IOC Report
iaLId0uLUw.exe

loading gif

Files

File Path
Type
Category
Malicious
iaLId0uLUw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_iaLId0uLUw.exe_b62f335e9f4d493cdebb7667725677f0a978d7_83bbfbb4_83c7bda6-830c-450f-af46-78bfd79da3ad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F08.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:42:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31D8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31F8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\iaLId0uLUw.exe
"C:\Users\user\Desktop\iaLId0uLUw.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 1888

URLs

Name
IP
Malicious
https://observerfry.lat/dowxo
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0
unknown
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
unknown
https://duckduckgo.com/ac/?q=
unknown
curverpluch.lat
slipperyloo.lat
tentabatte.lat
manyrestro.lat
https://observerfry.lat/pi
unknown
https://bbc-object-storage--frontbucket.us-east-
unknown
https://observerfry.lat/p
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
bashfulacid.lat
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
185.166.143.50
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://aui-cdn.atlassian.com/
unknown
https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX-
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
observerfry.lat
https://bitbucket.org/
unknown
https://observerfry.lat/sC
unknown
wordyfindy.lat
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://observerfry.lat/api
172.67.199.72
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
shapestickyr.lat
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://observerfry.lat/
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://observerfry.lat/pi8os;g
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
talkynicer.lat
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.micro
unknown
https://observerfry.lat/fonpo
unknown
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeU
unknown
https://cdn.cookielaw.org/
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
https://bbuseruploads.s3.amazonaws.com/7dd;
unknown
http://185.215.113.16/off/def.exe
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bbuseruploads.s3.amazonaws.com/
unknown
There are 49 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
3.5.17.0
bitbucket.org
185.166.143.50
observerfry.lat
172.67.199.72
bbuseruploads.s3.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
172.67.199.72
observerfry.lat
United States
3.5.17.0
s3-w.us-east-1.amazonaws.com
United States
185.166.143.50
bitbucket.org
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
ProgramId
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
FileId
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
LowerCaseLongPath
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
LongPathHash
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
Name
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
OriginalFileName
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
Publisher
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
Version
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
BinFileVersion
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
BinaryType
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
ProductName
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
ProductVersion
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
LinkDate
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
BinProductVersion
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
AppxPackageFullName
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
AppxPackageRelativeId
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
Size
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
Language
\REGISTRY\A\{7ffe5104-998f-a012-7def-fdc2d42e1efe}\Root\InventoryApplicationFile\ialid0uluw.exe|cfd5d3842376eb88
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
371000
unkown
page execute and read and write
malicious
5799000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
35AF000
stack
page read and write
5B23000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
590000
unkown
page execute and read and write
5694000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
1067000
heap
page read and write
5694000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
1079000
heap
page read and write
F80000
direct allocation
page read and write
56B0000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
1050000
heap
page read and write
1079000
heap
page read and write
570D000
trusted library allocation
page read and write
5698000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
4731000
heap
page read and write
570D000
trusted library allocation
page read and write
105D000
heap
page read and write
56FB000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
104D000
heap
page read and write
1057000
heap
page read and write
572D000
trusted library allocation
page read and write
502A000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
5033000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
396F000
stack
page read and write
56BA000
trusted library allocation
page read and write
50EE000
stack
page read and write
F80000
direct allocation
page read and write
5705000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5694000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
569F000
trusted library allocation
page read and write
4BB0000
direct allocation
page read and write
572D000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
4731000
heap
page read and write
5781000
trusted library allocation
page read and write
5734000
trusted library allocation
page read and write
4731000
heap
page read and write
5703000
trusted library allocation
page read and write
436F000
stack
page read and write
5720000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
4BF4000
direct allocation
page read and write
5788000
trusted library allocation
page read and write
5986000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
332F000
stack
page read and write
573C000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
50AE000
stack
page read and write
575C000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
