IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\V5GJ8YFILNHAP99OFNDK6O9IE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\V5GJ8YFILNHAP99OFNDK6O9IE.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\V5GJ8YFILNHAP99OFNDK6O9IE.exe
"C:\Users\user\AppData\Local\Temp\V5GJ8YFILNHAP99OFNDK6O9IE.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.16/off/def.exePuE
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://crisiwarny.store/P
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://crisiwarny.store/apire1
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://crisiwarny.store:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://185.215.113.16/z
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4
unknown
http://185.215.113.16:80/off/def.exerosoft
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/apijh
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
5579000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
D92000
unkown
page execute and read and write
1010000
heap
page read and write
5579000
trusted library allocation
page read and write
104E000
heap
page read and write
515B000
trusted library allocation
page execute and read and write
104A000
heap
page read and write
5575000
trusted library allocation
page read and write
559E000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
11FE000
stack
page read and write
4E80000
direct allocation
page read and write
5964000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
4EA0000
heap
page read and write
5B8D000
trusted library allocation
page read and write
F9C000
unkown
page execute and read and write
104B000
heap
page read and write
F06000
unkown
page execute and read and write
474F000
stack
page read and write
5564000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
F6C000
unkown
page execute and read and write
370F000
stack
page read and write
55F6000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
1010000
heap
page read and write
3ECE000
stack
page read and write
1052000
unkown
page execute and write copy
5210000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
596F000
trusted library allocation
page read and write
DCB000
trusted library allocation
page read and write
DC1000
trusted library allocation
page read and write
DCC000
trusted library allocation
page read and write
DC7000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
DC4000
trusted library allocation
page read and write
1070000
heap
page read and write
5A99000
trusted library allocation
page read and write
596F000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
F2B000
unkown
page execute and read and write
DCD000
trusted library allocation
page read and write
6414000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
320F000
stack
page read and write
2FCE000
stack
page read and write
55F8000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
55A9000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
FD3000
unkown
page execute and write copy
5962000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
DC9000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
561F000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
DB4000
heap
page read and write
FD7000
heap
page read and write
414E000
stack
page read and write
D9A000
unkown
page execute and read and write
2A70000
direct allocation
page execute and read and write
5576000
trusted library allocation
page read and write
1031000
heap
page read and write
5658000
trusted library allocation
page read and write
5619000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
34CE000
stack
page read and write
4E80000
direct allocation
page read and write
5571000
trusted library allocation
page read and write
101C000
heap
page read and write
626F000
trusted library allocation
page read and write
101E000
heap
page read and write
5961000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
FD6000
unkown
page execute and read and write
596B000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
5564000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
556F000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
1033000
heap
page read and write
558B000
trusted library allocation
page read and write
FCA000
heap
page read and write
5AD0000
trusted library allocation
page read and write
DC7000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
FC5000
unkown
page execute and write copy
DC2000
trusted library allocation
page read and write
1220000
heap
page read and write
FA4000
unkown
page execute and write copy
478E000
stack
page read and write
5669000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
DCF000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
48CE000
stack
page read and write
55F1000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
DCE000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
D90000
unkown
page readonly
5635000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
D90000
unkown
page read and write
4FE0000
direct allocation
page read and write
DC9000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
DC9000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
4FCD000
trusted library allocation
page execute and read and write
596A000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
2D87000
heap
page read and write
4E80000
direct allocation
page read and write
5588000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
55A0000
trusted library allocation
page read and write
DCB000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
103A000
heap
page read and write
5575000
trusted library allocation
page read and write
DB4000
heap
page read and write
1250000
heap
page read and write
5786000
trusted library allocation
page read and write
4A0E000
stack
page read and write
2A80000
direct allocation
page execute and read and write
FCD000
heap
page read and write
DB4000
heap
page read and write
5962000
trusted library allocation
page read and write
DB4000
heap
page read and write
565A000
trusted library allocation
page read and write
5588000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
4A70000
direct allocation
page read and write
DCA000
trusted library allocation
page read and write
1052000
unkown
page execute and read and write
DB4000
heap
page read and write
55A0000
trusted library allocation
page read and write
4EAE000
trusted library allocation
page read and write
1043000
unkown
page execute and write copy
FF3000
unkown
page execute and write copy
5C29000
trusted library allocation
page read and write
1043000
unkown
page execute and write copy
DC0000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
5566000
trusted library allocation
page read and write
49CF000
stack
page read and write
4E91000
heap
page read and write
F40000
direct allocation
page execute and read and write
5596000
