IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\02FQBW3AYVFKS8DMY3O.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\02FQBW3AYVFKS8DMY3O.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\02FQBW3AYVFKS8DMY3O.exe
"C:\Users\user\AppData\Local\Temp\02FQBW3AYVFKS8DMY3O.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://crl.microP
unknown
https://crisiwarny.store/a
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/off/def.exeM
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://crisiwarny.store/apiP-
unknown
https://crisiwarny.store/Y
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://crisiwarny.store/5e9f
unknown
https://crisiwarny.store:443/apiLE=user-PCUSERNAME=userUSERPROFILE=C:
unknown
http://185.215.113.16/B
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exev
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/0
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://crisiwarny.store/alt-
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/api3
unknown
https://crisiwarny.store/apiu
unknown
https://crisiwarny.store/r
unknown
https://crisiwarny.store/t
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
821000
unkown
page execute and read and write
malicious
2D9F000
stack
page read and write
A8C000
unkown
page execute and read and write
5E6B000
trusted library allocation
page read and write
4B8B000
trusted library allocation
page execute and read and write
5CD000
unkown
page execute and write copy
6304000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
5470000
direct allocation
page execute and read and write
5E55000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
480F000
stack
page read and write
55FD000
stack
page read and write
17FB000
heap
page read and write
2F1E000
stack
page read and write
1504000
heap
page read and write
B1D000
unkown
page execute and write copy
1504000
heap
page read and write
5BFF000
stack
page read and write
5E3E000
trusted library allocation
page read and write
368F000
stack
page read and write
5E35000
trusted library allocation
page read and write
64C2000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
5E8A000
trusted library allocation
page read and write
328F000
stack
page read and write
5E4A000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
AA1000
unkown
page execute and write copy
6461000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
1760000
heap
page read and write
56E000
unkown
page execute and write copy
17EB000
heap
page read and write
301F000
stack
page read and write
405F000
stack
page read and write
54A000
unkown
page execute and read and write
365F000
stack
page read and write
555000
unkown
page execute and write copy
820000
unkown
page read and write
17E5000
heap
page read and write
17FB000
heap
page read and write
6234000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
3CCF000
stack
page read and write
4F50000
trusted library allocation
page read and write
59BD000
stack
page read and write
42DF000
stack
page read and write
6374000
trusted library allocation
page read and write
5E3000
unkown
page execute and read and write
6236000
trusted library allocation
page read and write
636A000
trusted library allocation
page read and write
55BD000
stack
page read and write
3B5F000
stack
page read and write
6358000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
16E0000
direct allocation
page read and write
4E51000
heap
page read and write
630B000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
16E0000
direct allocation
page read and write
D7E000
stack
page read and write
6094000
trusted library allocation
page read and write
5DC4000
trusted library allocation
page read and write
17F0000
heap
page read and write
5DE1000
trusted library allocation
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
5E4A000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
4A4C000
stack
page read and write
2A1E000
stack
page read and write
5DA2000
trusted library allocation
page read and write
C34000
heap
page read and write
5DCC000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
49F4000
trusted library allocation
page read and write
17FB000
heap
page read and write
17E3000
heap
page read and write
5DBD000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
3E4E000
stack
page read and write
5E8A000
trusted library allocation
page read and write
338F000
stack
page read and write
A96000
unkown
page execute and read and write
5EBF000
trusted library allocation
page read and write
623C000
trusted library allocation
page read and write
5E3E000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
484E000
stack
page read and write
62D7000
trusted library allocation
page read and write
5430000
direct allocation
page execute and read and write
4BEE000
stack
page read and write
5E39000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
4D91000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
538000
unkown
page execute and read and write
62CD000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
358F000
stack
page read and write
5E91000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6F2D000
stack
page read and write
52B0000
remote allocation
page read and write
5E5D000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
32DE000
stack
page read and write
5E39000
trusted library allocation
page read and write
17F7000
heap
page read and write
5DE1000
trusted library allocation
page read and write
631E000
trusted library allocation
page read and write
C34000
heap
page read and write
