IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\4LSU4O6YQKPDF8R94WQ6K0Z23.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4LSU4O6YQKPDF8R94WQ6K0Z23.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\4LSU4O6YQKPDF8R94WQ6K0Z23.exe
"C:\Users\user\AppData\Local\Temp\4LSU4O6YQKPDF8R94WQ6K0Z23.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/a
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://crisiwarny.store/apie
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/off/def.exeki
unknown
https://crisiwarny.store/apial
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://crisiwarny.store/h(g
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://crisiwarny.store/Y
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://crisiwarny.store/k:0
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://crisiwarny.store/k6lv
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://185.215.113.16/D
unknown
https://crisiwarny.store:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16/x
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
http://185.215.113.16:80/off/def.exerosoft
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.16/off/def.exek
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
D31000
unkown
page execute and read and write
malicious
1650000
heap
page read and write
5780000
trusted library allocation
page read and write
4E3F000
stack
page read and write
D19000
heap
page read and write
A76000
unkown
page execute and write copy
2E3E000
stack
page read and write
56A8000
trusted library allocation
page read and write
3A7F000
stack
page read and write
5DDE000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
5681000
trusted library allocation
page read and write
3ABE000
stack
page read and write
297D000
heap
page read and write
5791000
trusted library allocation
page read and write
58A5000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
C8E000
unkown
page execute and write copy
51E1000
heap
page read and write
5C63000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
D0F000
heap
page read and write
CFC000
heap
page read and write
D0C000
heap
page read and write
5D6C000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
51E1000
heap
page read and write
5D41000
trusted library allocation
page read and write
31FF000
stack
page read and write
F82000
unkown
page execute and write copy
51E2000
heap
page read and write
4A7F000
stack
page read and write
FE7000
unkown
page execute and read and write
5D6C000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
FE6000
unkown
page execute and write copy
56CC000
trusted library allocation
page read and write
5C71000
trusted library allocation
page read and write
79B0000
heap
page execute and read and write
56A3000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
BFF000
unkown
page execute and read and write
C48000
unkown
page execute and read and write
56BF000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
F96000
unkown
page execute and write copy
C10000
direct allocation
page read and write
37FF000
stack
page read and write
4701000
heap
page read and write
5688000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
A6A000
unkown
page execute and read and write
5D99000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
536B000
stack
page read and write
D1B000
heap
page read and write
4701000
heap
page read and write
5C66000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
4B80000
direct allocation
page read and write
57BD000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
56A3000
trusted library allocation
page read and write
4BFE000
stack
page read and write
5E7F000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
C99000
unkown
page execute and write copy
2F7E000
stack
page read and write
4701000
heap
page read and write
52E0000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
433E000
stack
page read and write
5706000
trusted library allocation
page read and write
C87000
unkown
page execute and read and write
569F000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
40FE000
stack
page read and write
393F000
stack
page read and write
C45000
unkown
page execute and write copy
165A000
heap
page read and write
5C62000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
567C000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
5314000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
5699000
trusted library allocation
page read and write
6751000
trusted library allocation
page read and write
C57000
unkown
page execute and write copy
C61000
unkown
page execute and write copy
5714000
trusted library allocation
page read and write
D1D000
heap
page read and write
56A8000
trusted library allocation
page read and write
546E000
stack
page read and write
788E000
stack
page read and write
56AB000
trusted library allocation
page read and write
54FE000
stack
page read and write
7AFE000
stack
page read and write
CF6000
heap
page read and write
567A000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
40BE000
stack
page read and write
5780000
trusted library allocation
page read and write
D14000
heap
page read and write
5C66000
trusted library allocation
page read and write
D0C000
heap
page read and write
5C62000
trusted library allocation
page read and write
C10000
direct allocation
page read and write
51E1000
heap
page read and write
3CFF000
stack
page read and write
5AB8000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
C2E000
heap
page read and write
F92000
unkown
page execute and write copy
64C3000
trusted library allocation
page read and write
568B000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
45BE000
stack
page read and write
5791000
trusted library allocation
page read and write
