F6F000
unkown
page execute and write copy
CBE000
stack
page read and write
631A000
trusted library allocation
page read and write
60BD000
trusted library allocation
page read and write
18B0000
heap
page read and write
6312000
trusted library allocation
page read and write
1946000
heap
page read and write
1949000
heap
page read and write
EE3000
unkown
page execute and read and write
6319000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
BA4000
heap
page read and write
5E95000
trusted library allocation
page read and write
F03000
unkown
page execute and write copy
1926000
heap
page read and write
6173000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
DDB000
unkown
page execute and write copy
1888000
heap
page read and write
6319000
trusted library allocation
page read and write
1938000
heap
page read and write
6318000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
2BD7000
heap
page read and write
5E85000
trusted library allocation
page read and write
193D000
heap
page read and write
5E72000
trusted library allocation
page read and write
6314000
trusted library allocation
page read and write
1674000
heap
page read and write
63C9000
trusted library allocation
page read and write
61B6000
trusted library allocation
page read and write
1674000
heap
page read and write
6317000
trusted library allocation
page read and write
3E9F000
stack
page read and write
1947000
heap
page read and write
5F82000
trusted library allocation
page read and write
6403000
trusted library allocation
page read and write
5380000
remote allocation
page read and write
5E71000
trusted library allocation
page read and write
BA4000
heap
page read and write
3D5F000
stack
page read and write
1674000
heap
page read and write
63FC000
trusted library allocation
page read and write
5000000
heap
page execute and read and write
332E000
stack
page read and write
63B4000
trusted library allocation
page read and write
641A000
trusted library allocation
page read and write
1899000
heap
page read and write
63B6000
trusted library allocation
page read and write
E70000
unkown
page execute and read and write
631B000
trusted library allocation
page read and write
F8E000
unkown
page execute and read and write
1840000
direct allocation
page read and write
1946000
heap
page read and write
6111000
trusted library allocation
page read and write
BA4000
heap
page read and write
1938000
heap
page read and write
EF4000
unkown
page execute and read and write
1949000
heap
page read and write
429E000
stack
page read and write
4F60000
heap
page read and write
33B7000
heap
page read and write
192E000
heap
page read and write
5E72000
trusted library allocation
page read and write
601E000
trusted library allocation
page read and write
5E72000
trusted library allocation
page read and write
F69000
unkown
page execute and write copy
631D000
trusted library allocation
page read and write
4C00000
direct allocation
page read and write
5EA6000
trusted library allocation
page read and write
1946000
heap
page read and write
1946000
heap
page read and write
461F000
stack
page read and write
185A000
heap
page read and write
5E72000
trusted library allocation
page read and write
BA0000
heap
page read and write
D80000
unkown
page readonly
64DD000
trusted library allocation
page read and write
5F07000
trusted library allocation
page read and write
742E000
stack
page read and write
5EA6000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
1927000
heap
page read and write
EA2000
unkown
page execute and write copy
5F07000
trusted library allocation
page read and write
5520000
direct allocation
page execute and read and write
5F07000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
6316000
trusted library allocation
page read and write
4D40000
heap
page read and write
5E89000
trusted library allocation
page read and write
D80000
unkown
page read and write
192F000
heap
page read and write
657F000
trusted library allocation
page read and write
1674000
heap
page read and write
4C20000
direct allocation
page read and write
5F0D000
trusted library allocation
page read and write
F46000
unkown
page execute and read and write
631E000
trusted library allocation
page read and write
6316000
trusted library allocation
page read and write
4F10000
direct allocation
page execute and read and write
E69000
unkown
page execute and read and write
311E000
stack
page read and write
5F0D000
trusted library allocation
page read and write
FF6000
unkown
page execute and write copy
5E85000
trusted library allocation
page read and write
18B0000
heap
page read and write
4C20000
direct allocation
page read and write
2C1B000
stack
page read and write
5E8D000
trusted library allocation
page read and write
6468000
trusted library allocation
page read and write
752E000
stack
page read and write
4D30000
trusted library allocation
page read and write
5F1C000
trusted library allocation
page read and write
64DF000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
1674000
heap
page read and write
4D74000
trusted library allocation
page read and write
415E000
stack
page read and write
4F01000
heap
page read and write
3ADF000
stack
page read and write
18D6000
heap
page read and write
63CC000
trusted library allocation
page read and write
1674000
heap
page read and write
1927000
heap
page read and write
6316000
trusted library allocation
page read and write
