IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\4EIXPY3PJ1MHC0SHPSNPXSN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4EIXPY3PJ1MHC0SHPSNPXSN.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\4EIXPY3PJ1MHC0SHPSNPXSN.exe
"C:\Users\user\AppData\Local\Temp\4EIXPY3PJ1MHC0SHPSNPXSN.exe"
malicious

URLs

Name
IP
Malicious
https://crisiwarny.store/apif
unknown
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/apiFami
unknown
malicious
https://crisiwarny.store/Y
unknown
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
https://crisiwarny.store/j9P
unknown
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
https://crisiwarny.store/apiB9
unknown
malicious
https://crisiwarny.store/
unknown
malicious
https://crisiwarny.store/-
unknown
malicious
thumbystriw.store
malicious
https://crisiwarny.store/apiob$
unknown
malicious
https://crisiwarny.store/s
unknown
malicious
crisiwarny.store
malicious
https://crisiwarny.store/5
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://185.215.113.16/off/def.exeL
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/off/def.exe0J
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://185.215.113.16/off/def.exe3f
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
591000
unkown
page execute and read and write
malicious
44FE000
stack
page read and write
5B70000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
7D9000
unkown
page execute and write copy
4B00000
direct allocation
page read and write
13DB000
stack
page read and write
5F13000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
132F000
stack
page read and write
81D000
unkown
page execute and read and write
15DF000
stack
page read and write
5FCC000
trusted library allocation
page read and write
B4C000
unkown
page execute and read and write
5AD3000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
60FF000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
54BF000
stack
page read and write
1418000
heap
page read and write
5AD1000
trusted library allocation
page read and write
14D5000
heap
page read and write
27A0000
direct allocation
page read and write
5FFD000
trusted library allocation
page read and write
709F000
stack
page read and write
5F18000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
5FDF000
trusted library allocation
page read and write
AE8000
unkown
page execute and read and write
5A9F000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
54FE000
stack
page read and write
6049000
trusted library allocation
page read and write
363F000
stack
page read and write
4DA0000
trusted library allocation
page read and write
3A3E000
stack
page read and write
61A1000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
49CF000
stack
page read and write
5AAE000
trusted library allocation
page read and write
5FBE000
trusted library allocation
page read and write
1330000
heap
page read and write
33FE000
stack
page read and write
45FF000
stack
page read and write
5A82000
trusted library allocation
page read and write
367E000
stack
page read and write
814000
heap
page read and write
4B00000
direct allocation
page read and write
144E000
heap
page read and write
2E7F000
stack
page read and write
AE7000
unkown
page execute and write copy
5F13000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
DDE000
stack
page read and write
5ADF000
trusted library allocation
page read and write
590000
unkown
page readonly
6038000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
4741000
heap
page read and write
49F7000
trusted library allocation
page execute and read and write
5B21000
trusted library allocation
page read and write
30FE000
stack
page read and write
607B000
trusted library allocation
page read and write
149F000
heap
page read and write
4874000
trusted library allocation
page read and write
B12000
unkown
page execute and read and write
44BF000
stack
page read and write
814000
heap
page read and write
5F1B000
trusted library allocation
page read and write
3BFF000
stack
page read and write
768000
unkown
page execute and write copy
5B55000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
49EA000
trusted library allocation
page execute and read and write
14C4000
heap
page read and write
1440000
heap
page read and write
B0D000
unkown
page execute and write copy
27A0000
direct allocation
page read and write
5A70000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
14C8000
heap
page read and write
5ADF000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
5C1A000
trusted library allocation
page read and write
767000
unkown
page execute and read and write
5A87000
trusted library allocation
page read and write
49BF000
stack
page read and write
5B73000
trusted library allocation
page read and write
323E000
stack
page read and write
3D7E000
stack
page read and write
4B11000
heap
page read and write
5B0B000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
4B11000
heap
page read and write
6022000
trusted library allocation
page read and write
4F8D000
stack
page read and write
77C000
unkown
page execute and write copy
5F11000
trusted library allocation
page read and write
58CF000
stack
page read and write
2FBE000
stack
page read and write
7EC000
unkown
page execute and write copy
6085000
trusted library allocation
page read and write
962000
unkown
page execute and write copy
3B3F000
stack
page read and write
78D000
unkown
page execute and read and write
13EE000
heap
page read and write
14C8000
heap
page read and write
5A8F000
trusted library allocation
page read and write
4FDB000
stack
page read and write
88E000
unkown
page execute and write copy
5AD2000
trusted library allocation
page read and write
789000
unkown
page execute and write copy
5AD8000
trusted library allocation
page read and write
380000
heap
page read and write
5A7D000
trusted library allocation
page read and write
4B10000
heap
page read and write
814000
heap
page read and write
