IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\computerlead.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fontdrvhost.exe_d32c824e8915b30da4efd4eabd13e74e4ef8c1_ad0be647_0617501e-f2e0-4753-97d1-6002f83486ad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER837D.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 20:35:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83BC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83EC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\computerlead.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\computerlead.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\computerlead.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
C:\Windows\SysWOW64\fontdrvhost.exe
"C:\Windows\System32\fontdrvhost.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 420
C:\Windows\System32\fontdrvhost.exe
"C:\Windows\System32\fontdrvhost.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 8124 -s 136
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://104.37.175.218:7982/da03ab84e7f8187e6/o304l70l.g00ox
malicious
https://cloudflare-dns.com/dns-query
unknown
http://upx.sf.net
unknown
https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
unknown
https://104.37.175.218:7982/da03ab84e7f8187e6/o304l70l.g00oxkernelbasentdllkernel32GetProcessMitigat
unknown
https://104.37.175.218:7982/da03ab84e7f8187e6/o304l70l.g00oxx
unknown

IPs

IP
Domain
Country
Malicious
104.37.175.218
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProgramId
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
FileId
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LowerCaseLongPath
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LongPathHash
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Name
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
OriginalFileName
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Publisher
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Version
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinFileVersion
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinaryType
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProductName
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProductVersion
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LinkDate
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinProductVersion
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
AppxPackageFullName
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
AppxPackageRelativeId
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Size
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Language
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
IsOsComponent
\REGISTRY\A\{cac35bc6-0bf2-a942-ea7d-00539a18787d}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
44F8000
trusted library allocation
page read and write
malicious
1610000
direct allocation
page execute and read and write
malicious
56B0000
trusted library section
page read and write
malicious
760000
direct allocation
page read and write
malicious
A30000
direct allocation
page execute and read and write
malicious
32E1000
trusted library allocation
page read and write
malicious
4AE1000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
7890000
heap
page read and write
C9C000
unkown
page execute read
4D35000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
13E0000
heap
page read and write
4AE1000
heap
page read and write
26ECBDF000
stack
page read and write
3CF0000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
4DB7000
heap
page read and write
56A0000
heap
page read and write
1730000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
4AE1000
heap
page read and write
1EFC54AB000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
3CC0000
trusted library allocation
page read and write
315E000
stack
page read and write
17DB000
stack
page read and write
37A1000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
790E000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1EFC727B000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
5DF0000
trusted library allocation
page execute and read and write
3788000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
7C4000
heap
page read and write
37C0000
trusted library allocation
page read and write
14F0000
heap
page read and write
4AE1000
heap
page read and write
4C00000
unkown
page read and write
C20000
unkown
page readonly
C85000
unkown
page execute read
372B000
trusted library allocation
page read and write
7C4000
heap
page read and write
3100000
trusted library allocation
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
3CF2000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
49E0000
heap
page read and write
1EFC711D000
heap
page read and write
4AE1000
heap
page read and write
3C29000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4DBB000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4E1E000
unkown
page read and write
4DB7000
heap
page read and write
1BE06AFE000
heap
page read and write
4D35000
heap
page read and write
CF2000
unkown
page execute read
59F0000
heap
page read and write
7C4000
heap
page read and write
7C4000
heap
page read and write
15A2000
heap
page read and write
1F38D0B8000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4E36000
unkown
page read and write
1BE06839000
heap
page read and write
4AE1000
heap
page read and write
FD8000
stack
page read and write
4AE1000
heap
page read and write
1390000
heap
page read and write
4AE1000
heap
page read and write
7A80000
heap
page read and write
35F0000
heap
page read and write
7C4000
heap
page read and write
1EFC7106000
heap
page read and write
3750000
trusted library allocation
page read and write
93A000
heap
page read and write
D2B000
unkown
page execute read
3D2F000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
