IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_91e76ee78e1f204b45c73efb41d5deb2f3e72f7_22e76915_6d55beea-221e-4aa1-acde-4424e739a9d1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\R2L4HOH3ABPEWSR51AXUR0XR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD76D.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 27 19:15:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8B6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8E6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\R2L4HOH3ABPEWSR51AXUR0XR.exe.log
CSV text
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\R2L4HOH3ABPEWSR51AXUR0XR.exe
"C:\Users\user\AppData\Local\Temp\R2L4HOH3ABPEWSR51AXUR0XR.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 1880

URLs

Name
IP
Malicious
presticitpo.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
founpiuer.store
malicious
crisiwarny.store
malicious
scriptyprefej.store
malicious
navygenerayk.store
malicious
thumbystriw.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://crisiwarny.store/h
unknown
http://185.215.113.16/mine/random.exeM
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://crisiwarny.store/O
unknown
http://185.215.113.16/mine/random.exe
unknown
http://185.215.113.16/P
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://crisiwarny.store/api6Co~
unknown
https://crisiwarny.store/apire1
unknown
http://185.215.113.16/K
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/o
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://crisiwarny.store/r
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.16/off/def.exest
unknown
https://crisiwarny.store/apixe
unknown
https://crisiwarny.store/0v
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://crisiwarny.store/?
unknown
http://185.215.113.16/
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://crisiwarny.store
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/apiny
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://crisiwarny.store/7
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{4c14077b-83a8-46e8-eb30-f57234ab7c3e}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
461E000
stack
page read and write
5F53000
trusted library allocation
page read and write
6027000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
5F37000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
5F65000
trusted library allocation
page read and write
4D20000
heap
page read and write
4D10000
direct allocation
page read and write
4A51000
heap
page read and write
5CA4000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
2C1E000
stack
page read and write
FEF000
heap
page read and write
5EF3000
trusted library allocation
page read and write
5F4F000
trusted library allocation
page read and write
610F000
trusted library allocation
page read and write
2BDB000
stack
page read and write
59B7000
trusted library allocation
page read and write
5EEC000
trusted library allocation
page read and write
1176000
heap
page read and write
5AA1000
trusted library allocation
page read and write
50BC000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
1178000
heap
page read and write
59B7000
trusted library allocation
page read and write
5A03000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
59A4000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
59AF000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
5E49000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
523E000
stack
page read and write
5E43000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
9CF000
unkown
page execute and write copy
1178000
heap
page read and write
13BE000
stack
page read and write
5AA8000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
5AD6000
trusted library allocation
page read and write
5F6B000
trusted library allocation
page read and write
F80000
heap
page read and write
59C7000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
5F74000
trusted library allocation
page read and write
59FA000
trusted library allocation
page read and write
AE4000
unkown
page execute and write copy
5F3A000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
5EFE000
trusted library allocation
page read and write
116C000
heap
page read and write
5E4C000
trusted library allocation
page read and write
4D21000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5EEF000
trusted library allocation
page read and write
5240000
trusted library allocation
page execute and read and write
5AB6000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
114E000
heap
page read and write
59B2000
trusted library allocation
page read and write
4A51000
heap
page read and write
5A0E000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
5AD9000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
4A40000
direct allocation
page read and write
B8C000
stack
page read and write
59E8000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
1157000
heap
page read and write
5385000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5F4F000
trusted library allocation
page read and write
35DE000
stack
page read and write
5A0E000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
1157000
heap
page read and write
115F000
heap
page read and write
4D10000
direct allocation
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
5EE7000
trusted library allocation
page read and write
381F000
stack
page read and write
5E4B000
trusted library allocation
page read and write
1150000
heap
page read and write
5E50000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5F08000
trusted library allocation
page read and write
9FE000
unkown
page execute and write copy
5F0F000
trusted library allocation
page read and write
601E000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
4D21000
heap
page read and write
5E40000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
113D000
heap
page read and write
5CA5000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
45DF000
stack
page read and write
5AD6000
trusted library allocation
page read and write
4D21000
heap
page read and write