5E0E000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
5550000
trusted library allocation
page execute and read and write
569D000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
4701000
heap
page read and write
CFF000
heap
page read and write
35BE000
stack
page read and write
5D07000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
CFD000
heap
page read and write
5ECE000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
CFE000
heap
page read and write
548A000
trusted library allocation
page execute and read and write
570F000
trusted library allocation
page read and write
4ABE000
stack
page read and write
1046000
unkown
page execute and write copy
532D000
stack
page read and write
920000
heap
page read and write
D0A000
heap
page read and write
5497000
trusted library allocation
page execute and read and write
D1D000
heap
page read and write
57C0000
trusted library allocation
page read and write
539E000
stack
page read and write
56BC000
trusted library allocation
page read and write
AAE000
stack
page read and write
BEF000
stack
page read and write
51D0000
direct allocation
page read and write
798E000
stack
page read and write
4701000
heap
page read and write
5714000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
FC3000
unkown
page execute and read and write
114F000
stack
page read and write
347E000
stack
page read and write
5719000
trusted library allocation
page read and write
5D28000
trusted library allocation
page read and write
D01000
heap
page read and write
F55000
unkown
page execute and read and write
5685000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
CFC000
heap
page read and write
567C000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
BFC000
unkown
page execute and write copy
5705000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
C10000
direct allocation
page read and write
C10000
direct allocation
page read and write
5692000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
5777000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
5773000
trusted library allocation
page read and write
32FF000
stack
page read and write
5C68000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
3E7E000
stack
page read and write
5C64000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
C91000
unkown
page execute and read and write
531D000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
31BF000
stack
page read and write
5C6A000
trusted library allocation
page read and write
5C71000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
40BF000
stack
page read and write
125C000
stack
page read and write
54C0000
heap
page read and write
5D70000
trusted library allocation
page read and write
169E000
heap
page read and write
5780000
trusted library allocation
page read and write
30F7000
heap
page read and write
5ABA000
trusted library allocation
page read and write
44BE000
stack
page read and write
C8E000
heap
page read and write
D8B000
unkown
page execute and read and write
BE9000
unkown
page execute and read and write
423E000
stack
page read and write
56A3000
trusted library allocation
page read and write
6483000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
C8E000
heap
page read and write
CFF000
heap
page read and write
5696000
trusted library allocation
page read and write
C10000
direct allocation
page read and write
549F000
stack
page read and write
5C6E000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
51E1000
heap
page read and write
C10000
direct allocation
page read and write
D19000
heap
page read and write
51D0000
direct allocation
page read and write
5D25000
trusted library allocation
page read and write
D1B000
heap
page read and write
CFD000
heap
page read and write
3A7E000
stack
page read and write
5DAD000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
D97000
unkown
page execute and write copy
5DEF000
trusted library allocation
page read and write
D03000
heap
page read and write
5C6B000
trusted library allocation
page read and write
FD9000
unkown
page execute and write copy
168F000
heap
page read and write
5677000
trusted library allocation
page read and write
367F000
stack
page read and write
5ED0000
trusted library allocation
page read and write
393E000
stack
page read and write
5C64000
trusted library allocation
page read and write
13B0000
heap
page read and write
C10000
direct allocation
page read and write
61E0000
trusted library allocation
page read and write
D1E000
heap
page read and write
102F000
unkown
page execute and write copy
51D0000
direct allocation
page read and write
D31000
unkown
page execute and write copy
FB5000
unkown
page execute and read and write
56D4000
trusted library allocation
page read and write
497E000
stack
page read and write
5DDC000
trusted library allocation
page read and write
433F000
stack
page read and write
5720000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
D11000
heap
page read and write
2977000
heap
page read and write
570C000
trusted library allocation
page read and write
784D000
stack
page read and write
569B000
trusted library allocation
page read and write
D1C000
heap
page read and write
5AC2000
trusted library allocation
page read and write
C6E000
heap
page read and write
5C62000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
D09000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
5D35000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
BF0000
heap
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
51E1000
heap
page read and write
5691000
trusted library allocation
page read and write
5C6E000
trusted library allocation
page read and write
D16000
heap
page read and write
1490000
heap
page read and write
5C63000
trusted library allocation
page read and write
343E000
stack
page read and write
