IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://crisiwarny.store/apiio
unknown
https://duckduckgo.com/ac/?q=
unknown
https://crisiwarny.store/Z
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://crisiwarny.store/apiW
unknown
https://crisiwarny.store/apiu0
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://crisiwarny.store/z
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/apipy
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://crisiwarny.store/apix
unknown
https://crisiwarny.store/api;
unknown
https://crisiwarny.store/p
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://crisiwarny.store/
unknown
https://crisiwarny.store/apibkg
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://crisiwarny.store/6
unknown
https://crisiwarny.store/apiq
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/api4kSuzMe
unknown
https://crisiwarny.store/apiw
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DE1000
unkown
page execute and read and write
malicious
4221000
heap
page read and write
5229000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
520D000
trusted library allocation
page read and write
3D3E000
stack
page read and write
5254000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
78F000
trusted library allocation
page read and write
4221000
heap
page read and write
5226000
trusted library allocation
page read and write
5252000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
FD0000
unkown
page execute and write copy
E46000
unkown
page execute and read and write
51B1000
trusted library allocation
page read and write
5182000
trusted library allocation
page read and write
109B000
unkown
page execute and read and write
4830000
direct allocation
page execute and read and write
51F8000
trusted library allocation
page read and write
726000
heap
page read and write
524A000
trusted library allocation
page read and write
51FB000
trusted library allocation
page read and write
530000
heap
page read and write
5168000
trusted library allocation
page read and write
4820000
direct allocation
page execute and read and write
5246000
trusted library allocation
page read and write
36BF000
stack
page read and write
501E000
stack
page read and write
6CA000
heap
page read and write
524A000
trusted library allocation
page read and write
71C000
heap
page read and write
5179000
trusted library allocation
page read and write
4230000
heap
page read and write
5226000
trusted library allocation
page read and write
768000
trusted library allocation
page read and write
73D000
heap
page read and write
74D000
heap
page read and write
70B000
heap
page read and write
4800000
direct allocation
page execute and read and write
524A000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
734000
heap
page read and write
1055000
unkown
page execute and write copy
DE1000
unkown
page execute and write copy
520E000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
761000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
4221000
heap
page read and write
47DF000
stack
page read and write
2B7F000
stack
page read and write
726000
heap
page read and write
5216000
trusted library allocation
page read and write
3F7F000
stack
page read and write
519C000
trusted library allocation
page read and write
74D000
heap
page read and write
104B000
unkown
page execute and read and write
74D000
heap
page read and write
5268000
trusted library allocation
page read and write
767000
trusted library allocation
page read and write
73F000
heap
page read and write
E45000
unkown
page execute and write copy
51AF000
trusted library allocation
page read and write
74D000
heap
page read and write
4840000
direct allocation
page execute and read and write
104A000
unkown
page execute and write copy
70F000
heap
page read and write
524A000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
3FBE000
stack
page read and write
71D000
heap
page read and write
5216000
trusted library allocation
page read and write
4221000
heap
page read and write
450000
heap
page read and write
4320000
trusted library allocation
page read and write
4221000
heap
page read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
5169000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
51B1000
trusted library allocation
page read and write
6E3000
heap
page read and write
76D000
trusted library allocation
page read and write
74F000
heap
page read and write
524A000
trusted library allocation
page read and write
FEB000
unkown
page execute and read and write
698000
heap
page read and write
5216000
trusted library allocation
page read and write
757000
heap
page read and write
519B000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
51B1000
trusted library allocation
page read and write
51B1000
trusted library allocation
page read and write
799000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
5171000
trusted library allocation
page read and write
70F000
heap
page read and write
5215000
trusted library allocation
page read and write
D6E000
stack
page read and write
5271000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
75C000
heap
page read and write
FD5000
unkown
page execute and read and write
51F6000
trusted library allocation
page read and write
726000
heap
page read and write
46A0000
direct allocation
page read and write
74A000
heap
page read and write
4EBE000
stack
page read and write
731000
heap
page read and write
524A000
trusted library allocation
page read and write
744000
heap
page read and write
738000
heap
page read and write
6A5000
heap
page read and write
2CFE000
stack
page read and write
5020000
heap
page read and write
74A000
heap
page read and write
DAE000
stack
page read and write
731000
heap
page read and write
51FD000
trusted library allocation
page read and write
75D000
heap
page read and write
71C000
heap
page read and write
522E000
trusted library allocation
page read and write
75C000
heap
page read and write
4820000
direct allocation
page execute and read and write
779000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