5FB1000
trusted library allocation
page read and write
31FF000
stack
page read and write
5B71000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
4BAC000
stack
page read and write
5AA5000
trusted library allocation
page read and write
537D000
stack
page read and write
7E6000
unkown
page execute and read and write
14BA000
heap
page read and write
5ABA000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
DDE000
stack
page read and write
5BAA000
trusted library allocation
page read and write
814000
heap
page read and write
4A20000
heap
page read and write
5AA2000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
135D000
heap
page read and write
5F15000
trusted library allocation
page read and write
33BF000
stack
page read and write
B88000
unkown
page execute and read and write
5FFB000
trusted library allocation
page read and write
5FD1000
trusted library allocation
page read and write
5AD8000
trusted library allocation
page read and write
2C7E000
stack
page read and write
14BB000
heap
page read and write
6020000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
14B9000
heap
page read and write
477E000
stack
page read and write
27A0000
direct allocation
page read and write
5FC4000
trusted library allocation
page read and write
14D1000
heap
page read and write
BA6000
unkown
page execute and read and write
1350000
heap
page read and write
142F000
heap
page read and write
5A92000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
14C2000
heap
page read and write
5F13000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
4A6E000
stack
page read and write
5ABA000
trusted library allocation
page read and write
4741000
heap
page read and write
5F12000
trusted library allocation
page read and write
775000
unkown
page execute and write copy
5A7A000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
27A0000
direct allocation
page read and write
32BE000
stack
page read and write
4DE1000
trusted library allocation
page read and write
35BF000
stack
page read and write
5A80000
trusted library allocation
page read and write
4884000
trusted library allocation
page read and write
43BE000
stack
page read and write
1414000
heap
page read and write
4B11000
heap
page read and write
14B9000
heap
page read and write
814000
heap
page read and write
605F000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
14AD000
heap
page read and write
B36000
unkown
page execute and read and write
5A8E000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
74C000
unkown
page execute and write copy
B4D000
unkown
page execute and write copy
5F1D000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
966000
unkown
page write copy
5AB8000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
811000
unkown
page execute and write copy
6087000
trusted library allocation
page read and write
E4F000
heap
page read and write
5FF1000
trusted library allocation
page read and write
373E000
stack
page read and write
4B11000
heap
page read and write
14CF000
heap
page read and write
5610000
remote allocation
page read and write
B11000
unkown
page execute and write copy
27A0000
direct allocation
page read and write
14B5000
heap
page read and write
814000
heap
page read and write
5F19000
trusted library allocation
page read and write
6F9000
stack
page read and write
5AAE000
trusted library allocation
page read and write
5FCF000
trusted library allocation
page read and write
814000
heap
page read and write
6E10000
heap
page execute and read and write
5A79000
trusted library allocation
page read and write
802000
unkown
page execute and write copy
BA3000
unkown
page execute and write copy
5F16000
trusted library allocation
page read and write
619F000
trusted library allocation
page read and write
14C2000
heap
page read and write
27A0000
direct allocation
page read and write
4B11000
heap
page read and write
5A91000
trusted library allocation
page read and write
14BD000
heap
page read and write
4B11000
heap
page read and write
5B75000
trusted library allocation
page read and write
6047000
trusted library allocation
page read and write
49FB000
trusted library allocation
page execute and read and write
AF3000
unkown
page execute and write copy
57CE000
stack
page read and write
14B7000
heap
page read and write
5A7D000
trusted library allocation
page read and write
14BE000
heap
page read and write
5A9C000
trusted library allocation
page read and write
B24000
unkown
page execute and write copy
5AAB000
trusted library allocation
page read and write
96A000
unkown
page execute and read and write
14C2000
heap
page read and write
5A92000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
14CE000
heap
page read and write
5AF5000
trusted library allocation
page read and write
5FDD000
trusted library allocation
page read and write
4D7D000
stack
page read and write
607D000
trusted library allocation
page read and write
7A4000
unkown
page execute and read and write
5ABA000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5A5F000
stack
page read and write
5A82000
trusted library allocation
page read and write
7DC000
unkown
page execute and write copy
5A82000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
60BC000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5B72000
trusted library allocation
page read and write
4741000
heap
page read and write
812000
unkown
page execute and read and write
B4B000
unkown
page execute and write copy
5A82000
trusted library allocation
page read and write
C14000
unkown
page execute and write copy
5AA2000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
60FD000
trusted library allocation
page read and write
50DF000
stack
page read and write
5AE0000
trusted library allocation
page read and write
769000
unkown
page execute and read and write
29BF000
stack
page read and write
1357000
heap
page read and write
5AA7000
trusted library allocation
page read and write
5FDD000