5B2000
unkown
page execute and read and write
574D000
trusted library allocation
page read and write
5734000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
1079000
heap
page read and write
5799000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5D70000
trusted library allocation
page readonly
568A000
trusted library allocation
page read and write
4731000
heap
page read and write
5A8000
unkown
page execute and read and write
574D000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
106B000
heap
page read and write
F9A000
heap
page read and write
5C0000
unkown
page execute and read and write
573D000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
5982000
trusted library allocation
page read and write
567F000
stack
page read and write
571C000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
56FE000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
4BB0000
direct allocation
page read and write
1057000
heap
page read and write
FE2000
heap
page read and write
573C000
trusted library allocation
page read and write
578A000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5D7D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
5C2D000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
56AC000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
3E6E000
stack
page read and write
56F1000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
F90000
heap
page read and write
5735000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
56A2000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
501E000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
572C000
trusted library allocation
page read and write
105D000
heap
page read and write
56DC000
trusted library allocation
page read and write
106D000
heap
page read and write
56B6000
trusted library allocation
page read and write
662000
unkown
page execute and write copy
F80000
direct allocation
page read and write
1079000
heap
page read and write
573D000
trusted library allocation
page read and write
1057000
heap
page read and write
5719000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
4731000
heap
page read and write
5715000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
5693000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
5210000
remote allocation
page read and write
5B2E000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
30AF000
stack
page read and write
5B22000
trusted library allocation
page read and write
5E8B000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
5746000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
3BEF000
stack
page read and write
56BA000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
1056000
heap
page read and write
5B6000
unkown
page execute and read and write
573D000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
643000
unkown
page execute and write copy
5755000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5734000
trusted library allocation
page read and write
4D7C000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
5473000
heap
page read and write
571C000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
64D000
unkown
page execute and read and write
654000
unkown
page execute and write copy
4731000
heap
page read and write
5D29000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
1079000
heap
page read and write
548000
unkown
page execute and write copy
472F000
stack
page read and write
5C1B000
trusted library allocation
page read and write
571F000
trusted library allocation
page read and write
57AA000
trusted library allocation
page read and write
4BB0000
direct allocation
page read and write
57C000
unkown
page execute and write copy
56B6000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
EEF000
stack
page read and write
572C000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
4BAD000
stack
page read and write
5F6000
unkown
page execute and write copy
1050000
heap
page read and write
573D000
trusted library allocation
page read and write
422F000
stack
page read and write
574D000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
3D2F000
stack
page read and write
574D000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
56C2000
trusted library allocation
page read and write
5BFE000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
5BD8000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
5693000
trusted library allocation
page read and write
4731000
heap
page read and write
F6E000
stack
page read and write
573C000
trusted library allocation
page read and write
3AEE000
stack
page read and write
557E000
stack
page read and write
5B23000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
5708000
trusted library allocation
page read and write
5C06000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5D7C000
trusted library allocation
page read and write
5B2F000
trusted library allocation
page read and write
3C5000
unkown
page execute and write copy
5799000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
372E000
stack
page read and write
5708000
trusted library allocation
page read and write
5E70000
trusted library allocation
page readonly
570F000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
336E000
stack
page read and write
5C48000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
412E000
stack
page read and write
3FAF000
stack
page read and write
5724000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
2A27000
heap
page read and write
34AE000
stack
page read and write
53CE000
stack
page read and write
4731000
heap
page read and write
36EF000
stack
page read and write
5E1000
unkown
page execute and write copy
5718000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
4730000
heap
page read and write
4731000
heap
page read and write
5A5000
unkown
page execute and write copy
573D000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
63F000
unkown
page execute and write copy
5BDD000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
4731000
heap
page read and write
5788000
trusted library allocation
page read and write
5BD000
unkown
page execute and write copy
59BB000
stack
page read and write
4731000
heap
page read and write
5687000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
52E000
unkown
page execute and write copy
