IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe
"C:\Users\user\AppData\Local\Temp\94JSCZGRDUWCLDEBY2HC1S58YAX1.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://crisiwarny.store/apiAE
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://crisiwarny.store/api/
unknown
http://185.215.113.16/U
unknown
https://crisiwarny.store/e
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://185.215.113.16/off/def.exeR
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://185.215.113.16/
unknown
https://crisiwarny.store/au
unknown
https://crisiwarny.store/Hy
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://185.215.113.16/off/def.exe0
unknown
https://crisiwarny.store/o
unknown
http://185.215.113.16/off/def.exe2
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://185.215.113.16/off/def.exe
unknown
https://crisiwarny.store/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://185.215.113.16/j
unknown
https://crisiwarny.s
unknown
https://crisiwarny.store/apit
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
871000
unkown
page execute and read and write
malicious
5BAE000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
E00000
heap
page read and write
56A6000
trusted library allocation
page read and write
2F0E000
stack
page read and write
3A4E000
stack
page read and write
560C000
trusted library allocation
page read and write
722F000
stack
page read and write
DAE000
heap
page read and write
364F000
stack
page read and write
378F000
stack
page read and write
560C000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
4691000
heap
page read and write
4C70000
direct allocation
page execute and read and write
E27000
heap
page read and write
701000
unkown
page execute and read and write
5665000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
7FB000
unkown
page execute and write copy
5BB9000
trusted library allocation
page read and write
C7A000
stack
page read and write
55EC000
trusted library allocation
page read and write
5B3A000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
E29000
heap
page read and write
55E1000
trusted library allocation
page read and write
E2C000
heap
page read and write
A44000
unkown
page execute and read and write
E22000
heap
page read and write
4C50000
direct allocation
page execute and read and write
DF2000
heap
page read and write
5A70000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
E0C000
heap
page read and write
568C000
trusted library allocation
page read and write
4B70000
direct allocation
page read and write
5912000
trusted library allocation
page read and write
E15000
heap
page read and write
5609000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
4A10000
direct allocation
page read and write
408E000
stack
page read and write
318E000
stack
page read and write
5B9C000
trusted library allocation
page read and write
E16000
heap
page read and write
55D1000
trusted library allocation
page read and write
DA0000
heap
page read and write
B4F000
unkown
page execute and write copy
E20000
heap
page read and write
55EC000
trusted library allocation
page read and write
E23000
heap
page read and write
705000
unkown
page execute and read and write
5BC9000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
2C8E000
stack
page read and write
556000
unkown
page write copy
5C9D000
trusted library allocation
page read and write
E2E000
heap
page read and write
560C000
trusted library allocation
page read and write
4A21000
heap
page read and write
5A7A000
trusted library allocation
page read and write
A65000
unkown
page execute and write copy
5C09000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
56F3000
trusted library allocation
page read and write
7AF000
unkown
page execute and write copy
58DD000
trusted library allocation
page read and write
3B4F000
stack
page read and write
D63000
heap
page read and write
E01000
heap
page read and write
56D0000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
D75000
heap
page read and write
5621000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
3CCE000
stack
page read and write
56C2000
trusted library allocation
page read and write
46A2000
heap
page read and write
4AF0000
remote allocation
page read and write
5CF8000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
4691000
heap
page read and write
5B4E000
trusted library allocation
page read and write
2A87000
heap
page read and write
C64000
heap
page read and write
803000
unkown
page execute and write copy
4BAB000
stack
page read and write
350F000
stack
page read and write
55D4000
trusted library allocation
page read and write
5B1D000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
5B82000
trusted library allocation
page read and write
A6B000
unkown
page execute and read and write
5A78000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
5B1D000
trusted library allocation
page read and write
2C8F000
stack
page read and write
55D1000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5C4000
heap
page read and write
390E000
stack
page read and write
5BAE000
trusted library allocation
page read and write
2A80000
heap
page read and write
56B2000
trusted library allocation
page read and write
AE0000
unkown
page execute and read and write
E23000
heap
page read and write
E1E000
heap
page read and write
E03000
heap
page read and write