trusted library allocation
page read and write
3E8F000
stack
page read and write
F43000
unkown
page execute and write copy
5965000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
758E000
stack
page read and write
DC6000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
45F1000
heap
page read and write
5966000
trusted library allocation
page read and write
154F000
stack
page read and write
55A0000
trusted library allocation
page read and write
51BE000
stack
page read and write
45F1000
heap
page read and write
55A0000
trusted library allocation
page read and write
DA6000
unkown
page execute and write copy
5586000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
360E000
stack
page read and write
5586000
trusted library allocation
page read and write
5574000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
1035000
heap
page read and write
4FFA000
trusted library allocation
page execute and read and write
75E0000
heap
page execute and read and write
5966000
trusted library allocation
page read and write
1030000
heap
page read and write
388E000
stack
page read and write
754E000
stack
page read and write
55A0000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
1037000
heap
page read and write
4E91000
heap
page read and write
D92000
unkown
page execute and write copy
5586000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
1033000
heap
page read and write
556B000
trusted library allocation
page read and write
460F000
stack
page read and write
5CB000
unkown
page execute and write copy
5566000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
35CF000
stack
page read and write
1022000
heap
page read and write
4E80000
direct allocation
page read and write
DC9000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
45F1000
heap
page read and write
4E91000
heap
page read and write
DB4000
heap
page read and write
55FD000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
D9A000
unkown
page execute and write copy
DD1000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
4E91000
heap
page read and write
4FB0000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
1030000
heap
page read and write
5586000
trusted library allocation
page read and write
DB4000
heap
page read and write
5631000
trusted library allocation
page read and write
F9A000
unkown
page execute and write copy
5964000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
1150000
heap
page read and write
9E0000
direct allocation
page read and write
540F000
stack
page read and write
5586000
trusted library allocation
page read and write
F40000
unkown
page execute and write copy
5962000
trusted library allocation
page read and write
12AB000
heap
page read and write
5964000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
1033000
heap
page read and write
2A80000
direct allocation
page execute and read and write
2F8F000
stack
page read and write
570000
unkown
page readonly
F6D000
unkown
page execute and write copy
1022000
heap
page read and write
5557000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
374E000
stack
page read and write
5BF6000
trusted library allocation
page read and write
4D99000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
DC3000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
DB4000
heap
page read and write
5589000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
3B0E000
stack
page read and write
1034000
heap
page read and write
556B000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
FE0000
unkown
page execute and read and write
DC1000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
5300000
heap
page read and write
DB4000
heap
page read and write
55E5000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
5583000
trusted library allocation
page read and write
DCB000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
DCB000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
DC4000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
5628000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
DB4000
heap
page read and write
5561000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
2A80000
direct allocation
page execute and read and write
102B000
heap
page read and write
45F1000
heap
page read and write
55A7000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
4E91000
heap
page read and write
DC6000
trusted library allocation
page read and write
1022000
heap
page read and write
51FC000
stack
page read and write
F34000
unkown
page execute and write copy
5581000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
DCE000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
75B000
unkown
page execute and write copy
FB2000
unkown
page execute and write copy
77EE000
stack
page read and write
5963000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
398F000
stack
page read and write
125A000
heap
page read and write
596D000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
1296000
heap
page read and write
5555000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
6411000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
5555000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
128D000
heap
page read and write
338E000
stack
page read and write
FED000
unkown
page execute and write copy
5689000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
1010000
heap
page read and write
DC9000
trusted library allocation
page read and write
F45000
unkown
page execute and read and write
5230000
heap
page execute and read and write
5928000
trusted library allocation
page read and write
3C0F000
stack
page read and write
1035000
heap
page read and write
596B000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
596A000
trusted library allocation
page read and write
5A89000
trusted library allocation
page read and write
FEE000
unkown
page execute and read and write
410F000
stack
page read and write
DD0000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
FA7000
unkown
page execute and read and write
428E000
stack
page read and write
FC9000
heap
page read and write
555F000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
870000
unkown
page execute and write copy
596F000
trusted library allocation
page read and write
4FD4000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
424F000
stack
page read and write
DCF000
trusted library allocation
page read and write
DC2000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
C3C000
stack
page read and write
596D000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
DCA000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
102F000
heap
page read and write
5AB7000
trusted library allocation
page read and write
DB4000
heap
page read and write
5964000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
DC5000
trusted library allocation
page read and write
596F000