5E51000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
A8A000
unkown
page execute and write copy
632F000
trusted library allocation
page read and write
6351000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
623B000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
60BC000
trusted library allocation
page read and write
5FE000
unkown
page execute and read and write
C34000
heap
page read and write
C34000
heap
page read and write
5DC9000
trusted library allocation
page read and write
37CF000
stack
page read and write
597F000
stack
page read and write
5E3F000
trusted library allocation
page read and write
AE6000
unkown
page execute and read and write
4E51000
heap
page read and write
60D4000
trusted library allocation
page read and write
573B000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
634D000
trusted library allocation
page read and write
B1D000
unkown
page execute and write copy
6232000
trusted library allocation
page read and write
5BC000
unkown
page execute and write copy
1504000
heap
page read and write
66E000
unkown
page execute and write copy
305E000
stack
page read and write
C34000
heap
page read and write
B15000
unkown
page execute and write copy
5EBA000
trusted library allocation
page read and write
6098000
trusted library allocation
page read and write
635B000
trusted library allocation
page read and write
633C000
trusted library allocation
page read and write
E58000
heap
page read and write
48B0000
direct allocation
page read and write
6F30000
trusted library allocation
page read and write
6A04000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
56C000
unkown
page execute and read and write
5D91000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
637A000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
5290000
heap
page read and write
16E0000
direct allocation
page read and write
17F7000
heap
page read and write
A13000
unkown
page execute and read and write
6236000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
6232000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
17F6000
heap
page read and write
5E50000
trusted library allocation
page read and write
636E000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
623D000
trusted library allocation
page read and write
4B87000
trusted library allocation
page execute and read and write
311E000
stack
page read and write
4E51000
heap
page read and write
4B7A000
trusted library allocation
page execute and read and write
48B0000
direct allocation
page read and write
C34000
heap
page read and write
6302000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
4E51000
heap
page read and write
30DE000
stack
page read and write
17F8000
heap
page read and write
AB8000
unkown
page execute and write copy
56FC000
stack
page read and write
17ED000
heap
page read and write
5E62000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
6230000
trusted library allocation
page read and write
18FF000
stack
page read and write
5E40000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
4E51000
heap
page read and write
B17000
unkown
page execute and write copy
C34000
heap
page read and write
62CB000
trusted library allocation
page read and write
623C000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
62E4000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5460000
direct allocation
page execute and read and write
40CE000
stack
page read and write
A70000
unkown
page execute and read and write
5E45000
trusted library allocation
page read and write
49F3000
trusted library allocation
page execute and read and write
48C0000
heap
page read and write
5DC9000
trusted library allocation
page read and write
3160000
direct allocation
page read and write
16E0000
direct allocation
page read and write
177A000
heap
page read and write
5AD000
unkown
page execute and read and write
3E0F000
stack
page read and write
6316000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
5FCD000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
6092000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
5E54000
trusted library allocation
page read and write
6306000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
6398000
trusted library allocation
page read and write
68FB000
trusted library allocation
page read and write
55D000
unkown
page execute and write copy
4B4E000
stack
page read and write
5E49000
trusted library allocation
page read and write
431E000
stack
page read and write
634F000
trusted library allocation
page read and write
5F9B000
trusted library allocation
page read and write
725F000
stack
page read and write
1504000
heap
page read and write
17F9000
heap
page read and write
5E73000
trusted library allocation
page read and write
AF9000
stack
page read and write
6236000
trusted library allocation
page read and write
62E7000
trusted library allocation
page read and write
887000
unkown
page execute and write copy
5E3F000
trusted library allocation
page read and write
17F8000
heap
page read and write
5DBD000
trusted library allocation
page read and write
6FAE000
stack
page read and write
1504000
heap
page read and write
5EAF000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
4D8E000
stack
page read and write
52B0000
remote allocation
page read and write
63C1000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
640E000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
3D6000
unkown
page write copy
170E000
heap
page read and write
A90000
unkown
page execute and write copy
5E29000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