569D000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
B72000
unkown
page execute and read and write
55D3000
trusted library allocation
page read and write
5C4000
heap
page read and write
55D8000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
4CFE000
stack
page read and write
5665000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
4D20000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
566F000
trusted library allocation
page read and write
2D8F000
stack
page read and write
55F4000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
378F000
stack
page read and write
5613000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
37CE000
stack
page read and write
55F4000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
7B5000
unkown
page execute and read and write
5C4000
heap
page read and write
C64000
heap
page read and write
2DCE000
stack
page read and write
5B47000
trusted library allocation
page read and write
3DCF000
stack
page read and write
55DF000
trusted library allocation
page read and write
5C4000
heap
page read and write
E23000
heap
page read and write
5B17000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
E23000
heap
page read and write
5675000
trusted library allocation
page read and write
55F9000
trusted library allocation
page read and write
6F4000
unkown
page execute and write copy
5689000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
726E000
stack
page read and write
5A78000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
E0C000
heap
page read and write
55EF000
trusted library allocation
page read and write
E16000
heap
page read and write
569E000
trusted library allocation
page read and write
71C000
unkown
page execute and write copy
5A72000
trusted library allocation
page read and write
AE7000
unkown
page execute and write copy
5B3C000
trusted library allocation
page read and write
5609000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
E20000
heap
page read and write
796000
unkown
page execute and read and write
D10000
direct allocation
page read and write
5A80000
trusted library allocation
page read and write
567E000
trusted library allocation
page read and write
52FD000
stack
page read and write
4F9B000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5665000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
3A0F000
stack
page read and write
E20000
heap
page read and write
5666000
trusted library allocation
page read and write
566D000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
C64000
heap
page read and write
D70000
heap
page read and write
2887000
heap
page read and write
454F000
stack
page read and write
560C000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
5CC1000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
354E000
stack
page read and write
5A72000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
E23000
heap
page read and write
CBE000
stack
page read and write
4A30000
heap
page read and write
C60000
heap
page read and write
4A21000
heap
page read and write
E26000
heap
page read and write
55FB000
trusted library allocation
page read and write
D00000
heap
page read and write
318E000
stack
page read and write
3E0E000
stack
page read and write
5B64000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
E2C000
heap
page read and write
AEA000
unkown
page execute and read and write
5D23000
trusted library allocation
page read and write
5A4A000
trusted library allocation
page read and write
2D8F000
stack
page read and write
55F2000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
5695000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
6DE000
unkown
page execute and read and write
74FE000
stack
page read and write
5B98000
trusted library allocation
page read and write
5B67000
trusted library allocation
page read and write
4A21000
heap
page read and write
566000
unkown
page execute and write copy
5A81000
trusted library allocation
page read and write
3CCE000
stack
page read and write
5A70000
trusted library allocation
page read and write
4691000
heap
page read and write
58D0000
trusted library allocation
page read and write
2A5E000
stack
page read and write
4CB0000
heap
page read and write
5B3C000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5B1F000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
300F000
stack
page read and write
5603000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
560C000
trusted library allocation
page read and write
E0E000
heap
page read and write
5D1F000
trusted library allocation
page read and write
D70000
heap
page read and write
DDF000
heap
page read and write
78B000
unkown
page execute and read and write
55FB000
trusted library allocation
page read and write
C20000
heap
page read and write
4A21000
heap
page read and write
560C000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
28CE000
stack
page read and write
4CD3000
trusted library allocation
page execute and read and write
4B20000
heap
page read and write
6F5000
unkown
page execute and read and write
5C4000
heap
page read and write
B02000
unkown
page execute and read and write
5B67000
trusted library allocation
page read and write
E2E000
heap
page read and write
B5C000
unkown
page execute and write copy
58D0000
trusted library allocation
page read and write
743000
unkown
page execute and read and write
5C4000
heap
page read and write