trusted library allocation
page read and write
FF5000
unkown
page execute and read and write
5569000
trusted library allocation
page read and write
596A000
trusted library allocation
page read and write
F72000
unkown
page execute and read and write
5566000
trusted library allocation
page read and write
128F000
heap
page read and write
F1E000
unkown
page execute and read and write
2E8F000
stack
page read and write
5965000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
5BCE000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
567F000
trusted library allocation
page read and write
F83000
unkown
page execute and read and write
384F000
stack
page read and write
5859000
trusted library allocation
page read and write
1016000
heap
page read and write
DB4000
heap
page read and write
5960000
trusted library allocation
page read and write
DCD000
trusted library allocation
page read and write
DB4000
heap
page read and write
5BCC000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
11BE000
stack
page read and write
F7E000
unkown
page execute and write copy
2D2E000
stack
page read and write
1031000
heap
page read and write
1032000
heap
page read and write
DB4000
heap
page read and write
DD1000
trusted library allocation
page read and write
879000
unkown
page execute and write copy
30CF000
stack
page read and write
5669000
trusted library allocation
page read and write
FFA000
heap
page read and write
FB1000
unkown
page execute and read and write
596B000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
310E000
stack
page read and write
4E91000
heap
page read and write
55A0000
trusted library allocation
page read and write
5557000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
DC5000
trusted library allocation
page read and write
5170000
direct allocation
page execute and read and write
5968000
trusted library allocation
page read and write
DCF000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
102F000
heap
page read and write
5966000
trusted library allocation
page read and write
DB4000
heap
page read and write
9E0000
direct allocation
page read and write
DC7000
trusted library allocation
page read and write
102E000
heap
page read and write
4EB7000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
FEF000
unkown
page execute and write copy
4E90000
heap
page read and write
596A000
trusted library allocation
page read and write
1035000
heap
page read and write
55B0000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
4B0F000
stack
page read and write
5968000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
DC9000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
144E000
stack
page read and write
5588000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
59C8000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
45F1000
heap
page read and write
5A7F000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
DC4000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
55F6000
trusted library allocation
page read and write
3D8E000
stack
page read and write
100E000
heap
page read and write
55F3000
trusted library allocation
page read and write
596F000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
5574000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
DC2000
trusted library allocation
page read and write
D96000
unkown
page write copy
464E000
stack
page read and write
450E000
stack
page read and write
DC3000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
861000
unkown
page execute and write copy
55A0000
trusted library allocation
page read and write
45F1000
heap
page read and write
4E91000
heap
page read and write
5BAF000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
750D000
stack
page read and write
5968000
trusted library allocation
page read and write
1054000
unkown
page execute and write copy
DB4000
heap
page read and write
4E80000
direct allocation
page read and write
1010000
heap
page read and write
FA8000
unkown
page execute and write copy
2D70000
direct allocation
page read and write
1048000
heap
page read and write
5681000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
DC9000
trusted library allocation
page read and write
596A000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
5964000
trusted library allocation
page read and write
43CE000
stack
page read and write
75CE000
stack
page read and write
9E0000
direct allocation
page read and write
55A0000
trusted library allocation
page read and write
D96000
unkown
page write copy
514E000
stack
page read and write
104A000
heap
page read and write
DB4000
heap
page read and write
5969000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5574000
trusted library allocation
page read and write
1039000
heap
page read and write
FD7000
heap
page read and write
4E91000
heap
page read and write
4E80000
direct allocation
page read and write
5962000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
100D000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
5930000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
5ACA000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
864000
unkown
page execute and write copy
55F2000
trusted library allocation
page read and write
2A80000
direct allocation
page execute and read and write
44CF000
stack
page read and write
101C000
heap
page read and write
78EE000
stack
page read and write
DCE000
trusted library allocation
page read and write
6435000
trusted library allocation
page read and write
4E91000
heap
page read and write
129D000
heap
page read and write
5967000
trusted library allocation
page read and write
DC9000
trusted library allocation
page read and write
DCC000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
DB4000
heap
page read and write
55E7000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
400E000
stack
page read and write
5669000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
1034000
heap
page read and write
DC3000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
555B000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
4E80000
direct allocation
page read and write
DC4000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
DC3000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
5627000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
DCD000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
3ACF000
stack
page read and write
55F3000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
4E91000
heap
page read and write
F40000
remote allocation
page read and write
DA0000
direct allocation
page execute and read and write
348F000
stack
page read and write
5BEE000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
F41000
unkown
page execute and read and write
2D6B000
stack
page read and write
55A0000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
76EF000
stack
page read and write