5745000
trusted library allocation
page read and write
5E0000
unkown
page execute and read and write
F70000
heap
page read and write
568E000
trusted library allocation
page read and write
5D1000
unkown
page execute and write copy
4731000
heap
page read and write
573D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
5781000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
5694000
trusted library allocation
page read and write
40EF000
stack
page read and write
573C000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
5B23000
trusted library allocation
page read and write
5754000
trusted library allocation
page read and write
5F8000
unkown
page execute and read and write
571E000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
5B22000
trusted library allocation
page read and write
1056000
heap
page read and write
5734000
trusted library allocation
page read and write
105D000
heap
page read and write
5680000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
5CF000
unkown
page execute and read and write
573C000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
573D000
trusted library allocation
page read and write
585000
unkown
page execute and write copy
572C000
trusted library allocation
page read and write
462E000
stack
page read and write
574D000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
3D0000
unkown
page execute and read and write
56AF000
trusted library allocation
page read and write
5D6D000
stack
page read and write
5CB000
unkown
page execute and write copy
56F1000
trusted library allocation
page read and write
91B000
stack
page read and write
35EE000
stack
page read and write
570B000
trusted library allocation
page read and write
CFA000
stack
page read and write
5986000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
56FB000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
31EF000
stack
page read and write
572D000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5988000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
2E2F000
stack
page read and write
57B9000
trusted library allocation
page read and write
5B26000
trusted library allocation
page read and write
53E000
unkown
page execute and read and write
4BEC000
stack
page read and write
5735000
trusted library allocation
page read and write
1063000
heap
page read and write
4731000
heap
page read and write
574D000
trusted library allocation
page read and write
5BCC000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
663000
unkown
page execute and write copy
5760000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
2B2F000
stack
page read and write
4731000
heap
page read and write
587F000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
5D71000
trusted library allocation
page execute read
571C000
trusted library allocation
page read and write
64C000
unkown
page execute and write copy
118F000
stack
page read and write
571D000
trusted library allocation
page read and write
1056000
heap
page read and write
56B6000
trusted library allocation
page read and write
4E6E000
stack
page read and write
573D000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
5C68000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
346F000
stack
page read and write
5CDD000
trusted library allocation
page read and write
4731000
heap
page read and write
571C000
trusted library allocation
page read and write
1078000
heap
page read and write
1079000
heap
page read and write
5210000
remote allocation
page read and write
3C2E000
stack
page read and write
5753000
trusted library allocation
page read and write
574C000
trusted library allocation
page read and write
57E000
unkown
page execute and read and write
56A4000
trusted library allocation
page read and write
654000
unkown
page execute and write copy
1079000
heap
page read and write
426E000
stack
page read and write
F80000
direct allocation
page read and write
5BC6000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
1079000
heap
page read and write
571C000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
105B000
heap
page read and write
5715000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
549000
unkown
page execute and read and write
FC7000
heap
page read and write
4D20000
direct allocation
page execute and read and write
57AF000
trusted library allocation
page read and write
104F000
heap
page read and write
5B22000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
5470000
heap
page read and write
5B21000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
5764000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
2A2D000
heap
page read and write
5B2C000
trusted library allocation
page read and write
370000
unkown
page readonly
5715000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
625000
unkown
page execute and read and write
574D000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
2F6F000
stack
page read and write
56BC000
trusted library allocation
page read and write
5CCD000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
4741000
heap
page read and write
570F000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
106B000
heap
page read and write
4F26000
trusted library allocation
page read and write
4D3E000
stack
page read and write
1056000
heap
page read and write
4D00000
direct allocation
page execute and read and write
5B23000
trusted library allocation
page read and write
4731000
heap
page read and write
4D30000
direct allocation
page execute and read and write
3CF000
unkown
page execute and write copy
2C2F000
stack
page read and write
2A20000
heap
page read and write
5788000
trusted library allocation
page read and write
F9E000
heap
page read and write
1065000
heap
page read and write
573D000
trusted library allocation
page read and write
5D7000
unkown
page execute and read and write
5C19000
trusted library allocation
page read and write
DE5000
heap
page read and write
3EAE000
stack
page read and write
29EE000
stack
page read and write
574D000
trusted library allocation
page read and write
371000
unkown
page execute and write copy
542E000
stack
page read and write
571E000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
1066000
heap
page read and write
572C000
trusted library allocation
page read and write
1063000
heap
page read and write
574D000