7C4000
heap
page read and write
990000
heap
page read and write
67D5000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
1F38D090000
heap
page read and write
4EC7000
unkown
page read and write
4AE1000
heap
page read and write
974000
heap
page read and write
5C70000
heap
page read and write
67DA000
heap
page read and write
3C2F000
trusted library allocation
page read and write
4DB7000
heap
page read and write
80E000
stack
page read and write
4DB7000
heap
page read and write
1531000
heap
page read and write
3775000
trusted library allocation
page read and write
4AE1000
heap
page read and write
1B0F000
stack
page read and write
D35D000
stack
page read and write
4AE1000
heap
page read and write
3C1A000
trusted library allocation
page read and write
1EFC7167000
heap
page read and write
1EFC5390000
heap
page read and write
7C4000
heap
page read and write
3752000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
CD5000
unkown
page execute read
4AE1000
heap
page read and write
3CF8000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4A8F000
heap
page read and write
4AE0000
unkown
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
1700000
trusted library allocation
page read and write
1810000
heap
page read and write
7C4000
heap
page read and write
1EFC7100000
heap
page read and write
4AE1000
heap
page read and write
3D0D000
trusted library allocation
page read and write
3C8B000
trusted library allocation
page read and write
7C0000
heap
page read and write
87CD000
stack
page read and write
7C4000
heap
page read and write
4A4B000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
379D000
trusted library allocation
page read and write
7C96000
heap
page read and write
3C18000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
3771000
trusted library allocation
page read and write
4AE1000
heap
page read and write
1EFC7112000
heap
page read and write
4AE1000
heap
page read and write
4A8F000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
CF7000
unkown
page execute read
4DB7000
heap
page read and write
3164000
trusted library allocation
page read and write
7CA7000
heap
page read and write
CC4000
unkown
page execute read
930000
heap
page read and write
999000
heap
page read and write
4DB7000
heap
page read and write
58ED000
stack
page read and write
4DB7000
heap
page read and write
4A4E000
heap
page read and write
37B8000
trusted library allocation
page read and write
7C4000
heap
page read and write
3C5D000
trusted library allocation
page read and write
31B0000
trusted library allocation
page execute and read and write
5B2D000
stack
page read and write
32D0000
heap
page execute and read and write
4DB7000
heap
page read and write
61C0000
trusted library allocation
page read and write
7C4000
heap
page read and write
1818000
heap
page read and write
979000
heap
page read and write
4F7F000
stack
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
3784000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
1EFC54BC000
heap
page read and write
37AB000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
5740000
heap
page execute and read and write
30D0000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE0000
unkown
page read and write
4AE1000
heap
page read and write
91E000
stack
page read and write
372F000
trusted library allocation
page read and write
4A8F000
heap
page read and write
9AB000
heap
page read and write
61A0000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
1735000
trusted library allocation
page execute and read and write
4DB7000
heap
page read and write
67C4000
heap
page read and write
1EFC7156000
heap
page read and write
E30000
heap
page read and write
5FE0000
trusted library section
page readonly
3CBE000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
CB8000
unkown
page execute read
1EFC54BC000
heap
page read and write
4DB7000
heap
page read and write
32BC000
stack
page read and write
4B90000
unkown
page read and write
CCA000
unkown
page execute read
7C4000
heap
page read and write
1BE06837000
heap
page read and write
3D26000
trusted library allocation
page read and write
CFD000
unkown
page execute read
4DB7000
heap
page read and write
172A000
trusted library allocation
page execute and read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4A8E000
heap
page read and write
7AA7000
heap
page read and write
56A3000
heap
page read and write
4C50000
unkown
page read and write
3CB8000
trusted library allocation
page read and write
6790000
heap
page read and write
CA7000
unkown
page execute read
3C7E000
trusted library allocation
page read and write
5D90000
trusted library allocation
page execute and read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
42E1000
trusted library allocation
page read and write
350000
remote allocation
page execute and read and write
1EFC5490000
heap
page read and write
1EFC5450000
heap
page read and write
7C4000
heap
page read and write
565D000
stack
page read and write
4DB7000
heap
page read and write
157E000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1EFC712E000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
32CC000
trusted library allocation
page read and write
969000
heap
page read and write
179E000
stack
page read and write
4DB7000
heap
page read and write
4E42000
unkown
page read and write
4AE1000
heap
page read and write
3CF4000
trusted library allocation
page read and write
3CB6000
trusted library allocation
page read and write
4B72000
unkown
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1703000
trusted library allocation
page execute and read and write
4AE1000
heap
page read and write
3915000
trusted library allocation
page read and write
4A4B000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
1EFC716D000
heap
page read and write
3C44000
trusted library allocation