5D2A000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
5E9F000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
51E1000
heap
page read and write
F18000
unkown
page execute and read and write
5854000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
F6A000
unkown
page execute and read and write
5C61000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
566F000
stack
page read and write
5D38000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
61DE000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
165E000
heap
page read and write
5022000
trusted library allocation
page read and write
4701000
heap
page read and write
3CBF000
stack
page read and write
5B63000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
5D5C000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
333E000
stack
page read and write
5DB6000
trusted library allocation
page read and write
397E000
stack
page read and write
5691000
trusted library allocation
page read and write
C11000
unkown
page execute and write copy
CFD000
unkown
page execute and write copy
56C8000
trusted library allocation
page read and write
568D000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5D5E000
trusted library allocation
page read and write
CFD000
heap
page read and write
5723000
trusted library allocation
page read and write
5C68000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
CF4000
heap
page read and write
3FBE000
stack
page read and write
5770000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5DB4000
trusted library allocation
page read and write
CE1000
heap
page read and write
5715000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
79FE000
stack
page read and write
5699000
trusted library allocation
page read and write
2B7F000
stack
page read and write
357F000
stack
page read and write
5200000
heap
page read and write
CE2000
heap
page read and write
4BBC000
stack
page read and write
5D87000
trusted library allocation
page read and write
101E000
unkown
page execute and write copy
5720000
trusted library allocation
page read and write
56B9000
trusted library allocation
page read and write
5D83000
trusted library allocation
page read and write
1038000
unkown
page execute and write copy
D19000
heap
page read and write
51D0000
direct allocation
page read and write
4701000
heap
page read and write
56A8000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
C10000
direct allocation
page read and write
D0D000
heap
page read and write
C5A000
unkown
page execute and read and write
F81000
unkown
page execute and read and write
C82000
unkown
page execute and write copy
51D0000
direct allocation
page read and write
5E3C000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
C37000
unkown
page execute and write copy
D07000
heap
page read and write
5706000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
C10000
direct allocation
page read and write
2970000
heap
page read and write
357E000
stack
page read and write
5684000
trusted library allocation
page read and write
51E0000
remote allocation
page read and write
56C0000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
3A3F000
stack
page read and write
6474000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
D1C000
heap
page read and write
5715000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
5771000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
5778000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
51E0000
remote allocation
page read and write
D14000
heap
page read and write
5C69000
trusted library allocation
page read and write
292E000
stack
page read and write
5C67000
trusted library allocation
page read and write
5B8B000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
47FF000
stack
page read and write
5715000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
4F8E000
stack
page read and write
5C70000
trusted library allocation
page read and write
F7E000
unkown
page execute and write copy
C9A000
unkown
page execute and read and write
57AF000
trusted library allocation
page read and write
30EE000
stack
page read and write
5ABD000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
3BBF000
stack
page read and write
5777000
trusted library allocation
page read and write
4D55000
trusted library allocation
page read and write
A66000
unkown
page write copy
CF7000
unkown
page execute and write copy
5712000
trusted library allocation
page read and write
D19000
heap
page read and write
5DAA000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
D0C000
heap
page read and write
1696000
heap
page read and write
5771000
trusted library allocation
page read and write
45FE000
stack
page read and write
1038000
unkown
page execute and write copy
CF9000
heap
page read and write
D0E000
unkown
page execute and write copy
4B40000
trusted library allocation
page read and write
4700000
heap
page read and write
5E11000
trusted library allocation
page read and write
D0D000
heap
page read and write
5707000
trusted library allocation
page read and write
D17000
heap
page read and write
5AAE000
stack
page read and write
2CFE000
stack
page read and write
5751000
trusted library allocation
page read and write
5D27000
trusted library allocation
page read and write
383E000
stack
page read and write
CFC000
heap
page read and write
EFB000
unkown
page execute and read and write
4F4D000
stack
page read and write
1024000
unkown
page execute and write copy
3F7F000
stack
page read and write
5D99000
trusted library allocation
page read and write
16AC000
heap
page read and write
5CB000
stack
page read and write
D19000
heap
page read and write
30BE000
stack
page read and write
5313000
trusted library allocation
page execute and read and write
5330000
direct allocation
page read and write
F54000