51A1000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
28FF000
stack
page read and write
524A000
trusted library allocation
page read and write
75E000
heap
page read and write
752000
heap
page read and write
74A000
heap
page read and write
4221000
heap
page read and write
6B1000
heap
page read and write
524A000
trusted library allocation
page read and write
732000
heap
page read and write
5216000
trusted library allocation
page read and write
73F000
heap
page read and write
51B1000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
51A9000
trusted library allocation
page read and write
482D000
stack
page read and write
75A000
heap
page read and write
10D0000
unkown
page execute and write copy
736000
heap
page read and write
4221000
heap
page read and write
4D00000
remote allocation
page read and write
77F000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
524A000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
2E3E000
stack
page read and write
1054000
unkown
page execute and read and write
5164000
trusted library allocation
page read and write
518E000
trusted library allocation
page read and write
718000
heap
page read and write
5198000
trusted library allocation
page read and write
512F000
stack
page read and write
520E000
trusted library allocation
page read and write
25FF000
stack
page read and write
51DE000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
5183000
trusted library allocation
page read and write
73F000
heap
page read and write
5768000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
4D4E000
stack
page read and write
726000
heap
page read and write
30BE000
stack
page read and write
759000
heap
page read and write
10DE000
unkown
page execute and write copy
5226000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
10BA000
unkown
page execute and write copy
517C000
trusted library allocation
page read and write
6CA000
heap
page read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
4820000
direct allocation
page execute and read and write
524A000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
5224000
trusted library allocation
page read and write
518C000
trusted library allocation
page read and write
36FE000
stack
page read and write
516A000
trusted library allocation
page read and write
5189000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
517B000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
70C000
heap
page read and write
5193000
trusted library allocation
page read and write
52A2000
trusted library allocation
page read and write
293E000
stack
page read and write
5342000
trusted library allocation
page read and write
DCD000
heap
page read and write
5226000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
4850000
direct allocation
page execute and read and write
5C7B000
trusted library allocation
page read and write
797000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
2F7E000
stack
page read and write
10C8000
unkown
page execute and read and write
4221000
heap
page read and write
75E000
heap
page read and write
31BF000
stack
page read and write
70E000
heap
page read and write
51F5000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
41FF000
stack
page read and write
726000
heap
page read and write
731000
heap
page read and write
5A5000
heap
page read and write
E48000
unkown
page execute and write copy
753000
heap
page read and write
717000
heap
page read and write
74D000
heap
page read and write
4878000
trusted library allocation
page read and write
10B8000
unkown
page execute and write copy
FB2000
unkown
page execute and write copy
5226000
trusted library allocation
page read and write
5163000
trusted library allocation
page read and write
103C000
unkown
page execute and read and write
524A000
trusted library allocation
page read and write
51B9000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
726000
heap
page read and write
106D000
unkown
page execute and write copy
1042000
unkown
page execute and read and write
53DA000
trusted library allocation
page read and write
FB1000
unkown
page execute and read and write
5226000
trusted library allocation
page read and write
51A2000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
F99000
unkown
page execute and read and write
759000
heap
page read and write
74D000
heap
page read and write
32FF000
stack
page read and write
5226000
trusted library allocation
page read and write
5252000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
74B000
heap
page read and write
732000
heap
page read and write
759000
heap
page read and write
51B7000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
393E000
stack
page read and write
496D000
stack
page read and write
693000
heap
page read and write
FAF000
unkown
page execute and read and write
51E0000
trusted library allocation
page read and write
4820000
direct allocation
page execute and read and write
799000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
726000
heap
page read and write
691000
heap
page read and write
10C9000
unkown
page execute and write copy
5215000
trusted library allocation
page read and write
2A7E000
stack
page read and write
106F000
unkown
page execute and read and write
4BEE000
stack
page read and write
DE0000
unkown
page read and write
26FF000
stack
page read and write
526B000
trusted library allocation
page read and write
46DB000
stack
page read and write
10D0000
unkown
page execute and write copy
75C000
heap
page read and write
DC0000
heap
page read and write
5268000
trusted library allocation
page read and write
3BBF000
stack
page read and write
FB3000
unkown
page execute and read and write
73D000
heap
page read and write
1028000
unkown
page execute and write copy
5312000
trusted library allocation
page read and write
5254000
trusted library allocation
page read and write
102C000
unkown
page execute and read and write
FBC000
unkown
page execute and read and write
5206000
trusted library allocation
page read and write
343F000
stack
page read and write
5248000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