48C1000
heap
page read and write
6174000
trusted library allocation
page read and write
6332000
trusted library allocation
page read and write
623D000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
AE8000
unkown
page execute and read and write
6239000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
62F4000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
48C1000
heap
page read and write
62E8000
trusted library allocation
page read and write
645F000
trusted library allocation
page read and write
6365000
trusted library allocation
page read and write
17E3000
heap
page read and write
A4C000
unkown
page execute and read and write
6304000
trusted library allocation
page read and write
633E000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
1504000
heap
page read and write
17FB000
heap
page read and write
5E4B000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
1504000
heap
page read and write
6234000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
C34000
heap
page read and write
5E8E000
trusted library allocation
page read and write
65E000
unkown
page execute and write copy
5CC000
unkown
page execute and read and write
6237000
trusted library allocation
page read and write
561000
unkown
page execute and write copy
6230000
trusted library allocation
page read and write
170A000
heap
page read and write
28C0000
direct allocation
page read and write
574C000
trusted library allocation
page read and write
623B000
trusted library allocation
page read and write
17EF000
heap
page read and write
5E9A000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
160F000
stack
page read and write
5E8E000
trusted library allocation
page read and write
1504000
heap
page read and write
642F000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
C34000
heap
page read and write
64B0000
trusted library allocation
page read and write
1500000
heap
page read and write
5A8000
unkown
page execute and write copy
A6C000
unkown
page execute and write copy
A9D000
unkown
page execute and write copy
1504000
heap
page read and write
5E97000
trusted library allocation
page read and write
16D0000
heap
page read and write
62EE000
trusted library allocation
page read and write
6344000
trusted library allocation
page read and write
640C000
trusted library allocation
page read and write
587E000
stack
page read and write
5E8E000
trusted library allocation
page read and write
419F000
stack
page read and write
4E50000
heap
page read and write
5E49000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5D6000
unkown
page execute and read and write
17FB000
heap
page read and write
6FEE000
stack
page read and write
5E4A000
trusted library allocation
page read and write
1504000
heap
page read and write
1740000
heap
page read and write
64A6000
trusted library allocation
page read and write
17FD000
heap
page read and write
5DA2000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
C34000
heap
page read and write
17FB000
heap
page read and write
635B000
trusted library allocation
page read and write
41DE000
stack
page read and write
C34000
heap
page read and write
5DB2000
trusted library allocation
page read and write
6241000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
17DE000
heap
page read and write
E6C000
heap
page read and write
5E4E000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
52D0000
direct allocation
page read and write
A8D000
unkown
page execute and write copy
3F1F000
stack
page read and write
441F000
stack
page read and write
B04000
unkown
page execute and write copy
623B000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
17FB000
heap
page read and write
5DA9000
trusted library allocation
page read and write
609B000
trusted library allocation
page read and write
643E000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
355E000
stack
page read and write
62F2000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
6231000
trusted library allocation
page read and write
17FB000
heap
page read and write
6313000
trusted library allocation
page read and write
1504000
heap
page read and write
5EBF000
trusted library allocation
page read and write
5E8A000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
5D4F000
stack
page read and write
C34000
heap
page read and write
5D94000
trusted library allocation
page read and write
341E000
stack
page read and write
63BF000
trusted library allocation
page read and write
4A04000
trusted library allocation
page read and write
5DBD000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
6333000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
434E000
stack
page read and write
3F4F000
stack
page read and write
390F000
stack
page read and write
369E000
stack
page read and write
498E000
stack
page read and write
5E35000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
409E000
stack
page read and write
1504000
heap
page read and write
5E8E000
trusted library allocation
page read and write
1504000
heap
page read and write
623B000
trusted library allocation
page read and write
1504000
heap
page read and write
5E39000
trusted library allocation
page read and write
54B000
unkown
page execute and write copy
6318000
trusted library allocation
page read and write
16E0000
direct allocation
page read and write
5E8A000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
A12000
unkown
page execute and write copy
3CDE000
stack
page read and write
6370000
trusted library allocation
page read and write
17FB000
heap
page read and write
36CE000