trusted library allocation
page read and write
28BF000
stack
page read and write
5A81000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
407E000
stack
page read and write
4B11000
heap
page read and write
7B0000
unkown
page execute and write copy
6005000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
5FCA000
trusted library allocation
page read and write
AF8000
unkown
page execute and write copy
49F0000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
5F1E000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
3C3E000
stack
page read and write
5FFB000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
590000
unkown
page read and write
6018000
trusted library allocation
page read and write
5188000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
3B7E000
stack
page read and write
5A92000
trusted library allocation
page read and write
ACB000
unkown
page execute and write copy
5F1A000
trusted library allocation
page read and write
70DE000
stack
page read and write
5AF3000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
27A0000
direct allocation
page read and write
601C000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
353E000
stack
page read and write
60FD000
trusted library allocation
page read and write
4B11000
heap
page read and write
5A7D000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
4BD0000
heap
page read and write
5B79000
trusted library allocation
page read and write
4746000
heap
page read and write
5610000
remote allocation
page read and write
605D000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
49E0000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
14BA000
heap
page read and write
566E000
stack
page read and write
E00000
heap
page read and write
D70000
heap
page read and write
4BB0000
heap
page read and write
5FB4000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
AC8000
unkown
page execute and read and write
5AA4000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
808000
unkown
page execute and read and write
5AC2000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
3FBF000
stack
page read and write
1440000
heap
page read and write
5AE0000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
4B20000
heap
page read and write
5ABC000
trusted library allocation
page read and write
14B7000
heap
page read and write
5F19000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
38BF000
stack
page read and write
5A91000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
5F7000
unkown
page execute and write copy
14C4000
heap
page read and write
5A92000
trusted library allocation
page read and write
814000
heap
page read and write
602E000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
C16000
unkown
page execute and write copy
144E000
heap
page read and write
6470000
trusted library allocation
page read and write
AFB000
unkown
page execute and read and write
4B11000
heap
page read and write
E5C000
heap
page read and write
C16000
unkown
page execute and write copy
5B72000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
14B7000
heap
page read and write
E3E000
heap
page read and write
5AAB000
trusted library allocation
page read and write
53BE000
stack
page read and write
814000
heap
page read and write
60BA000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
337E000
stack
page read and write
5F1F000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
BBE000
unkown
page execute and read and write
527E000
stack
page read and write
3DBF000
stack
page read and write
B68000
unkown
page execute and write copy
617B000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
5A8F000
trusted library allocation
page read and write
5FC2000
trusted library allocation
page read and write
14DA000
heap
page read and write
5F16000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
96A000
unkown
page execute and write copy
5AA0000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
5950000
heap
page read and write
B91000
unkown
page execute and read and write
4FA0000
direct allocation
page read and write
347F000
stack
page read and write
5A89000
trusted library allocation
page read and write
E0E000
heap
page read and write
14A4000
heap
page read and write
5A78000
trusted library allocation
page read and write
785000
unkown
page execute and read and write
5A82000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
806000
unkown
page execute and write copy
B6F000
unkown
page execute and read and write
333F000
stack
page read and write
7BB000
unkown
page execute and read and write
383F000
stack
page read and write
14C5000
heap
page read and write
14BE000
heap
page read and write
5A94000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
14C8000
heap
page read and write
423F000
stack
page read and write
770000
unkown
page execute and write copy
43FF000
stack
page read and write
B0E000
unkown
page execute and read and write
5AF5000
trusted library allocation
page read and write
4873000
trusted library allocation
page execute and read and write
40FF000
stack
page read and write
88E000
unkown
page execute and write copy
5F21000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5EB000
unkown
page execute and write copy
60AE000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
B60000
unkown
page execute and read and write
AFA000
unkown
page execute and write copy
5A71000
trusted library allocation
page read and write
5FFA000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
3AFE000
stack
page read and write
5170000
direct allocation
page execute and read and write
5A91000
trusted library allocation
page read and write
6148000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
AF3000
unkown
page execute and read and write
5F18000
trusted library allocation
page read and write
2D7F000
stack
page read and write
5140000
direct allocation
page execute and read and write
14B5000
heap
page read and write