779000
trusted library allocation
page read and write
4D00000
remote allocation
page read and write
5205000
trusted library allocation
page read and write
715000
heap
page read and write
5226000
trusted library allocation
page read and write
660000
heap
page read and write
520B000
trusted library allocation
page read and write
74D000
heap
page read and write
3E7E000
stack
page read and write
75C000
heap
page read and write
5226000
trusted library allocation
page read and write
76A000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5A0000
heap
page read and write
5216000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
6C0000
heap
page read and write
469E000
stack
page read and write
5226000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
2F3F000
stack
page read and write
4810000
direct allocation
page execute and read and write
5181000
trusted library allocation
page read and write
5242000
trusted library allocation
page read and write
691000
heap
page read and write
768000
trusted library allocation
page read and write
749000
heap
page read and write
75E000
heap
page read and write
5216000
trusted library allocation
page read and write
6A1000
heap
page read and write
46A0000
direct allocation
page read and write
750000
heap
page read and write
524A000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
4820000
direct allocation
page execute and read and write
5216000
trusted library allocation
page read and write
105D000
unkown
page execute and read and write
70E000
heap
page read and write
753000
heap
page read and write
6A5000
heap
page read and write
698000
heap
page read and write
524A000
trusted library allocation
page read and write
516B000
trusted library allocation
page read and write
753000
heap
page read and write
51B1000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
73B000
heap
page read and write
4221000
heap
page read and write
40FE000
stack
page read and write
5226000
trusted library allocation
page read and write
1014000
unkown
page execute and write copy
35BE000
stack
page read and write
753000
heap
page read and write
5226000
trusted library allocation
page read and write
791000
trusted library allocation
page read and write
10DE000
unkown
page execute and read and write
6CB000
heap
page read and write
72C000
heap
page read and write
FB000
stack
page read and write
5216000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
73A000
heap
page read and write
51B0000
trusted library allocation
page read and write
5268000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
735000
heap
page read and write
755000
heap
page read and write
726000
heap
page read and write
5242000
trusted library allocation
page read and write
4221000
heap
page read and write
1050000
unkown
page execute and write copy
5226000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
333E000
stack
page read and write
51F8000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
4AAE000
stack
page read and write
738000
heap
page read and write
4A22000
trusted library allocation
page read and write
71A000
heap
page read and write
4221000
heap
page read and write
5242000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
DE0000
unkown
page readonly
520C000
trusted library allocation
page read and write
103D000
unkown
page execute and write copy
70F000
heap
page read and write
DB0000
direct allocation
page read and write
DB0000
direct allocation
page read and write
522C000
trusted library allocation
page read and write
6CA000
heap
page read and write
517A000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
47F0000
direct allocation
page execute and read and write
FEA000
unkown
page execute and write copy
524A000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
6C0000
heap
page read and write
5252000
trusted library allocation
page read and write
5171000
trusted library allocation
page read and write
4221000
heap
page read and write
524A000
trusted library allocation
page read and write
5168000
trusted library allocation
page read and write
4221000
heap
page read and write
70F000
heap
page read and write
75E000
heap
page read and write
524A000
trusted library allocation
page read and write
516A000
trusted library allocation
page read and write
734000
heap
page read and write
524A000
trusted library allocation
page read and write
799000
trusted library allocation
page read and write
70E000
heap
page read and write
74D000
heap
page read and write
753000
heap
page read and write
5180000
trusted library allocation
page read and write
70E000
heap
page read and write
104C000
unkown
page execute and write copy
5193000
trusted library allocation
page read and write
27FF000
stack
page read and write
DB0000
direct allocation
page read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
5163000
trusted library allocation
page read and write
4BAF000
stack
page read and write
DB0000
direct allocation
page read and write
74D000
heap
page read and write
524A000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
74A000
heap
page read and write
524A000
trusted library allocation
page read and write
4B43000
trusted library allocation
page read and write
4200000
heap
page read and write
1FA000
stack
page read and write
759000
heap
page read and write
5226000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
5198000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
6A1000
heap
page read and write
E3B000
unkown
page execute and write copy
524A000
trusted library allocation
page read and write
103B000
unkown
page execute and write copy
768000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
357F000
stack
page read and write
4221000
heap
page read and write
74B000
heap
page read and write
518C000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
73F000
heap
page read and write
DC7000
heap
page read and write
524A000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
731000
heap
page read and write
749000
heap
page read and write
347E000
stack
page read and write
691000
