IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://crisiwarny.store/g
unknown
https://crisiwarny.store/apig
unknown
http://185.215.113.16/off/def.exeS
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://crisiwarny.store/J
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://crisiwarny.store/bfa
unknown
https://crisiwarny.store:443/api
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/v8hs
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://crisiwarny.store/x
unknown
http://185.215.113.16/Q=
unknown
https://crisiwarny.store:443/apitxtPK
unknown
https://crisiwarny.store/u
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://presticitpo.store:443/api
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://crisiwarny.store/s://crisiwarny.store/apit
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://crisiwarny.store/apibu
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
http://185.215.113.16:80/off/def.exe
unknown
https://crisiwarny.store/H
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/api9
unknown
https://crisiwarny.store/0
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious
206.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Memdumps

Base Address
Regiontype
Protect
Malicious
841000
unkown
page execute and read and write
malicious
5112000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
5119000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
41E1000
heap
page read and write
2C9F000
stack
page read and write
381E000
stack
page read and write
5F0000
direct allocation
page read and write
51F0000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
709000
heap
page read and write
517B000
trusted library allocation
page read and write
A7E000
unkown
page execute and read and write
511E000
trusted library allocation
page read and write
580000
direct allocation
page read and write
5107000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
A78000
unkown
page execute and write copy
516D000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
A18000
unkown
page execute and write copy
511F000
trusted library allocation
page read and write
580000
direct allocation
page read and write
511F000
trusted library allocation
page read and write
5149000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
70C000
heap
page read and write
5102000
trusted library allocation
page read and write
241E000
stack
page read and write
574000
heap
page read and write
704000
heap
page read and write
516C000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
5155000
trusted library allocation
page read and write
830000
remote allocation
page read and write
5107000
trusted library allocation
page read and write
28DF000
stack
page read and write
5157000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
50FE000
trusted library allocation
page read and write
6ED000
heap
page read and write
5121000
trusted library allocation
page read and write
51B3000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
514A000
trusted library allocation
page read and write
70A000
heap
page read and write
5107000
trusted library allocation
page read and write
A4B000
unkown
page execute and write copy
A18000
unkown
page execute and read and write
50F9000
trusted library allocation
page read and write
ACF000
unkown
page execute and write copy
574000
heap
page read and write
70D000
heap
page read and write
5102000
trusted library allocation
page read and write
4CDD000
stack
page read and write
6E2000
heap
page read and write
5107000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
704000
heap
page read and write
70D000
heap
page read and write
704000
heap
page read and write
528C000
trusted library allocation
page read and write
5134000
trusted library allocation
page read and write
6E8000
heap
page read and write
580000
direct allocation
page read and write
510C000
trusted library allocation
page read and write
70D000
heap
page read and write
5100000
trusted library allocation
page read and write
B39000
unkown
page execute and read and write
514E000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
517A000
trusted library allocation
page read and write
AF4000
unkown
page execute and read and write
574000
heap
page read and write
319F000
stack
page read and write
70D000
heap
page read and write
70C000
heap
page read and write
510C000
trusted library allocation
page read and write
70A000
heap
page read and write
512A000
trusted library allocation
page read and write
574000
heap
page read and write
AAC000
unkown
page execute and write copy
700000
heap
page read and write
41E1000
heap
page read and write
6F4000
heap
page read and write
50FF000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
6E2000
heap
page read and write
70D000
heap
page read and write
672000
heap
page read and write
705000
heap
page read and write
9F9000
unkown
page execute and read and write
255B000
stack
page read and write
830000
direct allocation
page execute and read and write
47D0000
direct allocation
page execute and read and write
A2F000
unkown
page execute and read and write
6D1000
heap
page read and write
6CC000
heap
page read and write
6E7000
heap
page read and write
510C000
trusted library allocation
page read and write
19A000
stack
page read and write
5102000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
840000
unkown
page read and write
510D000
trusted library allocation
page read and write
5111000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
574000
heap
page read and write
511F000
trusted library allocation
page read and write
5F0000
direct allocation
page read and write
5102000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
5145000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
574000
heap
page read and write
511F000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
89B000
unkown
page execute and write copy
5107000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
574000
heap
page read and write
6E0000
heap
page read and write
5111000
trusted library allocation