unkown
page execute and write copy
51D0000
direct allocation
page read and write
568D000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
A62000
unkown
page execute and read and write
56B2000
trusted library allocation
page read and write
42FF000
stack
page read and write
D14000
heap
page read and write
57BE000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
178E000
stack
page read and write
5DEF000
trusted library allocation
page read and write
5678000
trusted library allocation
page read and write
F57000
unkown
page execute and write copy
C81000
heap
page read and write
5D52000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
D1B000
heap
page read and write
BF4000
unkown
page execute and read and write
4E4D000
stack
page read and write
51E1000
heap
page read and write
56C9000
trusted library allocation
page read and write
5699000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
5011000
trusted library allocation
page read and write
C6D000
unkown
page execute and read and write
A60000
unkown
page readonly
5D85000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
CF1000
heap
page read and write
A6A000
unkown
page execute and write copy
AE0000
heap
page read and write
343F000
stack
page read and write
30F0000
heap
page read and write
5AB4000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
5D0F000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
502B000
trusted library allocation
page read and write
D1D000
heap
page read and write
CF9000
heap
page read and write
51E1000
heap
page read and write
4701000
heap
page read and write
5480000
trusted library allocation
page read and write
5D9F000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
5D94000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
41FE000
stack
page read and write
C10000
direct allocation
page read and write
51D0000
direct allocation
page read and write
D12000
heap
page read and write
5D58000
trusted library allocation
page read and write
579D000
trusted library allocation
page read and write
5694000
trusted library allocation
page read and write
6775000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
C3A000
unkown
page execute and read and write
5E4F000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
5C61000
trusted library allocation
page read and write
5772000
trusted library allocation
page read and write
14D5000
heap
page read and write
5780000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
4B80000
direct allocation
page read and write
14D0000
heap
page read and write
51D0000
direct allocation
page read and write
5E7F000
trusted library allocation
page read and write
567C000
trusted library allocation
page read and write
1359000
stack
page read and write
D16000
heap
page read and write
5684000
trusted library allocation
page read and write
D14000
heap
page read and write
C20000
heap
page read and write
296C000
stack
page read and write
D0A000
heap
page read and write
5778000
trusted library allocation
page read and write
636C000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
C64000
unkown
page execute and read and write
5684000
trusted library allocation
page read and write
A00000
heap
page read and write
F22000
unkown
page execute and read and write
5854000
trusted library allocation
page read and write
5560000
heap
page read and write
5C66000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
51CF000
stack
page read and write
51E0000
heap
page read and write
FDA000
unkown
page execute and read and write
A60000
unkown
page read and write
5300000
trusted library allocation
page read and write
508F000
stack
page read and write
5708000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
A66000
unkown
page write copy
554C000
stack
page read and write
5D9B000
trusted library allocation
page read and write
CF4000
heap
page read and write
5C61000
trusted library allocation
page read and write
46FF000
stack
page read and write
D1E000
heap
page read and write
2DFF000
stack
page read and write
5C70000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
D0A000
heap
page read and write
5C64000
trusted library allocation
page read and write
3E3E000
stack
page read and write
D1B000
heap
page read and write
5791000
trusted library allocation
page read and write
D07000
heap
page read and write
50CE000
stack
page read and write
5778000
trusted library allocation
page read and write
4701000
heap
page read and write
5FB0000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
577A000
trusted library allocation
page read and write
D11000
heap
page read and write
5C61000
trusted library allocation
page read and write
1046000
unkown
page execute and read and write
1005000
unkown
page execute and read and write
5E81000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
F16000
unkown
page execute and read and write
38FF000
stack
page read and write
5C69000
trusted library allocation
page read and write
407F000
stack
page read and write
56A9000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
F8A000
unkown
page execute and read and write
5AF3000
trusted library allocation
page read and write
447E000
stack
page read and write
4D00000
direct allocation
page execute and read and write
F9A000
unkown
page execute and read and write
D14000
heap
page read and write
D19000
heap
page read and write
FB1000
unkown
page execute and write copy
5570000
trusted library allocation
page read and write
51B0000
heap
page read and write
56F0000
trusted library allocation
page read and write
D0A000
heap
page read and write
5C71000
trusted library allocation
page read and write
5D23000
trusted library allocation
page read and write
5D1F000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
3D3E000
stack
page read and write
51E1000
heap