59AF000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
5EF2000
trusted library allocation
page read and write
5A1E000
trusted library allocation
page read and write
ADD000
unkown
page execute and write copy
5F73000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
1161000
heap
page read and write
59C4000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
5E42000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
31DF000
stack
page read and write
59B7000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
59A5000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
114E000
heap
page read and write
A65000
unkown
page execute and write copy
114C000
heap
page read and write
59E0000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
59EA000
trusted library allocation
page read and write
742E000
stack
page read and write
114C000
heap
page read and write
5AC5000
trusted library allocation
page read and write
5F76000
trusted library allocation
page read and write
5FAD000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
A27000
unkown
page execute and read and write
435F000
stack
page read and write
5AD6000
trusted library allocation
page read and write
EF9000
stack
page read and write
A72000
unkown
page execute and write copy
4E40000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5EEC000
trusted library allocation
page read and write
114B000
heap
page read and write
4EE0000
direct allocation
page read and write
5F5B000
trusted library allocation
page read and write
114E000
heap
page read and write
5E42000
trusted library allocation
page read and write
5EF9000
trusted library allocation
page read and write
76AE000
stack
page read and write
59F9000
trusted library allocation
page read and write
5F3C000
trusted library allocation
page read and write
605D000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
84A000
unkown
page execute and read and write
59F5000
trusted library allocation
page read and write
5F69000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
1161000
heap
page read and write
59AC000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
5FAE000
trusted library allocation
page read and write
FB0000
heap
page read and write
842000
unkown
page execute and read and write
59A6000
trusted library allocation
page read and write
117B000
heap
page read and write
5E49000
trusted library allocation
page read and write
4D21000
heap
page read and write
59F1000
trusted library allocation
page read and write
9BE000
unkown
page execute and read and write
5F62000
trusted library allocation
page read and write
4A51000
heap
page read and write
5E4F000
trusted library allocation
page read and write
36DF000
stack
page read and write
5540000
remote allocation
page read and write
59AD000
trusted library allocation
page read and write
1170000
heap
page read and write
5B45000
trusted library allocation
page read and write
115C000
heap
page read and write
5E0F000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
1160000
heap
page read and write
485F000
stack
page read and write
59BC000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
4D21000
heap
page read and write
5EF0000
trusted library allocation
page read and write
A97000
unkown
page execute and write copy
59AB000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
59A4000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
5F3C000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
4A51000
heap
page read and write
4A51000
heap
page read and write
5AD6000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
1176000
heap
page read and write
59C1000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
115A000
heap
page read and write
5E41000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5540000
remote allocation
page read and write
5030000
direct allocation
page execute and read and write
5F0A000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
A08000
unkown
page execute and write copy
59CC000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
A52000
unkown
page execute and read and write
117A000
heap
page read and write
77AE000
stack
page read and write
4E64000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
59B2000
trusted library allocation
page read and write
117E000
heap
page read and write
5E4C000
trusted library allocation
page read and write
846000
unkown
page write copy
59ED000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
846000
unkown
page write copy
5F02000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
349E000
stack
page read and write
59C1000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
BA4000
unkown
page execute and write copy
5AC6000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
AF7000
unkown
page execute and write copy
840000
unkown
page readonly
5E4C000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
321E000
stack
page read and write
5E45000
trusted library allocation
page read and write
359F000
stack
page read and write
5AC6000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
4E53000
trusted library allocation
page execute and read and write
5AD6000
trusted library allocation
page read and write
5F8C000
trusted library allocation
page read and write
59BF000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
3F9F000
stack
page read and write
4EDB000
trusted library allocation
page execute and read and write
59C7000
trusted library allocation
page read and write
4A51000
heap
page read and write
4D10000
direct allocation
page read and write
489E000
stack
page read and write
5E43000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
5CA6000
trusted library allocation
page read and write
3E5F000
stack
page read and write
1160000
heap
page read and write
5AB0000
trusted library allocation
page read and write
5EE5000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
529E000
stack
page read and write
59BB000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
116E000
heap
page read and write
4E60000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
5A0F000