BA4000
heap
page read and write
5F8F000
trusted library allocation
page read and write
5EA8000
trusted library allocation
page read and write
631F000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
5E86000
trusted library allocation
page read and write
349F000
stack
page read and write
1927000
heap
page read and write
54F0000
direct allocation
page execute and read and write
6313000
trusted library allocation
page read and write
631B000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
5E7A000
trusted library allocation
page read and write
6313000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
BA4000
heap
page read and write
5E72000
trusted library allocation
page read and write
183E000
stack
page read and write
FC8000
unkown
page execute and write copy
6206000
trusted library allocation
page read and write
10E8000
heap
page read and write
1840000
direct allocation
page read and write
4DCB000
stack
page read and write
5E7A000
trusted library allocation
page read and write
463E000
stack
page read and write
3D7E000
stack
page read and write
5E7A000
trusted library allocation
page read and write
1932000
heap
page read and write
5F05000
trusted library allocation
page read and write
1949000
heap
page read and write
5EA6000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
1926000
heap
page read and write
1674000
heap
page read and write
10AA000
heap
page read and write
32EF000
stack
page read and write
4B3F000
stack
page read and write
FE0000
unkown
page execute and write copy
5E95000
trusted library allocation
page read and write
321F000
stack
page read and write
EB6000
unkown
page execute and read and write
192E000
heap
page read and write
BA4000
heap
page read and write
6314000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
5E72000
trusted library allocation
page read and write
63D7000
trusted library allocation
page read and write
641D000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
189E000
heap
page read and write
FD4000
unkown
page execute and write copy
4C31000
heap
page read and write
6319000
trusted library allocation
page read and write
33AE000
stack
page read and write
5FBE000
trusted library allocation
page read and write
2F9F000
stack
page read and write
5F89000
trusted library allocation
page read and write
6427000
trusted library allocation
page read and write
63D4000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
631C000
trusted library allocation
page read and write
4CBE000
stack
page read and write
631D000
trusted library allocation
page read and write
5F79000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
1674000
heap
page read and write
DE5000
unkown
page execute and write copy
F81000
unkown
page execute and write copy
5EAC000
trusted library allocation
page read and write
631A000
trusted library allocation
page read and write
1923000
heap
page read and write
47BE000
stack
page read and write
5FBE000
trusted library allocation
page read and write
1674000
heap
page read and write
4D90000
direct allocation
page read and write
5F05000
trusted library allocation
page read and write
100D000
unkown
page execute and read and write
11EE000
stack
page read and write
4D60000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
5F0C000
trusted library allocation
page read and write
385F000
stack
page read and write
6315000
trusted library allocation
page read and write
5F3F000
trusted library allocation
page read and write
18EF000
heap
page read and write
CE2000
unkown
page execute and write copy
63F0000
trusted library allocation
page read and write
6500000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
72AD000
stack
page read and write
1180000
heap
page read and write
54E0000
direct allocation
page execute and read and write
1927000
heap
page read and write
2D1F000
stack
page read and write
194B000
heap
page read and write
641B000
trusted library allocation
page read and write
63B4000
trusted library allocation
page read and write
1938000
heap
page read and write
109F000
stack
page read and write
39BF000
stack
page read and write
10AE000
heap
page read and write
5E85000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
6313000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
F15000
unkown
page execute and write copy
451E000
stack
page read and write
5E81000
trusted library allocation
page read and write
160E000
stack
page read and write
5EC3000
trusted library allocation
page read and write
2E9E000
stack
page read and write
6315000
trusted library allocation
page read and write
18B0000
heap
page read and write
5E92000
trusted library allocation
page read and write
5E92000
trusted library allocation
page read and write
64DB000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
194E000
heap
page read and write
4EF7000
trusted library allocation
page execute and read and write
104A000
unkown
page execute and read and write
63C3000
trusted library allocation
page read and write
1946000
heap
page read and write
467E000
stack
page read and write
642D000
trusted library allocation
page read and write
43FE000
stack
page read and write
5E96000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
BA4000
heap
page read and write
417E000
stack
page read and write
6441000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
399F000
stack
page read and write
5E40000
heap
page read and write
371F000