page read and write
4B7D000
stack
page read and write
36BE000
stack
page read and write
56AD000
trusted library allocation
page read and write
5C71000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5699000
trusted library allocation
page read and write
D19000
heap
page read and write
EFD000
unkown
page execute and write copy
56EE000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
5C6C000
trusted library allocation
page read and write
3DFF000
stack
page read and write
BCF000
unkown
page execute and read and write
306E000
stack
page read and write
569C000
trusted library allocation
page read and write
4D0D000
stack
page read and write
4D00000
direct allocation
page execute and read and write
5D96000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
D07000
heap
page read and write
45BF000
stack
page read and write
5681000
trusted library allocation
page read and write
4D3E000
stack
page read and write
5C62000
trusted library allocation
page read and write
D17000
heap
page read and write
5720000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
2F3F000
stack
page read and write
5C6F000
trusted library allocation
page read and write
F2D000
unkown
page execute and read and write
CF1000
heap
page read and write
D19000
heap
page read and write
5C60000
trusted library allocation
page read and write
C65000
unkown
page execute and write copy
56A2000
trusted library allocation
page read and write
51E1000
heap
page read and write
56AD000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
D00000
heap
page read and write
5D6E000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
4CBF000
stack
page read and write
D8B000
unkown
page execute and write copy
5C66000
trusted library allocation
page read and write
51E1000
heap
page read and write
56A3000
trusted library allocation
page read and write
A6E000
stack
page read and write
3BFE000
stack
page read and write
5709000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
D0B000
heap
page read and write
36FE000
stack
page read and write
4701000
heap
page read and write
CF4000
heap
page read and write
5D7C000
trusted library allocation
page read and write
188F000
stack
page read and write
3BBE000
stack
page read and write
5D3A000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
D14000
heap
page read and write
5815000
trusted library allocation
page read and write
5590000
heap
page read and write
37BF000
stack
page read and write
59AE000
stack
page read and write
CFD000
unkown
page execute and write copy
5740000
heap
page execute and read and write
4701000
heap
page read and write
C53000
heap
page read and write
C65000
heap
page read and write
5705000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5672000
trusted library allocation
page read and write
D07000
heap
page read and write
51E1000
heap
page read and write
5671000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
1031000
unkown
page execute and write copy
56C7000
trusted library allocation
page read and write
D0F000
heap
page read and write
C12000
unkown
page execute and read and write
5C63000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
5D8E000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
D1D000
heap
page read and write
569D000
trusted library allocation
page read and write
51E0000
remote allocation
page read and write
3F3F000
stack
page read and write
5C69000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
5697000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
F2A000
unkown
page execute and read and write
5C6F000
trusted library allocation
page read and write
FBA000
unkown
page execute and read and write
5560000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
D17000
heap
page read and write
567B000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
C81000
heap
page read and write
5D3D000
trusted library allocation
page read and write
D16000
heap
page read and write
D16000
heap
page read and write
5694000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
D14000
heap
page read and write
5DDE000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
D19000
heap
page read and write
550E000
stack
page read and write
483E000
stack
page read and write
41BF000
stack
page read and write
5DF1000
trusted library allocation
page read and write
D06000
heap
page read and write
5715000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
4F14000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
16E1000
heap
page read and write
37FE000
stack
page read and write
5675000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
D08000
heap
page read and write
54B0000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
32FF000
stack
page read and write
5714000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
30AC000
stack
page read and write
41FF000
stack
page read and write
D11000
heap
page read and write
C6E000
heap
page read and write
5C62000
trusted library allocation
page read and write
D30000
unkown
page readonly
D0F000
heap
page read and write
FB6000
unkown
page execute and write copy
8FA000
stack
page read and write
FBB000
unkown
page execute and write copy
5C6C000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
4B80000
direct allocation
page read and write
5C60000
trusted library allocation
page read and write
353F000
stack
page read and write
5705000
trusted library allocation
page read and write
D1E000
heap
page read and write
4BBF000
stack
page read and write
5706000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
46BF000
stack
page read and write
5714000
trusted library allocation
page read and write
C2A000
heap
page read and write
5324000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
4701000
heap
page read and write
307F000
stack
page read and write
5C6E000