page read and write
574000
heap
page read and write
5107000
trusted library allocation
page read and write
512D000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
517B000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
5182000
trusted library allocation
page read and write
70C000
heap
page read and write
5102000
trusted library allocation
page read and write
5121000
trusted library allocation
page read and write
830000
direct allocation
page execute and read and write
512F000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
70D000
heap
page read and write
6DE000
heap
page read and write
516C000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
70D000
heap
page read and write
5120000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
841000
unkown
page execute and write copy
409F000
stack
page read and write
2B5F000
stack
page read and write
5157000
trusted library allocation
page read and write
810000
direct allocation
page execute and read and write
ACC000
unkown
page execute and write copy
510C000
trusted library allocation
page read and write
6F1000
heap
page read and write
510D000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
3F5F000
stack
page read and write
6F2000
heap
page read and write
50F1000
trusted library allocation
page read and write
5165000
trusted library allocation
page read and write
50F8000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
50F1000
trusted library allocation
page read and write
50FF000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
291E000
stack
page read and write
6F5000
heap
page read and write
5111000
trusted library allocation
page read and write
331E000
stack
page read and write
5107000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
4B5F000
stack
page read and write
A87000
unkown
page execute and read and write
6ED000
heap
page read and write
700000
heap
page read and write
40DE000
stack
page read and write
41E1000
heap
page read and write
3CDF000
stack
page read and write
265F000
stack
page read and write
47B0000
direct allocation
page execute and read and write
2E1E000
stack
page read and write
70C000
heap
page read and write
2DDF000
stack
page read and write
5100000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
515D000
trusted library allocation
page read and write
23DF000
stack
page read and write
510C000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
2CDE000
stack
page read and write
AD0000
unkown
page execute and read and write
309E000
stack
page read and write
653000
heap
page read and write
469B000
stack
page read and write
5101000
trusted library allocation
page read and write
514F000
trusted library allocation
page read and write
8A7000
unkown
page execute and write copy
5143000
trusted library allocation
page read and write
65F000
heap
page read and write
689000
heap
page read and write
6DF000
heap
page read and write
510C000
trusted library allocation
page read and write
A2D000
unkown
page execute and write copy
513D000
trusted library allocation
page read and write
517B000
trusted library allocation
page read and write
345E000
stack
page read and write
A9C000
unkown
page execute and write copy
41DF000
stack
page read and write
5165000
trusted library allocation
page read and write
516D000
trusted library allocation
page read and write
32DF000
stack
page read and write
656000
heap
page read and write
6D3000
heap
page read and write
5110000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
2F5E000
stack
page read and write
515D000
trusted library allocation
page read and write
51A7000
trusted library allocation
page read and write
810000
heap
page read and write
704000
heap
page read and write
5100000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
ACE000
unkown
page execute and read and write
574000
heap
page read and write
41E1000
heap
page read and write
6E5000
heap
page read and write
511E000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
2A5E000
stack
page read and write
5107000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
B23000
unkown
page execute and write copy
47E2000
trusted library allocation
page read and write
4A93000
trusted library allocation
page read and write
52A3000
trusted library allocation
page read and write
5AD000
heap
page read and write
513F000
trusted library allocation
page read and write
5139000
trusted library allocation
page read and write
709000
heap
page read and write
6E7000
heap
page read and write
50F1000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
704000
heap
page read and write
6F6000
heap
page read and write
5109000
trusted library allocation
page read and write
6F2000
heap
page read and write
5111000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
830000
direct allocation
page execute and read and write
5157000
trusted library allocation
page read and write
50F6000
trusted library allocation
page read and write
830000
direct allocation
page execute and read and write
6F9000
heap
page read and write
574000
heap
page read and write
61E000
heap
page read and write
41E1000
heap
page read and write
512F000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
B39000
unkown
page execute and write copy
A34000
unkown
page execute and read and write
511F000
trusted library allocation
page read and write
5161000
trusted library allocation
page read and write
4B9E000
stack
page read and write
5102000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
5141000
trusted library allocation
page read and write
5124000
trusted library allocation
page read and write
3D1E000
stack
page read and write
574000
heap
page read and write
510C000
trusted library allocation
page read and write
359E000
stack
page read and write
5102000
trusted library allocation
page read and write
305F000
stack
page read and write
3A5F000
stack
page read and write
52DB000
trusted library allocation
page read and write
9FB000
unkown
page execute and write copy
70A000
heap
page read and write
465E000
stack
page read and write
5233000
trusted library allocation
page read and write