5F17000
trusted library allocation
page read and write
14BA000
heap
page read and write
4B00000
direct allocation
page read and write
4B6E000
stack
page read and write
279F000
stack
page read and write
5A85000
trusted library allocation
page read and write
397F000
stack
page read and write
609F000
trusted library allocation
page read and write
771000
unkown
page execute and read and write
1424000
heap
page read and write
600E000
trusted library allocation
page read and write
3FFE000
stack
page read and write
4B11000
heap
page read and write
4DD0000
heap
page execute and read and write
592E000
stack
page read and write
E40000
heap
page read and write
5F10000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
55FF000
stack
page read and write
5ABF000
trusted library allocation
page read and write
814000
heap
page read and write
615A000
trusted library allocation
page read and write
814000
heap
page read and write
5AFF000
trusted library allocation
page read and write
2AFF000
stack
page read and write
814000
heap
page read and write
14BD000
heap
page read and write
27A0000
direct allocation
page read and write
5F12000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
D0B000
stack
page read and write
71DE000
stack
page read and write
5A91000
trusted library allocation
page read and write
48BE000
stack
page read and write
14BB000
heap
page read and write
14C7000
heap
page read and write
5A96000
trusted library allocation
page read and write
3EE000
stack
page read and write
5ABC000
trusted library allocation
page read and write
786000
unkown
page execute and write copy
27A0000
direct allocation
page read and write
5A92000
trusted library allocation
page read and write
14BA000
heap
page read and write
5FFC000
trusted library allocation
page read and write
966000
unkown
page write copy
473F000
stack
page read and write
5100000
direct allocation
page execute and read and write
27A0000
direct allocation
page read and write
5FFD000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
487D000
trusted library allocation
page execute and read and write
60AC000
trusted library allocation
page read and write
427E000
stack
page read and write
5A92000
trusted library allocation
page read and write
14CF000
heap
page read and write
4B00000
direct allocation
page read and write
5A89000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
5EB000
unkown
page execute and read and write
5AD6000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
2EBF000
stack
page read and write
877000
unkown
page execute and write copy
5AA2000
trusted library allocation
page read and write
6043000
trusted library allocation
page read and write
1424000
heap
page read and write
3E7F000
stack
page read and write
463E000
stack
page read and write
814000
heap
page read and write
317E000
stack
page read and write
303E000
stack
page read and write
5A8F000
trusted library allocation
page read and write
13EA000
heap
page read and write
2EFE000
stack
page read and write
B9A000
unkown
page execute and read and write
5AD3000
trusted library allocation
page read and write
778000
unkown
page execute and write copy
576E000
stack
page read and write
5F10000
trusted library allocation
page read and write
2F7F000
stack
page read and write
10FA000
stack
page read and write
5120000
direct allocation
page execute and read and write
C14000
unkown
page execute and read and write
5F1E000
trusted library allocation
page read and write
6043000
trusted library allocation
page read and write
591000
unkown
page execute and write copy
60EE000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
139E000
stack
page read and write
5A7D000
trusted library allocation
page read and write
960000
unkown
page readonly
4B11000
heap
page read and write
6030000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
14B7000
heap
page read and write
4840000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
814000
heap
page read and write
6011000
trusted library allocation
page read and write
14BB000
heap
page read and write
1418000
heap
page read and write
5A9C000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
27A0000
direct allocation
page read and write
61D3000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
5F1D000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
4B11000
heap
page read and write
5A71000
trusted library allocation
page read and write
42FE000
stack
page read and write
5AA2000
trusted library allocation
page read and write
4B11000
heap
page read and write
810000
heap
page read and write
38FE000
stack
page read and write
5A8A000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
D5E000
stack
page read and write
B85000
unkown
page execute and read and write
5A92000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
D60000
heap
page read and write
5110000
direct allocation
page execute and read and write
601E000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
888000
unkown
page execute and read and write
7F1000
unkown
page execute and read and write
5FFE000
trusted library allocation
page read and write
3EBE000
stack
page read and write
142F000
heap
page read and write
5AE2000
trusted library allocation
page read and write
35FE000
stack
page read and write
5A92000
trusted library allocation
page read and write
4741000
heap
page read and write
41BE000
stack
page read and write
5ACA000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
DE0000
direct allocation
page read and write
5FDB000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
81B000
unkown
page execute and write copy
5A99000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
AE5000
unkown
page execute and read and write
5A71000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
784000
unkown
page execute and write copy
B86000
unkown
page execute and write copy
5FBA000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
4AFF000
stack