5D05000
trusted library allocation
page read and write
5629000
trusted library allocation
page read and write
2A0C000
stack
page read and write
5B30000
trusted library allocation
page read and write
56F3000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
73E000
unkown
page execute and write copy
3F0F000
stack
page read and write
B5D000
unkown
page execute and read and write
4C70000
direct allocation
page execute and read and write
E2E000
heap
page read and write
3C8F000
stack
page read and write
560C000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5C7E000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
3F4E000
stack
page read and write
5BC9000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
29CF000
stack
page read and write
E0B000
heap
page read and write
A98000
unkown
page execute and read and write
2C4F000
stack
page read and write
E00000
heap
page read and write
870000
unkown
page readonly
5619000
trusted library allocation
page read and write
5BED000
trusted library allocation
page read and write
4CAE000
stack
page read and write
E0E000
heap
page read and write
8CB000
unkown
page execute and write copy
4E7B000
trusted library allocation
page read and write
870000
unkown
page read and write
5CEC000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
4AF0000
remote allocation
page read and write
4E20000
heap
page execute and read and write
354E000
stack
page read and write
E29000
heap
page read and write
E15000
heap
page read and write
5621000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
E29000
heap
page read and write
D10000
direct allocation
page read and write
DFE000
heap
page read and write
72F0000
heap
page execute and read and write
56C4000
trusted library allocation
page read and write
2B0F000
stack
page read and write
E27000
heap
page read and write
4A10000
direct allocation
page read and write
5BCB000
trusted library allocation
page read and write
5666000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
E23000
heap
page read and write
4A10000
direct allocation
page read and write
E23000
heap
page read and write
2880000
heap
page read and write
5CBF000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
700000
unkown
page execute and write copy
E2E000
heap
page read and write
5609000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
2A60000
direct allocation
page read and write
E22000
heap
page read and write
4A10000
direct allocation
page read and write
E2C000
heap
page read and write
4C70000
direct allocation
page execute and read and write
567E000
trusted library allocation
page read and write
4AF0000
remote allocation
page read and write
5BC0000
trusted library allocation
page read and write
5C4000
heap
page read and write
55FB000
trusted library allocation
page read and write
51BE000
stack
page read and write
D10000
direct allocation
page read and write
55DB000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
5689000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
569F000
trusted library allocation
page read and write
E20000
heap
page read and write
E00000
heap
page read and write
5B7F000
trusted library allocation
page read and write
DC4000
heap
page read and write
5C4000
heap
page read and write
C64000
heap
page read and write
5D03000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
2DCE000
stack
page read and write
E2E000
heap
page read and write
D75000
heap
page read and write
5A7D000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5B72000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
E2E000
heap
page read and write
2B4E000
stack
page read and write
3B8E000
stack
page read and write
5673000
trusted library allocation
page read and write
B5E000
unkown
page execute and write copy
4A21000
heap
page read and write
E00000
heap
page read and write
E2C000
heap
page read and write
E20000
heap
page read and write
4CD4000
trusted library allocation
page read and write
E16000
heap
page read and write
803000
unkown
page execute and write copy
56B2000
trusted library allocation
page read and write
4A40000
heap
page read and write
5B92000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
2B8F000
stack
page read and write
3A0F000
stack
page read and write
793000
unkown
page execute and write copy
5A74000
trusted library allocation
page read and write
A8C000
unkown
page execute and read and write
E23000
heap
page read and write
42CF000
stack
page read and write
55D2000
trusted library allocation
page read and write
D7E000
heap
page read and write
55EB000
trusted library allocation
page read and write
E2E000
heap
page read and write
5A77000
trusted library allocation
page read and write
E09000
heap
page read and write
FFF000
stack
page read and write
314F000
stack
page read and write
4A10000
direct allocation
page read and write
55FB000
trusted library allocation
page read and write
37CE000
stack
page read and write
5BC7000
trusted library allocation
page read and write
E1E000
heap
page read and write
E23000
heap
page read and write
5A7F000
trusted library allocation
page read and write
D68000
heap
page read and write
5A80000
trusted library allocation
page read and write
812000
unkown
page execute and write copy
5B25000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5C4000
heap
page read and write
56D7000
trusted library allocation
page read and write