trusted library allocation
page read and write
114B000
heap
page read and write
5E44000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
9F7000
unkown
page execute and read and write
5540000
remote allocation
page read and write
5AD6000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
3BDF000
stack
page read and write
5040000
direct allocation
page execute and read and write
59B5000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
5AC6000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5F02000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
5F08000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
4EE0000
direct allocation
page read and write
4A40000
direct allocation
page read and write
5AAD000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5A1C000
trusted library allocation
page read and write
1178000
heap
page read and write
5AC6000
trusted library allocation
page read and write
1165000
heap
page read and write
5AD6000
trusted library allocation
page read and write
AF4000
unkown
page execute and read and write
5E4C000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
A26000
unkown
page execute and write copy
115C000
heap
page read and write
59D6000
trusted library allocation
page read and write
61A8000
trusted library allocation
page read and write
5F51000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
8B1000
unkown
page execute and write copy
1150000
heap
page read and write
5AC5000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
5130000
heap
page read and write
5AD6000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
5F2F000
trusted library allocation
page read and write
63B9000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
5F76000
trusted library allocation
page read and write
115F000
heap
page read and write
BBA000
unkown
page execute and write copy
59B1000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
5260000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
331F000
stack
page read and write
5AB2000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
471F000
stack
page read and write
5AC6000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
4A51000
heap
page read and write
4D21000
heap
page read and write
59E1000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
2C80000
direct allocation
page read and write
115F000
heap
page read and write
5B4E000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
115A000
heap
page read and write
5F12000
trusted library allocation
page read and write
100C000
heap
page read and write
5E45000
trusted library allocation
page read and write
395F000
stack
page read and write
A5A000
unkown
page execute and write copy
5E45000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
5E4A000
trusted library allocation
page read and write
3C1E000
stack
page read and write
4CF0000
heap
page read and write
117E000
heap
page read and write
5E43000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
4D21000
heap
page read and write
5AD6000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
59C1000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
4EE0000
direct allocation
page read and write
A4C000
unkown
page execute and read and write
A76000
unkown
page execute and read and write
115C000
heap
page read and write
59A1000
trusted library allocation
page read and write
59F2000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
840000
unkown
page read and write
5AD6000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
5F3A000
trusted library allocation
page read and write
2D9F000
stack
page read and write
5CA5000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5A15000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
5E44000
trusted library allocation
page read and write
4D21000
heap
page read and write
117B000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5FD5000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
59F5000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
4FFE000
stack
page read and write
59C1000
trusted library allocation
page read and write
52E0000
heap
page execute and read and write
A00000
unkown
page execute and read and write
1150000
heap
page read and write
5AD6000
trusted library allocation
page read and write
5F9C000
trusted library allocation
page read and write
44DE000
stack
page read and write
5A03000
trusted library allocation
page read and write
1176000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5F7A000
trusted library allocation
page read and write
5AA7000
trusted library allocation
page read and write
5A24000
trusted library allocation
page read and write
4D21000
heap
page read and write
5AB5000
trusted library allocation
page read and write
59C2000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
4A51000
heap
page read and write
9A8000
unkown
page execute and read and write
59B2000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
5ED6000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
A14000
unkown
page execute and write copy
5AC5000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
3FDE000
stack
page read and write
59DA000
trusted library allocation
page read and write
63AB000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
4A51000
heap
page read and write
116A000
heap
page read and write
4D10000
direct allocation
page read and write
4A51000
heap
page read and write
5E4B000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
63BC000
trusted library allocation
page read and write
A42000
unkown
page execute and read and write
8B0000
unkown
page readonly
66B3000
trusted library allocation
page read and write
856000
unkown
page execute and write copy
5FB1000
trusted library allocation
page read and write
59A5000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
B93000
unkown
page execute and write copy
4A40000
direct allocation
page read and write
371E000
stack
page read and write
5E48000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
5FB7000
trusted library allocation
page read and write
411E000
stack
page read and write
5EF4000