stack
page read and write
555000
unkown
page execute and read and write
17EB000
heap
page read and write
5E27000
trusted library allocation
page read and write
3D0000
unkown
page read and write
B2E000
unkown
page execute and write copy
6232000
trusted library allocation
page read and write
6378000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
D3F000
stack
page read and write
2DDE000
stack
page read and write
16E0000
direct allocation
page read and write
16E0000
direct allocation
page read and write
2EDF000
stack
page read and write
5E3F000
trusted library allocation
page read and write
16E0000
direct allocation
page read and write
53A000
unkown
page execute and write copy
5E3F000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
9E7000
unkown
page execute and read and write
6232000
trusted library allocation
page read and write
612D000
trusted library allocation
page read and write
63DF000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
445E000
stack
page read and write
6346000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
2C5F000
stack
page read and write
5E42000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5E27000
trusted library allocation
page read and write
1504000
heap
page read and write
3C9F000
stack
page read and write
6237000
trusted library allocation
page read and write
C30000
heap
page read and write
6238000
trusted library allocation
page read and write
5E62000
trusted library allocation
page read and write
B16000
unkown
page execute and read and write
E10000
heap
page read and write
17FB000
heap
page read and write
5E4E000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6233000
trusted library allocation
page read and write
458F000
stack
page read and write
598000
unkown
page execute and read and write
A08000
unkown
page execute and read and write
5EB000
unkown
page execute and read and write
5E4000
unkown
page execute and write copy
3A8E000
stack
page read and write
420E000
stack
page read and write
6234000
trusted library allocation
page read and write
5450000
direct allocation
page execute and read and write
5E30000
trusted library allocation
page read and write
17FD000
heap
page read and write
9E9000
unkown
page execute and write copy
642D000
trusted library allocation
page read and write
17F8000
heap
page read and write
17F7000
heap
page read and write
448E000
stack
page read and write
6231000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
573D000
stack
page read and write
5E8E000
trusted library allocation
page read and write
63A3000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
DFB000
stack
page read and write
5DB5000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
17FB000
heap
page read and write
6236000
trusted library allocation
page read and write
17ED000
heap
page read and write
64AE000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
4D0F000
stack
page read and write
E1E000
heap
page read and write
620C000
trusted library allocation
page read and write
62F1000
trusted library allocation
page read and write
3160000
direct allocation
page read and write
5E27000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
670000
unkown
page execute and write copy
E60000
heap
page read and write
319E000
stack
page read and write
5E34000
trusted library allocation
page read and write
329F000
stack
page read and write
A61000
unkown
page execute and write copy
6363000
trusted library allocation
page read and write
351F000
stack
page read and write
37DE000
stack
page read and write
5E3A000
trusted library allocation
page read and write
3DDF000
stack
page read and write
6095000
trusted library allocation
page read and write
5E2000
unkown
page execute and write copy
632A000
trusted library allocation
page read and write
62E2000
trusted library allocation
page read and write
17FB000
heap
page read and write
A11000
unkown
page execute and read and write
573E000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
C34000
heap
page read and write
5BE000
unkown
page execute and read and write
4C60000
heap
page execute and read and write
6320000
trusted library allocation
page read and write
17F7000
heap
page read and write
5E29000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
A27000
unkown
page execute and write copy
1504000
heap
page read and write
5E60000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
6351000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
17FB000
heap
page read and write
5EA9000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
735E000
stack
page read and write
5DEA000
trusted library allocation
page read and write
E4D000
heap
page read and write
3A1F000
stack
page read and write
6372000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
6311000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
5E66000
trusted library allocation
page read and write
6234000
trusted library allocation
page read and write
5E34000
trusted library allocation
page read and write
5440000
direct allocation
page execute and read and write
5EB2000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
1738000
heap
page read and write
17DD000
heap
page read and write
5E60000
trusted library allocation
page read and write
17FB000
heap
page read and write
48B0000
direct allocation
page read and write
5E34000
trusted library allocation
page read and write
17E3000
heap
page read and write
3D2000
unkown
page execute and write copy
5E60000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
C34000
heap
page read and write
5E4E000