567D000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
E00000
heap
page read and write
ABF000
unkown
page execute and read and write
5670000
trusted library allocation
page read and write
C64000
heap
page read and write
5A7F000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
350F000
stack
page read and write
55F1000
trusted library allocation
page read and write
5B64000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
5665000
trusted library allocation
page read and write
6C6000
unkown
page execute and read and write
4A10000
direct allocation
page read and write
55ED000
trusted library allocation
page read and write
5C6E000
trusted library allocation
page read and write
D90000
heap
page read and write
5B29000
trusted library allocation
page read and write
E20000
heap
page read and write
B47000
unkown
page execute and write copy
55FB000
trusted library allocation
page read and write
4B4B000
stack
page read and write
55D0000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
5A72000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
5C4000
heap
page read and write
566C000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
404F000
stack
page read and write
DF1000
heap
page read and write
5A7B000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
58DB000
trusted library allocation
page read and write
552000
unkown
page execute and read and write
5A7B000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
7AD000
unkown
page execute and write copy
4A21000
heap
page read and write
5621000
trusted library allocation
page read and write
DF5000
heap
page read and write
5B1F000
trusted library allocation
page read and write
4A21000
heap
page read and write
4691000
heap
page read and write
5621000
trusted library allocation
page read and write
364F000
stack
page read and write
4AD0000
trusted library allocation
page read and write
C64000
heap
page read and write
56A9000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
55A000
unkown
page execute and read and write
5B5D000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
55EB000
trusted library allocation
page read and write
9A9000
stack
page read and write
B72000
unkown
page execute and write copy
5932000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
774000
unkown
page execute and read and write
B64000
unkown
page execute and write copy
4DFD000
stack
page read and write
5678000
trusted library allocation
page read and write
55EB000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
5627000
trusted library allocation
page read and write
2A70000
direct allocation
page execute and read and write
5B49000
trusted library allocation
page read and write
E22000
heap
page read and write
55F9000
trusted library allocation
page read and write
5C4000
heap
page read and write
C64000
heap
page read and write
E22000
heap
page read and write
79E000
unkown
page execute and write copy
5A7C000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
814000
unkown
page execute and write copy
5D30000
trusted library allocation
page read and write
E29000
heap
page read and write
ABA000
unkown
page execute and write copy
5A7A000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
E23000
heap
page read and write
5709000
trusted library allocation
page read and write
38CF000
stack
page read and write
AD0000
unkown
page execute and read and write
552000
unkown
page execute and write copy
5690000
trusted library allocation
page read and write
5C4000
heap
page read and write
55F4000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
A5C000
unkown
page execute and read and write
5A7C000
trusted library allocation
page read and write
871000
unkown
page execute and write copy
5620000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
368E000
stack
page read and write
5A74000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
5C4000
heap
page read and write
D90000
heap
page read and write
6031000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
41CE000
stack
page read and write
430E000
stack
page read and write
55DF000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
468F000
stack
page read and write
38CF000
stack
page read and write
E28000
heap
page read and write
5603000
trusted library allocation
page read and write
4CDD000
trusted library allocation
page execute and read and write
5BFF000
trusted library allocation
page read and write
E02000
heap
page read and write
4A10000
direct allocation
page read and write
5699000
trusted library allocation
page read and write
D3A000
heap
page read and write
4A21000
heap
page read and write
5A70000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
F9F000
stack
page read and write
5C4000
heap
page read and write
5BC2000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page execute and read and write
55FB000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
566D000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
AB2000
unkown
page execute and read and write
314F000
stack
page read and write
5A75000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
4E10000
trusted library allocation
page execute and read and write
5A79000
trusted library allocation
page read and write
E20000
heap
page read and write
DFB000
heap
page read and write
C64000
heap
page read and write
E0C000
heap
page read and write