page read and write
C04000
unkown
page execute and write copy
5160000
direct allocation
page execute and read and write
4B00000
direct allocation
page read and write
3D3F000
stack
page read and write
6045000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
604B000
trusted library allocation
page read and write
5FB2000
trusted library allocation
page read and write
5FD2000
trusted library allocation
page read and write
B51000
unkown
page execute and read and write
C04000
unkown
page execute and write copy
5CE2000
trusted library allocation
page read and write
36FF000
stack
page read and write
B82000
unkown
page execute and write copy
4B00000
direct allocation
page read and write
2C3F000
stack
page read and write
5FFC000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
7EB000
unkown
page execute and read and write
27A0000
direct allocation
page read and write
5A71000
trusted library allocation
page read and write
89E000
unkown
page execute and write copy
B98000
unkown
page execute and write copy
5AC3000
trusted library allocation
page read and write
39FF000
stack
page read and write
14AD000
heap
page read and write
512D000
stack
page read and write
765000
unkown
page execute and read and write
5A71000
trusted library allocation
page read and write
403F000
stack
page read and write
5AA2000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
74A000
unkown
page execute and read and write
4B00000
direct allocation
page read and write
B61000
unkown
page execute and write copy
5AA2000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
6003000
trusted library allocation
page read and write
14C9000
heap
page read and write
4B11000
heap
page read and write
87B000
unkown
page execute and write copy
4890000
direct allocation
page read and write
5F18000
trusted library allocation
page read and write
5FC4000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
4740000
heap
page read and write
BFE000
unkown
page execute and write copy
14C4000
heap
page read and write
5C03000
trusted library allocation
page read and write
14A5000
heap
page read and write
14BA000
heap
page read and write
5AA2000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
B67000
unkown
page execute and read and write
4FA0000
direct allocation
page read and write
814000
heap
page read and write
34FF000
stack
page read and write
5F18000
trusted library allocation
page read and write
D9C000
stack
page read and write
5AE0000
trusted library allocation
page read and write
14B7000
heap
page read and write
6032000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
14D9000
heap
page read and write
5F1B000
trusted library allocation
page read and write
14C2000
heap
page read and write
14A1000
heap
page read and write
601A000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
AF9000
unkown
page execute and read and write
777000
unkown
page execute and read and write
5ACC000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
14C2000
heap
page read and write
27B7000
heap
page read and write
437F000
stack
page read and write
5B0C000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
14AD000
heap
page read and write
6179000
trusted library allocation
page read and write
4890000
direct allocation
page read and write
5A71000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
413E000
stack
page read and write
3CBE000
stack
page read and write
6027000
trusted library allocation
page read and write
370000
heap
page read and write
60E3000
trusted library allocation
page read and write
27A0000
direct allocation
page read and write
49FE000
stack
page read and write
7F9000
unkown
page execute and write copy
6045000
trusted library allocation
page read and write
614A000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
14B9000
heap
page read and write
3DFE000
stack
page read and write
5A92000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
889000
unkown
page execute and write copy
5F21000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
814000
heap
page read and write
4B11000
heap
page read and write
5AC2000
trusted library allocation
page read and write
91F000
stack
page read and write
5F5000
unkown
page execute and write copy
5120000
direct allocation
page execute and read and write
5F15000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
5A92000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
2DBE000
stack
page read and write
5AC1000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
1225000
heap
page read and write
962000
unkown
page execute and read and write
14BE000
heap
page read and write
5F20000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
14C9000
heap
page read and write
377F000
stack
page read and write
327F000
stack
page read and write
5A92000
trusted library allocation
page read and write
609D000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
14AD000
heap
page read and write
5AB6000
trusted library allocation
page read and write
27A0000
direct allocation
page read and write
5ADF000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
5610000
remote allocation
page read and write
77D000
unkown
page execute and read and write
89F000
unkown
page execute and write copy
4B11000
heap
page read and write
7B2000
unkown
page execute and write copy
5A80000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
13E0000
heap
page read and write
5A75000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
E47000
heap
page read and write
77A000
unkown
page execute and read and write
5A9D000
trusted library allocation
page read and write
7FC000
unkown
page execute and read and write
14BE000
heap
page read and write
5FB8000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
6587000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
48CC000
stack
page read and write
5F19000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
5FD8000
trusted library allocation
page read and write