page read and write
3C48000
trusted library allocation
page read and write
4DB7000
heap
page read and write
1BE0683E000
heap
page read and write
1230000
heap
page read and write
4AE1000
heap
page read and write
37C3000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4F81000
heap
page read and write
4AE1000
heap
page read and write
8DF000
stack
page read and write
7C4000
heap
page read and write
7FF7E5E09000
unkown
page readonly
4A55000
heap
page read and write
4AE1000
heap
page read and write
4A4B000
heap
page read and write
4DB7000
heap
page read and write
1EFC717E000
heap
page read and write
4DAD000
unkown
page read and write
7C4000
heap
page read and write
3D24000
trusted library allocation
page read and write
3119000
heap
page read and write
3CD5000
trusted library allocation
page read and write
3C5F000
trusted library allocation
page read and write
4A73000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
1517000
heap
page read and write
4AE1000
heap
page read and write
1EFC7160000
heap
page read and write
4DB7000
heap
page read and write
1EFC7117000
heap
page read and write
3110000
heap
page read and write
1390000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
3791000
trusted library allocation
page read and write
7C4000
heap
page read and write
7C4000
heap
page read and write
880F000
stack
page read and write
4AE1000
heap
page read and write
4DBA000
heap
page read and write
14EE000
stack
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
3756000
trusted library allocation
page read and write
1F38D080000
heap
page read and write
FF908C000
stack
page read and write
3C7A000
trusted library allocation
page read and write
4A4B000
heap
page read and write
14FB000
heap
page read and write
136E000
stack
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
1524000
heap
page read and write
379F000
trusted library allocation
page read and write
44B6000
trusted library allocation
page read and write
3D07000
trusted library allocation
page read and write
3754000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
810000
direct allocation
page read and write
7FF7E5E00000
unkown
page readonly
7C4000
heap
page read and write
38C000
stack
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
3CDD000
trusted library allocation
page read and write
3C5B000
trusted library allocation
page read and write
2FADAFE000
stack
page read and write
8B70000
trusted library allocation
page execute and read and write
3CC2000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4C5C000
stack
page read and write
4AE1000
heap
page read and write
3C46000
trusted library allocation
page read and write
3786000
trusted library allocation
page read and write
EEC000
stack
page read and write
4C60000
unkown
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
3C33000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
3758000
trusted library allocation
page read and write
4AE1000
heap
page read and write
1EFC54C0000
heap
page read and write
1EFC70FB000
heap
page read and write
3C8D000
trusted library allocation
page read and write
7C4000
heap
page read and write
1BE06810000
heap
page readonly
4DB7000
heap
page read and write
67B4000
heap
page read and write
862E000
stack
page read and write
4D01000
heap
page read and write
61B0000
trusted library allocation
page execute and read and write
7FF7E5E0E000
unkown
page readonly
4AE1000
heap
page read and write
4DB7000
heap
page read and write
CAD000
unkown
page execute read
7C4000
heap
page read and write
3D09000
trusted library allocation
page read and write
1F38D3C0000
heap
page read and write
3C36000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
7FF7E5E01000
unkown
page execute read
8B20000
trusted library section
page read and write
7989000
heap
page read and write
26ECB5C000
stack
page read and write
4AE1000
heap
page read and write
795D000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4EE1000
unkown
page read and write
770000
direct allocation
page read and write
4AE1000
heap
page read and write
3773000
trusted library allocation
page read and write
789E000
heap
page read and write
3C12000
trusted library allocation
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
7FF7E5E09000
unkown
page readonly
1704000
trusted library allocation
page read and write
1510000
heap
page read and write
4AE1000
heap
page read and write
157F000
heap
page read and write
1710000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
4AE1000
heap
page read and write
14FE000
heap
page read and write
4AE1000
heap
page read and write
376D000
trusted library allocation
page read and write
4AE1000
heap
page read and write
1EFC53B0000
heap
page read and write
7C4000
heap
page read and write
5DEF000
trusted library allocation
page read and write
CCF000
unkown
page execute read
4AE1000
heap
page read and write
999000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1EFC7134000
heap
page read and write
4DB7000
heap
page read and write
1BE067E0000
heap
page read and write
3C4C000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
7A40000
trusted library allocation
page read and write
1EFC5455000
heap
page read and write
7C4000
heap
page read and write
70E000
stack
page read and write
4AE1000
heap
page read and write
5C34000
trusted library allocation
page read and write
4AE1000
heap
page read and write
7FF7E5E00000
unkown
page readonly
99A000
heap
page read and write
4DB7000
heap
page read and write
1EFC714B000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
37BC000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
37BA000
trusted library allocation
page read and write
17E0000
heap
page read and write
1EFC7145000
heap
page read and write
4DB7000
heap
page read and write
4AE0000
unkown
page read and write
3777000
trusted library allocation
page read and write
1EFC70E4000
heap