trusted library allocation
page read and write
5778000
trusted library allocation
page read and write
5EA1000
trusted library allocation
page read and write
1630000
heap
page read and write
5038000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
51E1000
heap
page read and write
5C6B000
trusted library allocation
page read and write
4CFF000
stack
page read and write
5D75000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
51F0000
heap
page read and write
F21000
unkown
page execute and write copy
5017000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
56A8000
trusted library allocation
page read and write
D14000
heap
page read and write
5780000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
46FE000
stack
page read and write
4701000
heap
page read and write
C2E000
unkown
page execute and write copy
5D52000
trusted library allocation
page read and write
AE5000
heap
page read and write
5716000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5685000
trusted library allocation
page read and write
C65000
heap
page read and write
5681000
trusted library allocation
page read and write
5D89000
trusted library allocation
page read and write
D1B000
heap
page read and write
447F000
stack
page read and write
2A7F000
stack
page read and write
5C6E000
trusted library allocation
page read and write
161E000
stack
page read and write
3B7F000
stack
page read and write
5776000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
3CFE000
stack
page read and write
5D77000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
7C3E000
stack
page read and write
6754000
trusted library allocation
page read and write
CF9000
heap
page read and write
4D00000
direct allocation
page execute and read and write
2CBF000
stack
page read and write
5D5E000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
4701000
heap
page read and write
5707000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
CFC000
heap
page read and write
5C6B000
trusted library allocation
page read and write
4701000
heap
page read and write
5720000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
5AB2000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
51D0000
direct allocation
page read and write
F17000
unkown
page execute and write copy
BF4000
unkown
page execute and write copy
D0C000
unkown
page execute and write copy
2BBE000
stack
page read and write
4701000
heap
page read and write
5C60000
trusted library allocation
page read and write
D1B000
heap
page read and write
5780000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
151E000
stack
page read and write
51E1000
heap
page read and write
4D30000
direct allocation
page execute and read and write
443F000
stack
page read and write
57BF000
trusted library allocation
page read and write
F95000
unkown
page execute and read and write
31FE000
stack
page read and write
568B000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
D16000
heap
page read and write
567A000
trusted library allocation
page read and write
CE1000
heap
page read and write
4711000
heap
page read and write
C10000
direct allocation
page read and write
5791000
trusted library allocation
page read and write
457F000
stack
page read and write
5C64000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
D07000
heap
page read and write
5ABB000
trusted library allocation
page read and write
493F000
stack
page read and write
51D0000
direct allocation
page read and write
5705000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
BD1000
unkown
page execute and write copy
D0F000
heap
page read and write
CFC000
heap
page read and write
CFD000
heap
page read and write
1047000
unkown
page execute and write copy
569C000
trusted library allocation
page read and write
D16000
heap
page read and write
56A9000
trusted library allocation
page read and write
36BF000
stack
page read and write
F26000
unkown
page execute and write copy
5C64000
trusted library allocation
page read and write
437E000
stack
page read and write
D0C000
unkown
page execute and read and write
5771000
trusted library allocation
page read and write
C58000
heap
page read and write
C10000
direct allocation
page read and write
1030000
unkown
page execute and read and write
567B000
trusted library allocation
page read and write
51E1000
heap
page read and write
522D000
stack
page read and write
D1B000
heap
page read and write
AD0000
heap
page read and write
D16000
heap
page read and write
D1C000
heap
page read and write
5681000
trusted library allocation
page read and write
D0E000
unkown
page execute and write copy
D0C000
heap
page read and write
33FF000
stack
page read and write
7B3E000
stack
page read and write
D30000
unkown
page read and write
F2C000
unkown
page execute and write copy
5789000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
102F000
unkown
page execute and write copy
549B000
trusted library allocation
page execute and read and write
C10000
direct allocation
page read and write
D19000
heap
page read and write
5B58000
trusted library allocation
page read and write
C58000
heap
page read and write
C10000
direct allocation
page read and write
C35000
unkown
page execute and read and write
5723000
trusted library allocation
page read and write
A62000
unkown
page execute and write copy
5780000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
56C7000
trusted library allocation
page read and write
571D000
trusted library allocation
page read and write
3F7E000
stack
page read and write
3E3E000
stack
page read and write
5D5C000
trusted library allocation
page read and write
567C000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
569E000
stack
page read and write
5671000
trusted library allocation
page read and write
There are 950 hidden memdumps, click here to show them.