514E000
trusted library allocation
page read and write
3F9E000
stack
page read and write
50F8000
trusted library allocation
page read and write
580000
direct allocation
page read and write
5A7000
heap
page read and write
5102000
trusted library allocation
page read and write
515D000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
5105000
trusted library allocation
page read and write
A5D000
unkown
page execute and read and write
510D000
trusted library allocation
page read and write
4988000
trusted library allocation
page read and write
4AA9000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
708000
heap
page read and write
511F000
trusted library allocation
page read and write
5144000
trusted library allocation
page read and write
279F000
stack
page read and write
513A000
trusted library allocation
page read and write
519E000
trusted library allocation
page read and write
516E000
trusted library allocation
page read and write
5112000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
5138000
trusted library allocation
page read and write
6DF000
heap
page read and write
251F000
stack
page read and write
395E000
stack
page read and write
5102000
trusted library allocation
page read and write
830000
remote allocation
page read and write
369F000
stack
page read and write
5107000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
70E000
heap
page read and write
A30000
unkown
page execute and write copy
510C000
trusted library allocation
page read and write
4F4F000
stack
page read and write
649000
heap
page read and write
510C000
trusted library allocation
page read and write
355F000
stack
page read and write
6F5000
heap
page read and write
70D000
heap
page read and write
574000
heap
page read and write
580000
direct allocation
page read and write
5111000
trusted library allocation
page read and write
48DD000
stack
page read and write
50F5000
trusted library allocation
page read and write
5143000
trusted library allocation
page read and write
515F000
trusted library allocation
page read and write
70A000
heap
page read and write
570000
heap
page read and write
512B000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
574000
heap
page read and write
610000
heap
page read and write
5160000
trusted library allocation
page read and write
4FD0000
heap
page read and write
5160000
trusted library allocation
page read and write
580000
direct allocation
page read and write
5164000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
1F0000
heap
page read and write
516E000
trusted library allocation
page read and write
2F1F000
stack
page read and write
5202000
trusted library allocation
page read and write
6D7000
heap
page read and write
51FC000
trusted library allocation
page read and write
574000
heap
page read and write
A7F000
unkown
page execute and write copy
5102000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
3A9E000
stack
page read and write
6DE000
heap
page read and write
510C000
trusted library allocation
page read and write
574000
heap
page read and write
5107000
trusted library allocation
page read and write
27DE000
stack
page read and write
5111000
trusted library allocation
page read and write
51AA000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
50DF000
stack
page read and write
4DDE000
stack
page read and write
580000
direct allocation
page read and write
820000
direct allocation
page execute and read and write
830000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
6E6000
heap
page read and write
5107000
trusted library allocation
page read and write
5105000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
700000
heap
page read and write
5112000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
2B9E000
stack
page read and write
89B000
unkown
page execute and read and write
5119000
trusted library allocation
page read and write
41E1000
heap
page read and write
5144000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
B23000
unkown
page execute and write copy
41E1000
heap
page read and write
512C000
trusted library allocation
page read and write
4E4E000
stack
page read and write
510C000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
6FE000
heap
page read and write
651000
heap
page read and write
5107000
trusted library allocation
page read and write
41F1000
heap
page read and write
580000
direct allocation
page read and write
50FA000
trusted library allocation
page read and write
70D000
heap
page read and write
391F000
stack
page read and write
41E1000
heap
page read and write
52CB000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
6F2000
heap
page read and write
580000
direct allocation
page read and write
6FE000
heap
page read and write
513B000
trusted library allocation
page read and write
704000
heap
page read and write
269E000
stack
page read and write
574000
heap
page read and write
704000
heap
page read and write
6FE000
heap
page read and write
5164000
trusted library allocation
page read and write
6BF000
heap
page read and write
5107000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
5111000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
5147000
trusted library allocation
page read and write
5141000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
2A1F000
stack
page read and write
5196000
trusted library allocation
page read and write
5111000
trusted library allocation
page read and write
70D000
heap
page read and write
6F2000
heap
page read and write
512F000
trusted library allocation
page read and write
574000
heap
page read and write
6E2000
heap
page read and write
510C000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
830000
remote allocation
page read and write
50F4000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
840000
unkown
page readonly
5110000
trusted library allocation
page read and write
4A1D000
stack
page read and write
491E000
stack
page read and write
513D000
trusted library allocation
page read and write
479F000
stack
page read and write
341F000
stack
page read and write