788000
unkown
page execute and read and write
14B8000
heap
page read and write
5A87000
trusted library allocation
page read and write
2B3E000
stack
page read and write
5ABC000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
5AA2000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
606A000
trusted library allocation
page read and write
887000
unkown
page execute and write copy
5F18000
trusted library allocation
page read and write
6045000
trusted library allocation
page read and write
887000
unkown
page execute and write copy
859000
unkown
page execute and read and write
14CA000
heap
page read and write
B90000
unkown
page execute and write copy
814000
heap
page read and write
5A71000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
5A99000
trusted library allocation
page read and write
14BE000
heap
page read and write
3EFF000
stack
page read and write
14C9000
heap
page read and write
5AC8000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
4750000
heap
page read and write
D1E000
stack
page read and write
5ABD000
trusted library allocation
page read and write
4890000
direct allocation
page read and write
14C4000
heap
page read and write
5A85000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
814000
heap
page read and write
1220000
heap
page read and write
5A91000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
1210000
heap
page read and write
976000
unkown
page execute and write copy
34BE000
stack
page read and write
5F16000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
14BD000
heap
page read and write
5F16000
trusted library allocation
page read and write
4768000
heap
page read and write
4B11000
heap
page read and write
5A82000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
5FF8000
trusted library allocation
page read and write
6F5F000
stack
page read and write
5AA7000
trusted library allocation
page read and write
5A99000
trusted library allocation
page read and write
2FFF000
stack
page read and write
B5D000
unkown
page execute and write copy
6047000
trusted library allocation
page read and write
7A3000
unkown
page execute and write copy
647F000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
3ABF000
stack
page read and write
5B23000
trusted library allocation
page read and write
5FDA000
trusted library allocation
page read and write
814000
heap
page read and write
14BE000
heap
page read and write
6360000
trusted library allocation
page read and write
4D80000
trusted library allocation
page execute and read and write
4B11000
heap
page read and write
606C000
trusted library allocation
page read and write
960000
unkown
page read and write
5AA2000
trusted library allocation
page read and write
5A87000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
27B0000
heap
page read and write
5FFA000
trusted library allocation
page read and write
29FE000
stack
page read and write
5A7D000
trusted library allocation
page read and write
814000
heap
page read and write
5463000
trusted library allocation
page read and write
5F6000
unkown
page execute and read and write
5A92000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
6F9E000
stack
page read and write
3F3E000
stack
page read and write
803000
unkown
page execute and read and write
7B1000
unkown
page execute and read and write
5AB4000
trusted library allocation
page read and write
14C2000
heap
page read and write
61D5000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
7DB000
unkown
page execute and read and write
5F1B000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
7E7000
unkown
page execute and write copy
120E000
stack
page read and write
60FB000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
4B00000
direct allocation
page read and write
3C7F000
stack
page read and write
5A82000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
89E000
unkown
page execute and read and write
313F000
stack
page read and write
544D000
trusted library allocation
page read and write
387E000
stack
page read and write
5F18000
trusted library allocation
page read and write
5AB8000
trusted library allocation
page read and write
6054000
trusted library allocation
page read and write
5FC6000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
6013000
trusted library allocation
page read and write
4B11000
heap
page read and write
5B78000
trusted library allocation
page read and write
14CE000
heap
page read and write
766000
unkown
page execute and write copy
6E5E000
stack
page read and write
5F1D000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
BBD000
unkown
page execute and write copy
6012000
trusted library allocation
page read and write
14C9000
heap
page read and write
14BB000
heap
page read and write
5A7A000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
5336000
trusted library allocation
page read and write
930000
heap
page read and write
607C000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
487F000
stack
page read and write
5A82000
trusted library allocation
page read and write
42BF000
stack
page read and write
5F17000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
37BE000
stack
page read and write
5A96000
trusted library allocation
page read and write
E0A000
heap
page read and write
5F1D000
trusted library allocation
page read and write
39BE000
stack
page read and write
5A7B000
trusted library allocation
page read and write
814000
heap
page read and write
30C000
stack
page read and write
417F000
stack
page read and write
5AD8000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
30BF000
stack
page read and write
5AB5000
trusted library allocation
page read and write
80D000
stack
page read and write
603A000
trusted library allocation
page read and write
5F17000
trusted library allocation
page read and write
14D7000
heap
page read and write
5A87000
trusted library allocation
page read and write
There are 941 hidden memdumps, click here to show them.