55F2000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
B73000
unkown
page execute and write copy
287F000
stack
page read and write
5A77000
trusted library allocation
page read and write
5B23000
trusted library allocation
page read and write
5A81000
trusted library allocation
page read and write
DF4000
heap
page read and write
55DB000
trusted library allocation
page read and write
5629000
trusted library allocation
page read and write
5B3E000
trusted library allocation
page read and write
4A10000
direct allocation
page read and write
E23000
heap
page read and write
5C4000
heap
page read and write
444E000
stack
page read and write
5C86000
trusted library allocation
page read and write
B01000
unkown
page execute and write copy
55D6000
trusted library allocation
page read and write
4EBE000
stack
page read and write
5A72000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
4690000
heap
page read and write
56E9000
trusted library allocation
page read and write
703000
unkown
page execute and write copy
56C4000
trusted library allocation
page read and write
785000
unkown
page execute and write copy
5B4C000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
454F000
stack
page read and write
5C4000
heap
page read and write
5B94000
trusted library allocation
page read and write
340E000
stack
page read and write
2A60000
direct allocation
page read and write
772000
unkown
page execute and write copy
55EC000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
5C4000
heap
page read and write
5A7D000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
C64000
heap
page read and write
5A81000
trusted library allocation
page read and write
767000
unkown
page execute and read and write
AAD000
unkown
page execute and write copy
4A20000
heap
page read and write
5621000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
5629000
trusted library allocation
page read and write
C64000
heap
page read and write
5B9A000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
5C4000
heap
page read and write
5C2C000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
3F0F000
stack
page read and write
55EB000
trusted library allocation
page read and write
73F000
unkown
page execute and read and write
5BAC000
trusted library allocation
page read and write
550000
unkown
page readonly
5B5F000
trusted library allocation
page read and write
E05000
heap
page read and write
458E000
stack
page read and write
56D0000
trusted library allocation
page read and write
72D000
unkown
page execute and write copy
5BEF000
trusted library allocation
page read and write
D7E000
stack
page read and write
2ECF000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
5A74000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
4A21000
heap
page read and write
5BAC000
trusted library allocation
page read and write
4C60000
direct allocation
page execute and read and write
5B81000
trusted library allocation
page read and write
8D6000
unkown
page execute and read and write
304E000
stack
page read and write
368E000
stack
page read and write
5621000
trusted library allocation
page read and write
812000
unkown
page execute and read and write
B46000
unkown
page execute and read and write
55A000
unkown
page execute and write copy
C64000
heap
page read and write
5665000
trusted library allocation
page read and write
390E000
stack
page read and write
5A74000
trusted library allocation
page read and write
B5C000
unkown
page execute and write copy
C64000
heap
page read and write
712D000
stack
page read and write
5602000
trusted library allocation
page read and write
E23000
heap
page read and write
55E1000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
3B4F000
stack
page read and write
56EF000
trusted library allocation
page read and write
DFE000
heap
page read and write
56A7000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
E22000
heap
page read and write
E1E000
heap
page read and write
E1E000
heap
page read and write
AC8000
unkown
page execute and read and write
56A4000
trusted library allocation
page read and write
8AC000
stack
page read and write
4691000
heap
page read and write
566D000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
84E000
stack
page read and write
5BB9000
trusted library allocation
page read and write
DA0000
heap
page read and write
5B8E000
trusted library allocation
page read and write
5C4000
heap
page read and write
A34000
unkown
page execute and read and write
3A4E000
stack
page read and write
4A10000
direct allocation
page read and write
E23000
heap
page read and write
4A10000
direct allocation
page read and write
5A76000
trusted library allocation
page read and write
E29000
heap
page read and write
550000
unkown
page read and write
771000
unkown
page execute and read and write
5C4000
heap
page read and write
56B2000
trusted library allocation
page read and write
55FC000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
4F7E000
stack
page read and write
55DF000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
5678000
trusted library allocation
page read and write
299F000
stack
page read and write
5621000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
DEE000
heap
page read and write
58D2000
trusted library allocation
page read and write
D7E000
heap
page read and write
DA0000
heap
page read and write
55F9000
trusted library allocation