5107000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
580000
direct allocation
page read and write
5126000
trusted library allocation
page read and write
517B000
trusted library allocation
page read and write
5253000
trusted library allocation
page read and write
67B000
heap
page read and write
574000
heap
page read and write
70C000
heap
page read and write
5150000
trusted library allocation
page read and write
3E5E000
stack
page read and write
70D000
heap
page read and write
5107000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
A79000
unkown
page execute and read and write
580000
direct allocation
page read and write
5110000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
6F1000
heap
page read and write
6F2000
heap
page read and write
6E2000
heap
page read and write
560000
heap
page read and write
5102000
trusted library allocation
page read and write
A7A000
unkown
page execute and write copy
510C000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
5138000
trusted library allocation
page read and write
6E8000
heap
page read and write
511F000
trusted library allocation
page read and write
5A0000
heap
page read and write
3BDE000
stack
page read and write
6E2000
heap
page read and write
5107000
trusted library allocation
page read and write
4FAE000
stack
page read and write
511F000
trusted library allocation
page read and write
42E0000
trusted library allocation
page read and write
5126000
trusted library allocation
page read and write
B2C000
unkown
page execute and write copy
5102000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
580000
direct allocation
page read and write
6C1000
heap
page read and write
830000
direct allocation
page execute and read and write
50F1000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
510D000
trusted library allocation
page read and write
4C9E000
stack
page read and write
5EE000
stack
page read and write
512F000
trusted library allocation
page read and write
5127000
trusted library allocation
page read and write
41E1000
heap
page read and write
50FF000
trusted library allocation
page read and write
574000
heap
page read and write
B2C000
unkown
page execute and write copy
5125000
trusted library allocation
page read and write
6F4000
heap
page read and write
AB0000
unkown
page execute and read and write
5109000
trusted library allocation
page read and write
AA4000
unkown
page execute and read and write
510C000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
ABB000
unkown
page execute and read and write
ABA000
unkown
page execute and write copy
514E000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
510C000
trusted library allocation
page read and write
517B000
trusted library allocation
page read and write
53E000
stack
page read and write
510C000
trusted library allocation
page read and write
574000
heap
page read and write
512F000
trusted library allocation
page read and write
5164000
trusted library allocation
page read and write
5114000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
5157000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
521B000
trusted library allocation
page read and write
80E000
stack
page read and write
580000
direct allocation
page read and write
4D0000
heap
page read and write
5144000
trusted library allocation
page read and write
36DE000
stack
page read and write
41E0000
heap
page read and write
517B000
trusted library allocation
page read and write
47C0000
direct allocation
page execute and read and write
5111000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
6D1000
heap
page read and write
6E7000
heap
page read and write
6F2000
heap
page read and write
574000
heap
page read and write
6F1000
heap
page read and write
5122000
trusted library allocation
page read and write
51F4000
trusted library allocation
page read and write
5193000
trusted library allocation
page read and write
31DE000
stack
page read and write
574000
heap
page read and write
B24000
unkown
page execute and read and write
5111000
trusted library allocation
page read and write
5109000
trusted library allocation
page read and write
512F000
trusted library allocation
page read and write
61A000
heap
page read and write
5107000
trusted library allocation
page read and write
574000
heap
page read and write
600000
direct allocation
page execute and read and write
689000
heap
page read and write
5129000
trusted library allocation
page read and write
6E6000
heap
page read and write
6F5000
heap
page read and write
47A0000
direct allocation
page execute and read and write
6D7000
heap
page read and write
5164000
trusted library allocation
page read and write
511F000
trusted library allocation
page read and write
3B9F000
stack
page read and write
4A5E000
stack
page read and write
5114000
trusted library allocation
page read and write
574000
heap
page read and write
52D3000
trusted library allocation
page read and write
4660000
direct allocation
page read and write
6F4000
heap
page read and write
5100000
trusted library allocation
page read and write
5124000
trusted library allocation
page read and write
9B000
stack
page read and write
50F1000
trusted library allocation
page read and write
517E000
trusted library allocation
page read and write
37DF000
stack
page read and write
50F1000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
580000
direct allocation
page read and write
A0D000
unkown
page execute and read and write
514D000
trusted library allocation
page read and write
5107000
trusted library allocation
page read and write
B25000
unkown
page execute and write copy
70D000
heap
page read and write
50F7000
trusted library allocation
page read and write
574000
heap
page read and write
5133000
trusted library allocation
page read and write
6DE000
heap
page read and write
5111000
trusted library allocation
page read and write
4A9C000
trusted library allocation
page read and write
5102000
trusted library allocation
page read and write
511E000
trusted library allocation
page read and write
There are 590 hidden memdumps, click here to show them.