stack
page read and write
6590000
trusted library allocation
page read and write
5A5D000
stack
page read and write
BA4000
heap
page read and write
5E95000
trusted library allocation
page read and write
6319000
trusted library allocation
page read and write
31EE000
stack
page read and write
5EB3000
trusted library allocation
page read and write
5CCF000
stack
page read and write
6315000
trusted library allocation
page read and write
565E000
stack
page read and write
631A000
trusted library allocation
page read and write
B70000
heap
page read and write
5E95000
trusted library allocation
page read and write
18D0000
heap
page read and write
5EA6000
trusted library allocation
page read and write
1946000
heap
page read and write
18D8000
heap
page read and write
1840000
direct allocation
page read and write
194B000
heap
page read and write
63FC000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
6529000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
5F77000
trusted library allocation
page read and write
65B3000
trusted library allocation
page read and write
F70000
unkown
page execute and read and write
BA4000
heap
page read and write
5F7A000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
6319000
trusted library allocation
page read and write
108C000
unkown
page execute and write copy
6318000
trusted library allocation
page read and write
E66000
unkown
page execute and write copy
F82000
unkown
page execute and read and write
5E72000
trusted library allocation
page read and write
1674000
heap
page read and write
5E86000
trusted library allocation
page read and write
6311000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
640C000
trusted library allocation
page read and write
63CF000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
193C000
heap
page read and write
64FE000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
6444000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
17BB000
stack
page read and write
5F89000
trusted library allocation
page read and write
18CA000
heap
page read and write
FE3000
unkown
page execute and read and write
F80000
unkown
page execute and write copy
631F000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
E54000
unkown
page execute and read and write
5E71000
trusted library allocation
page read and write
BA4000
heap
page read and write
5540000
direct allocation
page execute and read and write
193D000
heap
page read and write
5E86000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
6581000
trusted library allocation
page read and write
1946000
heap
page read and write
4C7F000
stack
page read and write
4DFE000
stack
page read and write
BA4000
heap
page read and write
4F01000
heap
page read and write
194E000
heap
page read and write
6316000
trusted library allocation
page read and write
F2E000
unkown
page execute and read and write
F3B000
unkown
page execute and write copy
5E86000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
F0A000
unkown
page execute and read and write
194B000
heap
page read and write
3AFF000
stack
page read and write
5E85000
trusted library allocation
page read and write
425F000
stack
page read and write
5E95000
trusted library allocation
page read and write
3C3F000
stack
page read and write
FCC000
unkown
page execute and read and write
5EA8000
trusted library allocation
page read and write
617D000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
5F4C000
trusted library allocation
page read and write
658E000
trusted library allocation
page read and write
18D8000
heap
page read and write
F6A000
unkown
page execute and read and write
631A000
trusted library allocation
page read and write
FEA000
unkown
page execute and write copy
35DF000
stack
page read and write
1840000
direct allocation
page read and write
652B000
trusted library allocation
page read and write
4FAC000
stack
page read and write
5F0C000
trusted library allocation
page read and write
63CA000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
111B000
stack
page read and write
F90000
unkown
page execute and write copy
DDB000
unkown
page execute and read and write
BA4000
heap
page read and write
5E95000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
640A000
trusted library allocation
page read and write
6175000
trusted library allocation
page read and write
48FE000
stack
page read and write
5E7A000
trusted library allocation
page read and write
389E000
stack
page read and write
18D8000
heap
page read and write
1674000
heap
page read and write
5F97000
trusted library allocation
page read and write
6314000
trusted library allocation
page read and write
10E0000
heap
page read and write
165E000
stack
page read and write
4F01000
heap
page read and write
6317000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
3C5E000
stack
page read and write
100B000
unkown
page execute and write copy
642D000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
4D73000
trusted library allocation
page execute and read and write
4C20000
direct allocation
page read and write
F8E000
unkown
page execute and write copy
37BF000
stack
page read and write
5E95000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
1938000
heap
page read and write
D81000
unkown
page execute and write copy
5EA3000
trusted library allocation
page read and write
11DE000
stack
page read and write
5FA9000
trusted library allocation
page read and write