page read and write
4D01000
heap
page read and write
4AE1000
heap
page read and write
C8B000
unkown
page execute read
4AE1000
heap
page read and write
4DB7000
heap
page read and write
1750000
trusted library allocation
page read and write
4DB7000
heap
page read and write
16F0000
trusted library allocation
page read and write
1EFC7179000
heap
page read and write
67E0000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
1EFC70DE000
heap
page read and write
4C58000
unkown
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
7FF7E5E0E000
unkown
page readonly
5C51000
trusted library allocation
page read and write
1EFC7173000
heap
page read and write
4AE1000
heap
page read and write
5710000
trusted library allocation
page read and write
750000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
7C4000
heap
page read and write
7C4000
heap
page read and write
170D000
trusted library allocation
page execute and read and write
375B000
trusted library allocation
page read and write
67A0000
heap
page read and write
EDA000
stack
page read and write
4AE1000
heap
page read and write
59EE000
stack
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
521D000
heap
page read and write
1EFC54C0000
heap
page read and write
1EFC7184000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
149E000
stack
page read and write
4AE1000
heap
page read and write
1737000
trusted library allocation
page execute and read and write
7C4000
heap
page read and write
7976000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
8B10000
trusted library allocation
page read and write
EF1000
stack
page read and write
D42000
unkown
page readonly
4AE0000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
3C14000
trusted library allocation
page read and write
45CF000
trusted library allocation
page read and write
872E000
stack
page read and write
3D20000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
D0E000
unkown
page execute read
4D00000
heap
page read and write
4C30000
unkown
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1EFC707B000
heap
page read and write
4DB7000
heap
page read and write
4C1F000
stack
page read and write
7C4000
heap
page read and write
7C4000
heap
page read and write
4C03000
unkown
page read and write
4A60000
heap
page read and write
4AE1000
heap
page read and write
3CBA000
trusted library allocation
page read and write
7904000
heap
page read and write
1310000
heap
page read and write
4AE1000
heap
page read and write
67A8000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
378A000
trusted library allocation
page read and write
2FAD6CC000
stack
page read and write
1EFC54AB000
heap
page read and write
4AE1000
heap
page read and write
3C16000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
8B40000
trusted library section
page read and write
3C76000
trusted library allocation
page read and write
138E000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4D35000
heap
page read and write
7C4000
heap
page read and write
85EE000
stack
page read and write
1EFC70F5000
heap
page read and write
4AE1000
heap
page read and write
1BE06700000
heap
page read and write
14DE000
stack
page read and write
5CAB000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
37A3000
trusted library allocation
page read and write
1726000
trusted library allocation
page execute and read and write
4DB7000
heap
page read and write
7FF7E5E0C000
unkown
page write copy
4AE1000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
31AE000
stack
page read and write
1F38D0B0000
heap
page read and write
4D34000
heap
page read and write
1800000
trusted library allocation
page execute and read and write
4AE1000
heap
page read and write
5C5D000
trusted library allocation
page read and write
4DB7000
heap
page read and write
5700000
trusted library allocation
page read and write
79A0000
heap
page read and write
619E000
stack
page read and write
4DB7000
heap
page read and write
4CB0000
direct allocation
page read and write
13B0000
trusted library allocation
page read and write
376F000
trusted library allocation
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
3D28000
trusted library allocation
page read and write
C22000
unkown
page execute read
4DB7000
heap
page read and write
4AE1000
heap
page read and write
32C0000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1EFC70EF000
heap
page read and write
4DB7000
heap
page read and write
37A9000
trusted library allocation
page read and write
4AE1000
heap
page read and write
83AE000
stack
page read and write
2FADB7E000
unkown
page readonly
4C80000
unkown
page read and write
7CFC000
heap
page read and write
6090000
heap
page read and write
D1A000
unkown
page execute read
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4D44000
heap
page read and write
CB3000
unkown
page execute read
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4D35000
heap
page read and write
61D0000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4F80000
heap
page read and write
7990000
trusted library allocation
page execute and read and write
4DB7000
heap
page read and write
3C59000
trusted library allocation
page read and write
4DB7000
heap
page read and write
378C000
trusted library allocation
page read and write
997000
heap
page read and write
6080000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
1BE066E0000
unkown
page execute and read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
13E5000
heap
page read and write
61C5000
trusted library allocation
page read and write
4DB7000
heap
page read and write
997000
heap
page read and write
4AE1000
heap
page read and write
1EFC713F000
heap
page read and write
375F000
trusted library allocation
page read and write
7CB7000
heap
page read and write
3C78000
trusted library allocation
page read and write
4AE1000
heap
page read and write
890000
heap