page read and write
A36000
unkown
page execute and write copy
E12000
heap
page read and write
D10000
direct allocation
page read and write
E2D000
heap
page read and write
E2D000
heap
page read and write
E12000
heap
page read and write
5B5B000
trusted library allocation
page read and write
E23000
heap
page read and write
5A7E000
trusted library allocation
page read and write
E28000
heap
page read and write
4CE4000
trusted library allocation
page read and write
5D0000
heap
page read and write
5C01000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
E05000
heap
page read and write
5C80000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
55CF000
stack
page read and write
55E1000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
3B8E000
stack
page read and write
4A21000
heap
page read and write
56BD000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
4B70000
direct allocation
page read and write
B64000
unkown
page execute and write copy
8D7000
unkown
page execute and write copy
56D3000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
C64000
heap
page read and write
764000
unkown
page execute and write copy
768000
unkown
page execute and write copy
E0F000
heap
page read and write
740000
unkown
page execute and write copy
4C80000
direct allocation
page execute and read and write
8CB000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
5A7A000
trusted library allocation
page read and write
4B70000
direct allocation
page read and write
E15000
heap
page read and write
340E000
stack
page read and write
55EB000
trusted library allocation
page read and write
E02000
heap
page read and write
5BBE000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
5480000
heap
page read and write
5683000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
4A21000
heap
page read and write
5A72000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
C64000
heap
page read and write
58FA000
trusted library allocation
page read and write
4691000
heap
page read and write
D10000
direct allocation
page read and write
73FE000
stack
page read and write
5031000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
E05000
heap
page read and write
7B3000
unkown
page execute and write copy
33CF000
stack
page read and write
56BD000
trusted library allocation
page read and write
2A1E000
stack
page read and write
5A78000
trusted library allocation
page read and write
566D000
trusted library allocation
page read and write
4CFA000
trusted library allocation
page execute and read and write
5665000
trusted library allocation
page read and write
418F000
stack
page read and write
5B4A000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
5C4000
heap
page read and write
502E000
stack
page read and write
56C4000
trusted library allocation
page read and write
2ECF000
stack
page read and write
E2C000
heap
page read and write
3E0E000
stack
page read and write
E07000
heap
page read and write
DEE000
heap
page read and write
4E3D000
stack
page read and write
C64000
heap
page read and write
5621000
trusted library allocation
page read and write
4B10000
direct allocation
page read and write
8D5000
unkown
page execute and write copy
55EB000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
E2E000
heap
page read and write
56C4000
trusted library allocation
page read and write
D30000
heap
page read and write
5E0000
heap
page read and write
32CE000
stack
page read and write
5A7A000
trusted library allocation
page read and write
5C0000
heap
page read and write
E0E000
heap
page read and write
5620000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
62E3000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
328F000
stack
page read and write
E23000
heap
page read and write
5A78000
trusted library allocation
page read and write
56C2000
trusted library allocation
page read and write
4D6E000
stack
page read and write
5A7F000
trusted library allocation
page read and write
DFD000
heap
page read and write
560A000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
56FA000
trusted library allocation
page read and write
408E000
stack
page read and write
5627000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
DE7000
heap
page read and write
4D07000
trusted library allocation
page execute and read and write
55EC000
trusted library allocation
page read and write
49F0000
direct allocation
page read and write
E1C000
heap
page read and write
5665000
trusted library allocation
page read and write
814000
unkown
page execute and write copy
D10000
direct allocation
page read and write
5A7A000
trusted library allocation
page read and write
DAA000
heap
page read and write
E29000
heap
page read and write
5707000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
54CE000
stack
page read and write
32CE000
stack
page read and write
2F0E000
stack
page read and write
56C4000
trusted library allocation
page read and write
444E000
stack
page read and write
E29000
heap
page read and write
5A79000
trusted library allocation
page read and write
304E000
stack
page read and write
5621000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
468F000
stack
page read and write
5621000
trusted library allocation
page read and write
42CF000
stack
page read and write
55EF000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
C64000
heap
page read and write
50BE000
stack