trusted library allocation
page read and write
A28000
unkown
page execute and read and write
5FC000
unkown
page execute and write copy
87B000
unkown
page execute and read and write
5E8E000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
A08000
unkown
page execute and write copy
3E6000
unkown
page execute and write copy
5EC7000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
677F000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
6362000
trusted library allocation
page read and write
17CD000
heap
page read and write
5E49000
trusted library allocation
page read and write
5E53000
trusted library allocation
page read and write
17FB000
heap
page read and write
631A000
trusted library allocation
page read and write
4E51000
heap
page read and write
6234000
trusted library allocation
page read and write
4E51000
heap
page read and write
623B000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
6353000
trusted library allocation
page read and write
174E000
heap
page read and write
62F8000
trusted library allocation
page read and write
3F5E000
stack
page read and write
5E4E000
trusted library allocation
page read and write
6371000
trusted library allocation
page read and write
17F8000
heap
page read and write
5D94000
trusted library allocation
page read and write
17FB000
heap
page read and write
5D97000
trusted library allocation
page read and write
17C8000
heap
page read and write
6356000
trusted library allocation
page read and write
348F000
stack
page read and write
5DA2000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
3D0000
unkown
page readonly
6232000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
45CE000
stack
page read and write
17EB000
heap
page read and write
5E26000
trusted library allocation
page read and write
63E1000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
4D4E000
stack
page read and write
56A000
unkown
page execute and write copy
380E000
stack
page read and write
4E51000
heap
page read and write
5DAC000
trusted library allocation
page read and write
C34000
heap
page read and write
6236000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
5E9D000
trusted library allocation
page read and write
62E5000
trusted library allocation
page read and write
EA1000
heap
page read and write
5E8E000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
408F000
stack
page read and write
A2A000
unkown
page execute and read and write
48B0000
direct allocation
page read and write
3187000
heap
page read and write
74C000
stack
page read and write
14DD000
stack
page read and write
16E0000
direct allocation
page read and write
5E60000
trusted library allocation
page read and write
586000
unkown
page execute and write copy
17E0000
heap
page read and write
6A12000
trusted library allocation
page read and write
5AFE000
stack
page read and write
16E0000
direct allocation
page read and write
A78000
unkown
page execute and write copy
4E60000
heap
page read and write
16CB000
stack
page read and write
54C000
unkown
page execute and read and write
5ABE000
stack
page read and write
6331000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
E4F000
heap
page read and write
5E5F000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
17FB000
heap
page read and write
5E75000
trusted library allocation
page read and write
28AF000
stack
page read and write
17DD000
heap
page read and write
C0E000
stack
page read and write
5F2E000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
3D0E000
stack
page read and write
5E60000
trusted library allocation
page read and write
6373000
trusted library allocation
page read and write
17FB000
heap
page read and write
1781000
heap
page read and write
5E8E000
trusted library allocation
page read and write
647C000
trusted library allocation
page read and write
633C000
trusted library allocation
page read and write
6F6E000
stack
page read and write
470E000
stack
page read and write
C34000
heap
page read and write
5E8E000
trusted library allocation
page read and write
6372000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
E1A000
heap
page read and write
5D4000
unkown
page execute and write copy
571000
unkown
page execute and read and write
3A5E000
stack
page read and write
17F6000
heap
page read and write
5E49000
trusted library allocation
page read and write
C34000
heap
page read and write
5D94000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
7C0000
heap
page read and write
1504000
heap
page read and write
1745000
heap
page read and write
5430000
direct allocation
page execute and read and write
562000
unkown
page execute and read and write
6363000
trusted library allocation
page read and write
B2D000
unkown
page execute and read and write
6238000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
17E3000
heap
page read and write
33DF000
stack
page read and write
635D000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
5F9B000
trusted library allocation
page read and write
A7E000
unkown
page execute and read and write
5E3F000
trusted library allocation
page read and write
62D9000
trusted library allocation
page read and write
17DD000
heap
page read and write
1470000
heap
page read and write
63DA000
trusted library allocation
page read and write
B15000
unkown
page execute and write copy
1783000
heap
page read and write
16E0000
direct allocation
page read and write
5E59000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
27AF000
stack
page read and write
5D9B000
trusted library allocation
page read and write
17FB000
heap