E8E000
unkown
page execute and read and write
1949000
heap
page read and write
5E7A000
trusted library allocation
page read and write
63DA000
trusted library allocation
page read and write
6677000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6466000
trusted library allocation
page read and write
6442000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
18D4000
heap
page read and write
6476000
trusted library allocation
page read and write
6311000
trusted library allocation
page read and write
4F01000
heap
page read and write
1935000
heap
page read and write
591E000
stack
page read and write
648B000
trusted library allocation
page read and write
413F000
stack
page read and write
192F000
heap
page read and write
5F78000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
63CB000
trusted library allocation
page read and write
EAA000
unkown
page execute and write copy
617F000
trusted library allocation
page read and write
18D7000
heap
page read and write
5E76000
trusted library allocation
page read and write
E57000
unkown
page execute and write copy
6B81000
trusted library allocation
page read and write
5F0E000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
5E85000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
1674000
heap
page read and write
4F01000
heap
page read and write
194D000
heap
page read and write
3EFE000
stack
page read and write
5FA2000
trusted library allocation
page read and write
5F2C000
trusted library allocation
page read and write
2FDE000
stack
page read and write
6314000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
1895000
heap
page read and write
57DE000
stack
page read and write
4B7E000
stack
page read and write
4DBF000
stack
page read and write
5F07000
trusted library allocation
page read and write
BA4000
heap
page read and write
6441000
trusted library allocation
page read and write
648D000
trusted library allocation
page read and write
5EC3000
trusted library allocation
page read and write
1674000
heap
page read and write
107C000
unkown
page execute and write copy
18CB000
heap
page read and write
1923000
heap
page read and write
194B000
heap
page read and write
5E99000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
AF9000
stack
page read and write
FDF000
unkown
page execute and read and write
5E98000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
5FBD000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
4F5E000
stack
page read and write
6320000
trusted library allocation
page read and write
5E72000
trusted library allocation
page read and write
194E000
heap
page read and write
6176000
trusted library allocation
page read and write
48BF000
stack
page read and write
5F2E000
trusted library allocation
page read and write
6314000
trusted library allocation
page read and write
F2D000
unkown
page execute and write copy
18D5000
heap
page read and write
1949000
heap
page read and write
62EE000
trusted library allocation
page read and write
631E000
trusted library allocation
page read and write
DE7000
unkown
page execute and write copy
10F0000
heap
page read and write
6317000
trusted library allocation
page read and write
53CB000
stack
page read and write
5E7A000
trusted library allocation
page read and write
194B000
heap
page read and write
F14000
unkown
page execute and read and write
5E82000
trusted library allocation
page read and write
1927000
heap
page read and write
5F17000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
63FA000
trusted library allocation
page read and write
7FC000
stack
page read and write
551D000
stack
page read and write
579D000
stack
page read and write
5A1F000
stack
page read and write
101A000
unkown
page execute and write copy
4EFF000
stack
page read and write
1933000
heap
page read and write
479E000
stack
page read and write
5E95000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
1840000
direct allocation
page read and write
5E2F000
stack
page read and write
18BE000
heap
page read and write
5390000
direct allocation
page read and write
6320000
trusted library allocation
page read and write
64FA000
trusted library allocation
page read and write
CE6000
unkown
page write copy
5E72000
trusted library allocation
page read and write
4F01000
heap
page read and write
63BB000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
44FF000
stack
page read and write
4D80000
trusted library allocation
page read and write
63BD000
trusted library allocation
page read and write
64A5000
trusted library allocation
page read and write
4EFB000
trusted library allocation
page execute and read and write
1949000
heap
page read and write
6172000
trusted library allocation
page read and write
1670000
heap
page read and write
4C31000
heap
page read and write
6425000
trusted library allocation
page read and write
194B000
heap
page read and write
644C000
trusted library allocation
page read and write
194D000
heap
page read and write
6318000
trusted library allocation
page read and write
3FDF000
stack
page read and write
5E72000
trusted library allocation
page read and write
192A000
heap
page read and write
EC1000
unkown
page execute and write copy
194B000
heap
page read and write
631F000
trusted library allocation
page read and write
1946000
heap
page read and write
5500000
direct allocation
page execute and read and write
18D5000
heap
page read and write
375E000
stack
page read and write