page read and write
404F000
stack
page read and write
5A71000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5982000
trusted library allocation
page read and write
3C8F000
stack
page read and write
59BA000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
29DC000
stack
page read and write
4A10000
direct allocation
page read and write
567E000
trusted library allocation
page read and write
4691000
heap
page read and write
4C4F000
stack
page read and write
6C9000
unkown
page execute and write copy
B49000
unkown
page execute and read and write
4F3D000
stack
page read and write
5623000
trusted library allocation
page read and write
C64000
heap
page read and write
5B1F000
trusted library allocation
page read and write
DFD000
heap
page read and write
300F000
stack
page read and write
5B6D000
trusted library allocation
page read and write
440F000
stack
page read and write
5B1D000
trusted library allocation
page read and write
E22000
heap
page read and write
E0C000
heap
page read and write
B2C000
unkown
page execute and read and write
430E000
stack
page read and write
75C000
unkown
page execute and read and write
ACF000
unkown
page execute and write copy
55D1000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
5C4000
heap
page read and write
D90000
heap
page read and write
5621000
trusted library allocation
page read and write
33CF000
stack
page read and write
B42000
unkown
page execute and write copy
55DB000
trusted library allocation
page read and write
3DCE000
stack
page read and write
5A7D000
trusted library allocation
page read and write
458E000
stack
page read and write
55F2000
trusted library allocation
page read and write
55FB000
trusted library allocation
page read and write
4F20000
heap
page read and write
AC7000
unkown
page execute and write copy
DEE000
heap
page read and write
D10000
direct allocation
page read and write
4B60000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
A51000
unkown
page execute and write copy
440F000
stack
page read and write
55EF000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
533E000
stack
page read and write
5709000
trusted library allocation
page read and write
7B2000
unkown
page execute and read and write
2A8D000
heap
page read and write
4AD0000
heap
page read and write
5BA5000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
7A0000
unkown
page execute and read and write
732000
unkown
page execute and read and write
4C70000
direct allocation
page execute and read and write
569E000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
75A000
unkown
page execute and write copy
55EC000
trusted library allocation
page read and write
A51000
unkown
page execute and read and write
51FD000
stack
page read and write
5627000
trusted library allocation
page read and write
C64000
heap
page read and write
418F000
stack
page read and write
E0E000
heap
page read and write
543F000
stack
page read and write
D68000
heap
page read and write
7AE000
unkown
page execute and read and write
C10000
heap
page read and write
E23000
heap
page read and write
4EFE000
stack
page read and write
56C4000
trusted library allocation
page read and write
277E000
stack
page read and write
5B88000
trusted library allocation
page read and write
569E000
trusted library allocation
page read and write
5B5D000
trusted library allocation
page read and write
E23000
heap
page read and write
5CEE000
trusted library allocation
page read and write
E1E000
heap
page read and write
E2C000
heap
page read and write
5CFA000
trusted library allocation
page read and write
D3E000
heap
page read and write
55F2000
trusted library allocation
page read and write
E27000
heap
page read and write
6EB000
unkown
page execute and read and write
328F000
stack
page read and write
56A9000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
E06000
heap
page read and write
567E000
trusted library allocation
page read and write
DEF000
heap
page read and write
3F4E000
stack
page read and write
56B000
stack
page read and write
6EA000
unkown
page execute and write copy
4691000
heap
page read and write
5A73000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
A59000
unkown
page execute and write copy
4C70000
direct allocation
page execute and read and write
5A7E000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
507F000
stack
page read and write
E2E000
heap
page read and write
AD9000
unkown
page execute and write copy
72C000
unkown
page execute and read and write
10FF000
stack
page read and write
556000
unkown
page write copy
E23000
heap
page read and write
5A7A000
trusted library allocation
page read and write
E22000
heap
page read and write
CFE000
stack
page read and write
4CCC000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
E29000
heap
page read and write
56D8000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
55F9000
trusted library allocation
page read and write
A8A000
unkown
page execute and write copy
A8D000
unkown
page execute and write copy
5651000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
41CE000
stack
page read and write
4A21000
heap
page read and write
5771000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
6055000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
E27000
heap
page read and write
4E6C000
stack
page read and write
There are 1014 hidden memdumps, click here to show them.