trusted library allocation
page read and write
30DE000
stack
page read and write
537E000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
1178000
heap
page read and write
5E4F000
trusted library allocation
page read and write
1042000
heap
page read and write
9AA000
unkown
page execute and write copy
114B000
heap
page read and write
9CA000
unkown
page execute and read and write
5CA7000
trusted library allocation
page read and write
59D3000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
4A51000
heap
page read and write
5F67000
trusted library allocation
page read and write
499F000
stack
page read and write
5E46000
trusted library allocation
page read and write
1143000
heap
page read and write
40DF000
stack
page read and write
4D21000
heap
page read and write
9D6000
unkown
page execute and read and write
5AC6000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
5F32000
trusted library allocation
page read and write
F86000
heap
page read and write
5AC5000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
116E000
heap
page read and write
59B7000
trusted library allocation
page read and write
A4A000
unkown
page execute and write copy
59EA000
trusted library allocation
page read and write
4D31000
heap
page read and write
5AAD000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
5FAC000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
90B000
unkown
page execute and write copy
5250000
trusted library allocation
page read and write
5A19000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
1178000
heap
page read and write
4A40000
direct allocation
page read and write
5EF9000
trusted library allocation
page read and write
A29000
unkown
page execute and write copy
4D21000
heap
page read and write
114E000
heap
page read and write
59D9000
trusted library allocation
page read and write
1171000
heap
page read and write
59DD000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
9DF000
unkown
page execute and write copy
59A1000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
59F0000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
1144000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
59C6000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
A90000
unkown
page execute and write copy
59C0000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
449F000
stack
page read and write
A34000
unkown
page execute and write copy
1171000
heap
page read and write
1161000
heap
page read and write
5E44000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
59F7000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
12BE000
stack
page read and write
385E000
stack
page read and write
59CE000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
BAB000
unkown
page execute and write copy
59E0000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
A13000
unkown
page execute and read and write
5F2E000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5CD7000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5F0A000
trusted library allocation
page read and write
FBE000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
2E9F000
stack
page read and write
1160000
heap
page read and write
5E47000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
A3A000
unkown
page execute and write copy
59CE000
trusted library allocation
page read and write
5060000
direct allocation
page execute and read and write
5AA8000
trusted library allocation
page read and write
FA0000
heap
page read and write
AF4000
unkown
page execute and write copy
113E000
heap
page read and write
5F07000
trusted library allocation
page read and write
5FCF000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
2B9E000
stack
page read and write
F6E000
stack
page read and write
B97000
unkown
page execute and write copy
59E5000
trusted library allocation
page read and write
114F000
heap
page read and write
59B7000
trusted library allocation
page read and write
115E000
heap
page read and write
5E43000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
512C000
stack
page read and write
5E4A000
trusted library allocation
page read and write
5F13000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
A16000
unkown
page execute and read and write
3E9E000
stack
page read and write
4A51000
heap
page read and write
AE4000
unkown
page execute and write copy
5E43000
trusted library allocation
page read and write
A39000
unkown
page execute and read and write
5F60000
trusted library allocation
page read and write
2C90000
heap
page read and write
4A40000
direct allocation
page read and write
5EF2000
trusted library allocation
page read and write
62F1000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5E46000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
1150000
heap
page read and write
59D1000
trusted library allocation
page read and write
335E000
stack
page read and write
5AB6000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
5FAF000
trusted library allocation
page read and write
A6B000
unkown
page execute and read and write
AF7000
unkown
page execute and write copy
1144000
heap
page read and write
62F4000
trusted library allocation
page read and write
1161000
heap
page read and write
59D1000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
59B7000
trusted library allocation
page read and write
1178000
heap
page read and write
5F11000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
4E20000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
4A51000
heap
page read and write
114E000
heap
page read and write
116E000
heap
page read and write
59AF000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
5F35000
trusted library allocation
page read and write
1150000
heap
page read and write
4D10000
direct allocation
page read and write
5000000
direct allocation
page execute and read and write
1170000
heap
page read and write
5E47000
trusted library allocation
page read and write
9CA000
unkown
page execute and write copy
5E4E000
trusted library allocation
page read and write
1178000
heap
page read and write
59E3000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