DE6000
unkown
page execute and read and write
5E7A000
trusted library allocation
page read and write
CE2000
unkown
page execute and read and write
EC6000
unkown
page execute and read and write
5EAE000
trusted library allocation
page read and write
BA4000
heap
page read and write
643F000
trusted library allocation
page read and write
6428000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
1075000
unkown
page execute and write copy
1927000
heap
page read and write
14FA000
stack
page read and write
5F78000
trusted library allocation
page read and write
6319000
trusted library allocation
page read and write
403E000
stack
page read and write
5E76000
trusted library allocation
page read and write
1944000
heap
page read and write
1927000
heap
page read and write
34BF000
stack
page read and write
E70000
unkown
page execute and write copy
5E7A000
trusted library allocation
page read and write
625E000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
1934000
heap
page read and write
3FFF000
stack
page read and write
5FBD000
trusted library allocation
page read and write
58DE000
stack
page read and write
5E9D000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
36BF000
stack
page read and write
E65000
unkown
page execute and read and write
5E76000
trusted library allocation
page read and write
6316000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
64A3000
trusted library allocation
page read and write
1947000
heap
page read and write
18DC000
heap
page read and write
38BF000
stack
page read and write
1674000
heap
page read and write
F79000
unkown
page execute and write copy
18D6000
heap
page read and write
10A0000
heap
page read and write
631C000
trusted library allocation
page read and write
5D2E000
stack
page read and write
5E91000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
1946000
heap
page read and write
1938000
heap
page read and write
1938000
heap
page read and write
5E72000
trusted library allocation
page read and write
1949000
heap
page read and write
63B4000
trusted library allocation
page read and write
64CA000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
2BBF000
stack
page read and write
510F000
stack
page read and write
BA4000
heap
page read and write
5E95000
trusted library allocation
page read and write
FD8000
unkown
page execute and read and write
5E85000
trusted library allocation
page read and write
5FA4000
trusted library allocation
page read and write
63B9000
trusted library allocation
page read and write
193F000
heap
page read and write
6316000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
1840000
direct allocation
page read and write
6316000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
FEC000
unkown
page execute and write copy
BA4000
heap
page read and write
64CC000
trusted library allocation
page read and write
F90000
unkown
page execute and write copy
624E000
trusted library allocation
page read and write
2BD0000
heap
page read and write
5E7A000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
4F01000
heap
page read and write
1949000
heap
page read and write
6411000
trusted library allocation
page read and write
194D000
heap
page read and write
1674000
heap
page read and write
453E000
stack
page read and write
33BD000
heap
page read and write
631F000
trusted library allocation
page read and write
CE6000
unkown
page write copy
4EEA000
trusted library allocation
page execute and read and write
361E000
stack
page read and write
FEE000
unkown
page execute and read and write
4D84000
trusted library allocation
page read and write
631A000
trusted library allocation
page read and write
193D000
heap
page read and write
3EDE000
stack
page read and write
5566000
trusted library allocation
page read and write
5510000
direct allocation
page execute and read and write
569D000
stack
page read and write
4F00000
heap
page read and write
1943000
heap
page read and write
631D000
trusted library allocation
page read and write
4F01000
heap
page read and write
61D6000
trusted library allocation
page read and write
72EE000
stack
page read and write
5E7C000
trusted library allocation
page read and write
194B000
heap
page read and write
644E000
trusted library allocation
page read and write
CEA000
unkown
page execute and write copy
185E000
heap
page read and write
EA3000
unkown
page execute and read and write
4F10000
trusted library allocation
page read and write
34DE000
stack
page read and write
194E000
heap
page read and write
3DBE000
stack
page read and write
BA4000
heap
page read and write
6434000
trusted library allocation
page read and write
F99000
unkown
page execute and write copy
5E88000
trusted library allocation
page read and write
5530000
direct allocation
page execute and read and write
1946000
heap
page read and write
1674000
heap
page read and write
5EA6000
trusted library allocation
page read and write
5390000
direct allocation
page read and write
EB5000
unkown
page execute and write copy
1938000
heap
page read and write
1947000
heap
page read and write
54CF000
stack
page read and write
18DC000
heap
page read and write
4D90000
direct allocation
page read and write
5550000
direct allocation
page execute and read and write
1003000
unkown
page execute and read and write
194E000
heap
page read and write
5EFA000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
1949000
heap
page read and write