page read and write
5E8E000
trusted library allocation
page read and write
670000
unkown
page execute and write copy
6232000
trusted library allocation
page read and write
6473000
trusted library allocation
page read and write
AE7000
unkown
page execute and write copy
5E26000
trusted library allocation
page read and write
1700000
heap
page read and write
3170000
direct allocation
page execute and read and write
4A00000
trusted library allocation
page read and write
17DB000
heap
page read and write
48B0000
direct allocation
page read and write
3A4F000
stack
page read and write
17FB000
heap
page read and write
5EC9000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
5EB7000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
A0C000
unkown
page execute and write copy
55F000
unkown
page execute and read and write
5EB2000
trusted library allocation
page read and write
318D000
heap
page read and write
17E4000
heap
page read and write
1504000
heap
page read and write
63DC000
trusted library allocation
page read and write
1390000
heap
page read and write
5E2F000
trusted library allocation
page read and write
87B000
unkown
page execute and write copy
5E3F000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
4ACE000
stack
page read and write
5EC9000
trusted library allocation
page read and write
821000
unkown
page execute and write copy
28D7000
heap
page read and write
3180000
heap
page read and write
46CF000
stack
page read and write
7050000
heap
page execute and read and write
17FB000
heap
page read and write
5E60000
trusted library allocation
page read and write
609D000
trusted library allocation
page read and write
17DD000
heap
page read and write
5C4E000
stack
page read and write
5E49000
trusted library allocation
page read and write
28D0000
heap
page read and write
4BCF000
stack
page read and write
494F000
stack
page read and write
6235000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
17F7000
heap
page read and write
5E3F000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
1504000
heap
page read and write
5E39000
trusted library allocation
page read and write
6233000
trusted library allocation
page read and write
455F000
stack
page read and write
17FA000
heap
page read and write
17FB000
heap
page read and write
17EB000
heap
page read and write
66E000
unkown
page execute and read and write
379F000
stack
page read and write
17FD000
heap
page read and write
5D9B000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
5E51000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5F35000
trusted library allocation
page read and write
3B8F000
stack
page read and write
16E0000
direct allocation
page read and write
5E49000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
633E000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
17FB000
heap
page read and write
6233000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
17FB000
heap
page read and write
C34000
heap
page read and write
394E000
stack
page read and write
4C30000
trusted library allocation
page execute and read and write
5E8E000
trusted library allocation
page read and write
6238000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
2B5E000
stack
page read and write
38DF000
stack
page read and write
3DA000
unkown
page execute and write copy
5EC9000
trusted library allocation
page read and write
65E000
unkown
page execute and write copy
6353000
trusted library allocation
page read and write
C34000
heap
page read and write
6331000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
17FB000
heap
page read and write
5E39000
trusted library allocation
page read and write
5E2D000
trusted library allocation
page read and write
6013000
trusted library allocation
page read and write
6309000
trusted library allocation
page read and write
164E000
stack
page read and write
635D000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
623E000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
9FD000
unkown
page execute and read and write
636C000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
4C40000
heap
page read and write
54BD000
stack
page read and write
64C4000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
ABA000
unkown
page execute and read and write
60F4000
trusted library allocation
page read and write
639A000
trusted library allocation
page read and write
6093000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
17FB000
heap
page read and write
5430000
direct allocation
page execute and read and write
6440000
trusted library allocation
page read and write
631A000
trusted library allocation
page read and write
3DA000
unkown
page execute and read and write
4C2C000
stack
page read and write
5EA9000
trusted library allocation
page read and write
3F8E000
stack
page read and write
4C80000
heap
page read and write
1504000
heap
page read and write
5E49000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
3B9E000
stack
page read and write
6231000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
5E60000
trusted library allocation
page read and write
133A000
stack
page read and write
2C9E000
stack
page read and write
6231000
trusted library allocation
page read and write
4E51000
heap
page read and write
5CB000
unkown
page execute and write copy
48B0000
direct allocation
page read and write
623D000
trusted library allocation
page read and write
6233000
trusted library allocation
page read and write
609D000
trusted library allocation
page read and write
64A8000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
AA9000