heap
page read and write
761000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
524A000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
10C8000
unkown
page execute and write copy
5226000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
2A3F000
stack
page read and write
6DA000
heap
page read and write
4860000
direct allocation
page execute and read and write
5171000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
FBC000
unkown
page execute and write copy
524A000
trusted library allocation
page read and write
4220000
heap
page read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
75A000
heap
page read and write
3E3F000
stack
page read and write
524A000
trusted library allocation
page read and write
726000
heap
page read and write
5184000
trusted library allocation
page read and write
F9B000
unkown
page execute and write copy
5198000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
3CFF000
stack
page read and write
5160000
trusted library allocation
page read and write
74F000
heap
page read and write
4221000
heap
page read and write
74A000
heap
page read and write
5216000
trusted library allocation
page read and write
70B000
heap
page read and write
522E000
trusted library allocation
page read and write
4B1E000
trusted library allocation
page read and write
383E000
stack
page read and write
650000
heap
page read and write
5182000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
4221000
heap
page read and write
734000
heap
page read and write
726000
heap
page read and write
5246000
trusted library allocation
page read and write
752000
heap
page read and write
5250000
trusted library allocation
page read and write
4820000
direct allocation
page execute and read and write
5226000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
75C000
heap
page read and write
4221000
heap
page read and write
524A000
trusted library allocation
page read and write
D2C000
stack
page read and write
5251000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
51B1000
trusted library allocation
page read and write
718000
heap
page read and write
51AF000
trusted library allocation
page read and write
73D000
heap
page read and write
5226000
trusted library allocation
page read and write
519A000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
1020000
unkown
page execute and write copy
5199000
trusted library allocation
page read and write
5199000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
73C000
heap
page read and write
4D00000
remote allocation
page read and write
5226000
trusted library allocation
page read and write
787000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
730000
heap
page read and write
4B20000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
6F5000
heap
page read and write
307F000
stack
page read and write
104F000
unkown
page execute and read and write
66E000
heap
page read and write
3A7F000
stack
page read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
40BF000
stack
page read and write
FC6000
unkown
page execute and read and write
51B1000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
4A6D000
stack
page read and write
524A000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
5170000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
37FF000
stack
page read and write
5216000
trusted library allocation
page read and write
46A0000
direct allocation
page read and write
75E000
heap
page read and write
10DF000
unkown
page execute and write copy
5221000
trusted library allocation
page read and write
5248000
trusted library allocation
page read and write
31FE000
stack
page read and write
755000
heap
page read and write
73D000
heap
page read and write
5198000
trusted library allocation
page read and write
2BBE000
stack
page read and write
2CBF000
stack
page read and write
FC5000
unkown
page execute and write copy
74A000
heap
page read and write
5226000
trusted library allocation
page read and write
759000
heap
page read and write
779000
trusted library allocation
page read and write
4E4D000
stack
page read and write
4B36000
trusted library allocation
page read and write
5181000
trusted library allocation
page read and write
528A000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
66A000
heap
page read and write
1019000
unkown
page execute and read and write
524A000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
FEC000
unkown
page execute and write copy
5188000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
74A000
heap
page read and write
DB0000
direct allocation
page read and write
397E000
stack
page read and write
755000
heap
page read and write
751000
heap
page read and write
73A000
heap
page read and write
6A1000
heap
page read and write
5216000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
4221000
heap
page read and write
DB0000
direct allocation
page read and write
4B2E000
trusted library allocation
page read and write
1027000
unkown
page execute and read and write
4FBF000
stack
page read and write
5216000
trusted library allocation
page read and write
521E000
trusted library allocation
page read and write
726000
heap
page read and write
3ABE000
stack
page read and write
698000
heap
page read and write
72D000
heap
page read and write
5177000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
2DFF000
stack
page read and write
74D000
heap
page read and write
5215000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
3BFE000
stack
page read and write
6AE000
heap
page read and write
6A5000
heap
page read and write
FB0000
unkown
page execute and write copy
4221000
heap
page read and write
524A000
trusted library allocation
page read and write
64E000
stack
page read and write
5226000
trusted library allocation
page read and write
E3B000
unkown
page execute and read and write
524A000
trusted library allocation
page read and write
1000000
unkown
page execute and read and write
4CEE000
stack
page read and write
5171000
trusted library allocation
page read and write
There are 620 hidden memdumps, click here to show them.