page read and write
1EFC7123000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
1F38EC80000
heap
page read and write
4E56000
unkown
page read and write
4AE1000
heap
page read and write
86E000
stack
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
CE6000
unkown
page execute read
1380000
heap
page read and write
37DF000
trusted library allocation
page read and write
3D0B000
trusted library allocation
page read and write
3B0000
unkown
page execute and read and write
3CBC000
trusted library allocation
page read and write
D25000
unkown
page execute read
4AE1000
heap
page read and write
74E000
stack
page read and write
4DB7000
heap
page read and write
3D0F000
trusted library allocation
page read and write
7C4000
heap
page read and write
3C2D000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4F3E000
stack
page read and write
1EFC54BE000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
7FF7E5E01000
unkown
page execute read
4DB7000
heap
page read and write
4DB7000
heap
page read and write
AED4000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4A00000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
1EFC713A000
heap
page read and write
67AF000
heap
page read and write
4DB7000
heap
page read and write
37BE000
trusted library allocation
page read and write
D06000
unkown
page execute read
5C56000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
4DB7000
heap
page read and write
7982000
heap
page read and write
372D000
trusted library allocation
page read and write
4B80000
unkown
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
7C80000
heap
page read and write
4D35000
heap
page read and write
4AE1000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
D14000
unkown
page execute read
4DB7000
heap
page read and write
37A5000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
1BE06830000
heap
page read and write
374E000
trusted library allocation
page read and write
6095000
heap
page read and write
4AE1000
heap
page read and write
7FF7E5E0C000
unkown
page read and write
1373000
heap
page read and write
5C30000
trusted library allocation
page read and write
4A52000
heap
page read and write
1732000
trusted library allocation
page read and write
173B000
trusted library allocation
page execute and read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
5C2D000
stack
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
36F0000
heap
page read and write
D09000
unkown
page execute read
7C4000
heap
page read and write
893000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
3CD3000
trusted library allocation
page read and write
7C4000
heap
page read and write
1F38D280000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
5062000
heap
page read and write
1557000
heap
page read and write
1722000
trusted library allocation
page read and write
5FDB000
stack
page read and write
4DB7000
heap
page read and write
67F3000
heap
page read and write
4AE1000
heap
page read and write
376B000
trusted library allocation
page read and write
3CD7000
trusted library allocation
page read and write
5FF0000
heap
page read and write
84EE000
stack
page read and write
3CD9000
trusted library allocation
page read and write
1340000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
CDB000
unkown
page execute read
CBE000
unkown
page execute read
3CF6000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
999000
heap
page read and write
399000
remote allocation
page execute and read and write
5C4E000
trusted library allocation
page read and write
4AE1000
heap
page read and write
3F0000
heap
page read and write
4AE0000
unkown
page read and write
5D26000
heap
page read and write
7BE000
stack
page read and write
1EFC710C000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
7942000
heap
page read and write
34B000
stack
page read and write
D45D000
stack
page read and write
4C9C000
stack
page read and write
30BE000
stack
page read and write
4AE1000
heap
page read and write
4CF0000
heap
page read and write
4DA9000
unkown
page read and write
1EFC52B0000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
C96000
unkown
page execute read
3161000
trusted library allocation
page read and write
4AE1000
heap
page read and write
84AF000
stack
page read and write
1EFC5497000
heap
page read and write
3CC5000
trusted library allocation
page read and write
7F92000
trusted library allocation
page read and write
5D2A000
heap
page read and write
4DB9000
heap
page read and write
C22000
unkown
page execute read
4CD0000
unkown
page read and write
7C8E000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
5D70000
trusted library allocation
page read and write
7C4000
heap
page read and write
4AE1000
heap
page read and write
2FAD7CF000
stack
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
1592000
heap
page read and write
1BE06800000
unkown
page execute and read and write
CEC000
unkown
page execute read
4DB7000
heap
page read and write
4DB7000
heap
page read and write
4D00000
unkown
page read and write
4DB7000
heap
page read and write
5DB0000
heap
page read and write
7C4000
heap
page read and write
4DB7000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
3C7C000
trusted library allocation
page read and write
1370000
heap
page read and write
4DB7000
heap
page read and write
4DB7000
heap
page read and write
1F38D3C5000
heap
page read and write
4DB7000
heap
page read and write
569E000
stack
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
1EFC7162000
heap
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
4DB7000
heap
page read and write
3CDB000
trusted library allocation
page read and write
1250000
heap
page read and write
7C4000
heap
page read and write
26ECE7E000
stack
page read and write
4AE1000
heap
page read and write
C90000
unkown
page execute read
There are 836 hidden memdumps, click here to show them.