unkown
page execute and read and write
62F6000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
5E67000
trusted library allocation
page read and write
16E0000
direct allocation
page read and write
583E000
stack
page read and write
5D94000
trusted library allocation
page read and write
623A000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
563F000
trusted library allocation
page read and write
656000
unkown
page execute and write copy
A29000
unkown
page execute and write copy
5EA9000
trusted library allocation
page read and write
C34000
heap
page read and write
6144000
trusted library allocation
page read and write
3BCE000
stack
page read and write
5E60000
trusted library allocation
page read and write
52B0000
remote allocation
page read and write
677D000
trusted library allocation
page read and write
4C0E000
stack
page read and write
6234000
trusted library allocation
page read and write
4E51000
heap
page read and write
48B0000
direct allocation
page read and write
6230000
trusted library allocation
page read and write
5DD4000
trusted library allocation
page read and write
715E000
stack
page read and write
5DB3000
trusted library allocation
page read and write
4B50000
heap
page read and write
123B000
stack
page read and write
5E49000
trusted library allocation
page read and write
5F99000
trusted library allocation
page read and write
29DF000
stack
page read and write
616C000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
17FB000
heap
page read and write
5E27000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
5E0F000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
1504000
heap
page read and write
62D7000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
6598000
trusted library allocation
page read and write
3D2000
unkown
page execute and read and write
5430000
direct allocation
page execute and read and write
17FB000
heap
page read and write
3E1E000
stack
page read and write
C34000
heap
page read and write
820000
unkown
page readonly
5DA9000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
530C000
stack
page read and write
5DC4000
trusted library allocation
page read and write
5430000
direct allocation
page execute and read and write
5E4E000
trusted library allocation
page read and write
AA0000
unkown
page execute and read and write
49FD000
trusted library allocation
page execute and read and write
17E3000
heap
page read and write
623B000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
B2D000
unkown
page execute and write copy
4E4F000
stack
page read and write
C20000
heap
page read and write
5E75000
trusted library allocation
page read and write
41CF000
stack
page read and write
1504000
heap
page read and write
6370000
trusted library allocation
page read and write
315F000
stack
page read and write
444F000
stack
page read and write
17F7000
heap
page read and write
C34000
heap
page read and write
17FA000
heap
page read and write
5430000
direct allocation
page execute and read and write
5E55000
trusted library allocation
page read and write
623B000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
17E2000
heap
page read and write
16E0000
direct allocation
page read and write
A39000
unkown
page execute and write copy
A8E000
unkown
page execute and read and write
17ED000
heap
page read and write
5E49000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
5E39000
trusted library allocation
page read and write
6AA3000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
5D3000
unkown
page execute and read and write
540F000
stack
page read and write
623E000
trusted library allocation
page read and write
48D2000
heap
page read and write
5E39000
trusted library allocation
page read and write
6232000
trusted library allocation
page read and write
DBE000
stack
page read and write
17F7000
heap
page read and write
48B0000
direct allocation
page read and write
647E000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
1504000
heap
page read and write
62EA000
trusted library allocation
page read and write
168E000
stack
page read and write
6237000
trusted library allocation
page read and write
623F000
trusted library allocation
page read and write
391E000
stack
page read and write
649E000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5D60000
heap
page read and write
5D90000
trusted library allocation
page read and write
6236000
trusted library allocation
page read and write
6232000
trusted library allocation
page read and write
5E8A000
trusted library allocation
page read and write
4A8F000
stack
page read and write
A64000
unkown
page execute and read and write
430F000
stack
page read and write
5DAC000
trusted library allocation
page read and write
5EC1000
trusted library allocation
page read and write
6471000
trusted library allocation
page read and write
2B1F000
stack
page read and write
5DC9000
trusted library allocation
page read and write
6361000
trusted library allocation
page read and write
C34000
heap
page read and write
5EC1000
trusted library allocation
page read and write
17E7000
heap
page read and write
632C000
trusted library allocation
page read and write
5E8E000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
17FB000
heap
page read and write
3D6000
unkown
page write copy
315E000
stack
page read and write
5E3F000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
7B0000
heap
page read and write
B07000
unkown
page execute and write copy
5E8E000
trusted library allocation
page read and write
There are 1000 hidden memdumps, click here to show them.