6456000
trusted library allocation
page read and write
194D000
heap
page read and write
6185000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
6413000
trusted library allocation
page read and write
18BE000
heap
page read and write
631A000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
642B000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
1922000
heap
page read and write
5E72000
trusted library allocation
page read and write
5E8C000
trusted library allocation
page read and write
336E000
stack
page read and write
1674000
heap
page read and write
5E72000
trusted library allocation
page read and write
5E99000
trusted library allocation
page read and write
644C000
trusted library allocation
page read and write
1660000
heap
page read and write
5EA6000
trusted library allocation
page read and write
63CD000
trusted library allocation
page read and write
4F10000
heap
page read and write
4C30000
heap
page read and write
1674000
heap
page read and write
5380000
remote allocation
page read and write
5FBE000
trusted library allocation
page read and write
5FA2000
trusted library allocation
page read and write
1170000
heap
page read and write
5E92000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
101E000
unkown
page execute and read and write
439F000
stack
page read and write
108B000
unkown
page execute and write copy
2BC0000
heap
page read and write
63BA000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
756E000
stack
page read and write
CF6000
unkown
page execute and write copy
1674000
heap
page read and write
631D000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
192E000
heap
page read and write
5E7E000
trusted library allocation
page read and write
6172000
trusted library allocation
page read and write
64FC000
trusted library allocation
page read and write
1949000
heap
page read and write
BA4000
heap
page read and write
1934000
heap
page read and write
63D7000
trusted library allocation
page read and write
194D000
heap
page read and write
1934000
heap
page read and write
5E95000
trusted library allocation
page read and write
1840000
direct allocation
page read and write
5E95000
trusted library allocation
page read and write
617B000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
5F07000
trusted library allocation
page read and write
6256000
trusted library allocation
page read and write
F30000
unkown
page execute and write copy
6426000
trusted library allocation
page read and write
1893000
heap
page read and write
5F05000
trusted library allocation
page read and write
3D9E000
stack
page read and write
5EA9000
trusted library allocation
page read and write
18D5000
heap
page read and write
631C000
trusted library allocation
page read and write
39DE000
stack
page read and write
63B8000
trusted library allocation
page read and write
F65000
unkown
page execute and write copy
3C1F000
stack
page read and write
65C0000
trusted library allocation
page read and write
6312000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
427F000
stack
page read and write
107C000
unkown
page execute and write copy
5FA1000
trusted library allocation
page read and write
2D5E000
stack
page read and write
6437000
trusted library allocation
page read and write
653B000
trusted library allocation
page read and write
63D8000
trusted library allocation
page read and write
6313000
trusted library allocation
page read and write
6561000
trusted library allocation
page read and write
335F000
stack
page read and write
5E85000
trusted library allocation
page read and write
339E000
stack
page read and write
44DF000
stack
page read and write
5111000
trusted library allocation
page read and write
642F000
trusted library allocation
page read and write
5380000
remote allocation
page read and write
1938000
heap
page read and write
4C20000
direct allocation
page read and write
5EB2000
trusted library allocation
page read and write
1932000
heap
page read and write
631A000
trusted library allocation
page read and write
FD9000
unkown
page execute and write copy
194E000
heap
page read and write
5510000
direct allocation
page execute and read and write
5E75000
trusted library allocation
page read and write
5EA3000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
63EE000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
42BE000
stack
page read and write
5340000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
401E000
stack
page read and write
B60000
heap
page read and write
475F000
stack
page read and write
5510000
direct allocation
page execute and read and write
5E85000
trusted library allocation
page read and write
6314000
trusted library allocation
page read and write
5EC7000
trusted library allocation
page read and write
5F0D000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
EE4000
unkown
page execute and write copy
5FBE000
trusted library allocation
page read and write
1949000
heap
page read and write
1949000
heap
page read and write
1674000
heap
page read and write
4C20000
direct allocation
page read and write
CE0000
unkown
page readonly
4D7D000
trusted library allocation
page execute and read and write
63B6000
trusted library allocation
page read and write
3B3E000
stack
page read and write
5E9C000
trusted library allocation
page read and write
FAD000
unkown
page execute and read and write
325E000
stack
page read and write