55ED000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
F5C000
unkown
page execute and write copy
557B000
trusted library allocation
page read and write
45F1000
heap
page read and write
5AA0000
trusted library allocation
page read and write
12DC000
heap
page read and write
45F1000
heap
page read and write
5900000
trusted library allocation
page read and write
562C000
trusted library allocation
page read and write
45F1000
heap
page read and write
55A0000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
1010000
heap
page read and write
5564000
trusted library allocation
page read and write
DB4000
heap
page read and write
DC8000
trusted library allocation
page read and write
DC6000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
1054000
unkown
page execute and write copy
D66000
heap
page read and write
F2A000
unkown
page execute and write copy
4E91000
heap
page read and write
F40000
remote allocation
page read and write
5962000
trusted library allocation
page read and write
125E000
heap
page read and write
1022000
heap
page read and write
2D80000
heap
page read and write
5572000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
556B000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
438F000
stack
page read and write
596F000
trusted library allocation
page read and write
5B8B000
trusted library allocation
page read and write
F40000
remote allocation
page read and write
5961000
trusted library allocation
page read and write
3C4E000
stack
page read and write
D90000
direct allocation
page read and write
DC8000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
DC2000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
324E000
stack
page read and write
DC6000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
DC8000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
488F000
stack
page read and write
5583000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
565B000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
F09000
unkown
page execute and write copy
DCF000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
504C000
stack
page read and write
DCB000
trusted library allocation
page read and write
2A80000
direct allocation
page execute and read and write
55E6000
trusted library allocation
page read and write
FCB000
unkown
page execute and read and write
5ABC000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
1032000
heap
page read and write
562E000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
4E91000
heap
page read and write
55A0000
trusted library allocation
page read and write
103D000
heap
page read and write
D39000
stack
page read and write
571000
unkown
page execute and write copy
5963000
trusted library allocation
page read and write
FCD000
heap
page read and write
5C2E000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
5157000
trusted library allocation
page execute and read and write
F7F000
unkown
page execute and read and write
5564000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
2A80000
direct allocation
page execute and read and write
55EB000
trusted library allocation
page read and write
55F7000
trusted library allocation
page read and write
101A000
heap
page read and write
596A000
trusted library allocation
page read and write
DB4000
heap
page read and write
5000000
heap
page read and write
5555000
trusted library allocation
page read and write
FFE000
heap
page read and write
5658000
trusted library allocation
page read and write
103B000
unkown
page execute and write copy
102E000
heap
page read and write
5969000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
5553000
trusted library allocation
page read and write
FDE000
unkown
page execute and write copy
5968000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
557C000
trusted library allocation
page read and write
555B000
trusted library allocation
page read and write
3FCF000
stack
page read and write
55F0000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
567A000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
55F1000
trusted library allocation
page read and write
DCB000
trusted library allocation
page read and write
DB4000
heap
page read and write
D90000
direct allocation
page read and write
55A0000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
F80000
unkown
page execute and write copy
DC6000
trusted library allocation
page read and write
5599000
trusted library allocation
page read and write
556B000
trusted library allocation
page read and write
DC3000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
4E60000
heap
page read and write
5651000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
102F000
heap
page read and write
55A0000
trusted library allocation
page read and write
5561000
trusted library allocation
page read and write
334F000
stack
page read and write
4FC3000
trusted library allocation
page execute and read and write
5ADA000
trusted library allocation
page read and write
889000
unkown
page execute and write copy
D60000
heap
page read and write
100F000
heap
page read and write
4E91000
heap
page read and write
55E5000
trusted library allocation
page read and write
104C000
heap
page read and write
5565000
trusted library allocation
page read and write
1037000
heap
page read and write
DB4000
heap
page read and write
5C30000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
FB4000
unkown
page execute and read and write
1022000
heap
page read and write
DC9000
trusted library allocation
page read and write
39CE000
stack
page read and write
DC2000
trusted library allocation
page read and write
104B000
heap
page read and write
5411000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
4E9F000
trusted library allocation
page read and write
5200000
trusted library allocation
page execute and read and write
4E91000
heap
page read and write
3D4F000
stack
page read and write
5960000
trusted library allocation
page read and write
559F000
trusted library allocation
page read and write
5651000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
5ADC000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
4E91000
heap
page read and write
4E91000
heap
page read and write
55FE000
trusted library allocation
page read and write
5A8D000
trusted library allocation
page read and write
FF2000
unkown
page execute and read and write
5652000
trusted library allocation
page read and write
5575000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
596C000
trusted library allocation
page read and write
DCC000
trusted library allocation
page read and write
F35000
unkown
page execute and read and write
DB4000
heap
page read and write
55E5000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5658000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
There are 806 hidden memdumps, click here to show them.