trusted library allocation
page read and write
104D000
heap
page read and write
5B2A000
trusted library allocation
page read and write
1065000
heap
page read and write
56AF000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
4731000
heap
page read and write
5735000
trusted library allocation
page read and write
5D79000
trusted library allocation
page readonly
5687000
trusted library allocation
page read and write
1067000
heap
page read and write
5705000
trusted library allocation
page read and write
5B3000
unkown
page execute and write copy
5C16000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
51EF000
stack
page read and write
105E000
heap
page read and write
106C000
heap
page read and write
1079000
heap
page read and write
2E6E000
stack
page read and write
56BE000
trusted library allocation
page read and write
43AE000
stack
page read and write
4731000
heap
page read and write
5B2E000
trusted library allocation
page read and write
1066000
heap
page read and write
573D000
trusted library allocation
page read and write
3FEE000
stack
page read and write
386E000
stack
page read and write
56C6000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
1078000
heap
page read and write
5715000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
4CEF000
stack
page read and write
5694000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5DF000
unkown
page execute and write copy
105B000
heap
page read and write
56A9000
trusted library allocation
page read and write
105D000
heap
page read and write
4731000
heap
page read and write
568C000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
29AE000
stack
page read and write
568E000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
5C68000
trusted library allocation
page read and write
FD8000
heap
page read and write
527E000
stack
page read and write
573D000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5B2F000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
3C5000
unkown
page execute and read and write
5BE0000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5712000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
3AAF000
stack
page read and write
5720000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
5E9000
unkown
page execute and read and write
5788000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
3B5000
unkown
page execute and read and write
574D000
trusted library allocation
page read and write
5210000
remote allocation
page read and write
572D000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
573D000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
2D2F000
stack
page read and write
5719000
trusted library allocation
page read and write
296B000
stack
page read and write
570E000
trusted library allocation
page read and write
5BE3000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
4731000
heap
page read and write
5788000
trusted library allocation
page read and write
382F000
stack
page read and write
5681000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
568E000
trusted library allocation
page read and write
3D1000
unkown
page execute and write copy
572C000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
980000
heap
page read and write
56AF000
trusted library allocation
page read and write
1066000
heap
page read and write
537F000
stack
page read and write
64C000
unkown
page execute and write copy
574B000
trusted library allocation
page read and write
5A12000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
4731000
heap
page read and write
598A000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
322E000
stack
page read and write
5709000
trusted library allocation
page read and write
105B000
heap
page read and write
574D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
52B000
unkown
page execute and read and write
5780000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
59B9000
trusted library allocation
page read and write
568D000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
44EE000
stack
page read and write
572C000
trusted library allocation
page read and write
5B29000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
662000
unkown
page execute and read and write
56C9000
trusted library allocation
page read and write
5BED000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
45EF000
stack
page read and write
56A7000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
29F0000
heap
page read and write
56A8000
trusted library allocation
page read and write
F80000
direct allocation
page read and write
5B27000
trusted library allocation
page read and write
FF8000
heap
page read and write
5707000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
5C55000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
6040000
heap
page read and write
105B000
heap
page read and write
573D000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
44AF000
stack
page read and write
39AE000
stack
page read and write
4FAE000
stack
page read and write
5687000
trusted library allocation
page read and write
5B0000
unkown
page execute and write copy
5720000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
1079000
heap
page read and write
570F000
trusted library allocation
page read and write
F2E000
stack
page read and write
5C6F000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
574D000
trusted library allocation
page read and write
4731000
heap
page read and write
5734000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
2FAE000
stack
page read and write
370000
unkown
page read and write
3D6E000
stack
page read and write
5C26000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
970000
heap
page read and write
5688000
trusted library allocation
page read and write
5983000
trusted library allocation
page read and write
64E000
unkown
page execute and write copy
9EE000
stack
page read and write
5734000
trusted library allocation
page read and write
DE0000
heap
page read and write
6395000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
30EE000
stack
page read and write
F80000
direct allocation
page read and write
4F6D000
stack
page read and write
56A4000
trusted library allocation
page read and write
573A000
trusted library allocation
page read and write
There are 729 hidden memdumps, click here to show them.