5F72000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
BA4000
heap
page read and write
108B000
unkown
page execute and read and write
5E72000
trusted library allocation
page read and write
63D9000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
6432000
trusted library allocation
page read and write
F6E000
unkown
page execute and write copy
5EA6000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
33B0000
heap
page read and write
6317000
trusted library allocation
page read and write
4C20000
direct allocation
page read and write
63EF000
trusted library allocation
page read and write
1893000
heap
page read and write
5F9F000
trusted library allocation
page read and write
1068000
unkown
page execute and write copy
5390000
direct allocation
page read and write
5E86000
trusted library allocation
page read and write
655F000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
1938000
heap
page read and write
5E81000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
64DD000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
631D000
trusted library allocation
page read and write
1946000
heap
page read and write
4C20000
direct allocation
page read and write
1937000
heap
page read and write
F9A000
unkown
page execute and read and write
FEB000
unkown
page execute and read and write
1840000
direct allocation
page read and write
5E89000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
17FE000
stack
page read and write
1927000
heap
page read and write
6313000
trusted library allocation
page read and write
63F3000
trusted library allocation
page read and write
49FF000
stack
page read and write
5E72000
trusted library allocation
page read and write
194E000
heap
page read and write
1935000
heap
page read and write
5510000
direct allocation
page execute and read and write
5F64000
trusted library allocation
page read and write
63BB000
trusted library allocation
page read and write
35BF000
stack
page read and write
CE0000
unkown
page read and write
192F000
heap
page read and write
1949000
heap
page read and write
5719000
trusted library allocation
page read and write
1075000
unkown
page execute and write copy
1674000
heap
page read and write
12DE000
stack
page read and write
F80000
unkown
page execute and write copy
73EE000
stack
page read and write
1933000
heap
page read and write
194E000
heap
page read and write
1840000
direct allocation
page read and write
5F9A000
trusted library allocation
page read and write
649E000
trusted library allocation
page read and write
BA4000
heap
page read and write
2ABE000
stack
page read and write
617A000
trusted library allocation
page read and write
5E76000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
631B000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
5F07000
trusted library allocation
page read and write
477F000
stack
page read and write
1674000
heap
page read and write
3B1E000
stack
page read and write
6314000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page execute and read and write
5FA1000
trusted library allocation
page read and write
1927000
heap
page read and write
1946000
heap
page read and write
1840000
direct allocation
page read and write
F3E000
unkown
page execute and read and write
1895000
heap
page read and write
6435000
trusted library allocation
page read and write
F48000
unkown
page execute and write copy
BA4000
heap
page read and write
1949000
heap
page read and write
5E86000
trusted library allocation
page read and write
6418000
trusted library allocation
page read and write
1840000
direct allocation
page read and write
4A3E000
stack
page read and write
ED6000
unkown
page execute and write copy
5E81000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
2E5F000
stack
page read and write
6315000
trusted library allocation
page read and write
193C000
heap
page read and write
1076000
unkown
page execute and read and write
6405000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
631B000
trusted library allocation
page read and write
F1F000
unkown
page execute and read and write
5E7A000
trusted library allocation
page read and write
1949000
heap
page read and write
6170000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
489F000
stack
page read and write
5E9A000
trusted library allocation
page read and write
6407000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
18DC000
heap
page read and write
5B5D000
stack
page read and write
EDA000
unkown
page execute and read and write
1850000
heap
page read and write
1949000
heap
page read and write
5E94000
trusted library allocation
page read and write
631C000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
EDB000
unkown
page execute and write copy
6405000
trusted library allocation
page read and write
1840000
direct allocation
page read and write
1077000
unkown
page execute and write copy
465E000
stack
page read and write
BA4000
heap
page read and write
6319000
trusted library allocation
page read and write
5F0C000
trusted library allocation
page read and write
1949000
heap
page read and write
18D8000
heap
page read and write
EB4000
unkown
page execute and read and write
4C20000
direct allocation
page read and write
18BE000
heap
page read and write
192D000
heap
page read and write
63D9000
trusted library allocation
page read and write
6312000
trusted library allocation
page read and write
There are 1055 hidden memdumps, click here to show them.