9F6000
unkown
page execute and write copy
5CF7000
trusted library allocation
page read and write
4D21000
heap
page read and write
59B5000
trusted library allocation
page read and write
115C000
heap
page read and write
59C1000
trusted library allocation
page read and write
3A9F000
stack
page read and write
5E4C000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
5F53000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
4D21000
heap
page read and write
5F35000
trusted library allocation
page read and write
345F000
stack
page read and write
5AAD000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
F00000
heap
page read and write
504E000
stack
page read and write
59E9000
trusted library allocation
page read and write
2F9F000
stack
page read and write
5F37000
trusted library allocation
page read and write
FF8000
heap
page read and write
5E4D000
trusted library allocation
page read and write
610D000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
425E000
stack
page read and write
5F11000
trusted library allocation
page read and write
4ED7000
trusted library allocation
page execute and read and write
5AAD000
trusted library allocation
page read and write
117A000
heap
page read and write
FBA000
heap
page read and write
4D21000
heap
page read and write
5AB5000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
4A40000
direct allocation
page read and write
59B0000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
59D8000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
A7E000
unkown
page execute and write copy
5E4A000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
2C5E000
stack
page read and write
59B8000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
5AB6000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
84A000
unkown
page execute and write copy
5F09000
trusted library allocation
page read and write
5F73000
trusted library allocation
page read and write
4D21000
heap
page read and write
5E4C000
trusted library allocation
page read and write
6291000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
A81000
unkown
page execute and read and write
9E6000
unkown
page execute and read and write
4D21000
heap
page read and write
4A51000
heap
page read and write
5060000
direct allocation
page execute and read and write
5AD6000
trusted library allocation
page read and write
127E000
stack
page read and write
309F000
stack
page read and write
59A1000
trusted library allocation
page read and write
5FD3000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
4EF0000
heap
page read and write
73ED000
stack
page read and write
5AC6000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
3ADE000
stack
page read and write
114E000
heap
page read and write
A4D000
unkown
page execute and write copy
5AA1000
trusted library allocation
page read and write
5F9D000
trusted library allocation
page read and write
475E000
stack
page read and write
5F32000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
1000000
heap
page read and write
605B000
trusted library allocation
page read and write
BF0000
heap
page read and write
5371000
trusted library allocation
page read and write
4D10000
direct allocation
page read and write
4D10000
direct allocation
page read and write
5F19000
trusted library allocation
page read and write
609E000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
117E000
heap
page read and write
A94000
unkown
page execute and read and write
5EE7000
trusted library allocation
page read and write
75AE000
stack
page read and write
5F01000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
439E000
stack
page read and write
399E000
stack
page read and write
59B7000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
59B5000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
1178000
heap
page read and write
5D47000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
52DE000
stack
page read and write
5FE8000
trusted library allocation
page read and write
4A51000
heap
page read and write
59B8000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
74A0000
heap
page execute and read and write
59C2000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
1167000
heap
page read and write
5F51000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
4EAC000
stack
page read and write
4D21000
heap
page read and write
5E47000
trusted library allocation
page read and write
1160000
heap
page read and write
5AA8000
trusted library allocation
page read and write
117E000
heap
page read and write
5AD6000
trusted library allocation
page read and write
5E45000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
5F33000
trusted library allocation
page read and write
4A51000
heap
page read and write
5F9F000
trusted library allocation
page read and write
4A51000
heap
page read and write
4E5D000
trusted library allocation
page execute and read and write
5E48000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
A5D000
unkown
page execute and read and write
5F30000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
421F000
stack
page read and write
5CA1000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
3D5E000
stack
page read and write
5F31000
trusted library allocation
page read and write
59CA000
trusted library allocation
page read and write
2C97000
heap
page read and write
FED000
heap
page read and write
114E000
heap
page read and write
114E000
heap
page read and write
3D1F000
stack
page read and write
5EEA000
trusted library allocation
page read and write
59F3000
trusted library allocation
page read and write
59C4000
trusted library allocation
page read and write
842000
unkown
page execute and write copy
A2A000
unkown
page execute and read and write
5AD6000
trusted library allocation
page read and write
5AD6000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
1178000
heap
page read and write
4ECA000
trusted library allocation
page execute and read and write
5F04000
trusted library allocation
page read and write
There are 873 hidden memdumps, click here to show them.