IOC Report
7Y18r(97).exe

loading gif

Files

File Path
Type
Category
Malicious
7Y18r(97).exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7Y18r(97).exe_938629191aae7b6c216c304dc83508b28629ed_f22eac21_101b2203-1698-4cd6-bed7-9dbafd4c4702\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB8B9.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Jul 24 19:02:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB0C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB3B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7Y18r(97).exe
"C:\Users\user\Desktop\7Y18r(97).exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7724 -s 1680

URLs

Name
IP
Malicious
applyzxcksdia.shop
malicious
bindceasdiwozx.shop
malicious
declaredczxi.shop
malicious
conformfucdioz.shop
malicious
closedjuruwk.shop
malicious
replacedoxcjzp.shop
malicious
catchddkxozvp.shop
malicious
contemplateodszsv.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://duckduckgo.com/ac/?q=
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://closedjuruwk.shop/api
188.114.97.3
https://closedjuruwk.shop:443/api
unknown
https://closedjuruwk.shop/apiE#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://closedjuruwk.shop:443/apiMicrosoft
unknown
https://closedjuruwk.shop/tyg
unknown
https://closedjuruwk.shop/u
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://closedjuruwk.shop/o
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://closedjuruwk.shop/e
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://closedjuruwk.shop/W
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
https://closedjuruwk.shop/M
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://closedjuruwk.shop/
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://closedjuruwk.shop/apiew
unknown
https://closedjuruwk.shop/api?
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://closedjuruwk.shop/)
unknown
There are 43 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
closedjuruwk.shop
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
closedjuruwk.shop
European Union
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
ProgramId
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
FileId
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
LowerCaseLongPath
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
LongPathHash
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
Name
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
OriginalFileName
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
Publisher
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
Version
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
BinFileVersion
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
BinaryType
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
ProductName
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
ProductVersion
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
LinkDate
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
BinProductVersion
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
AppxPackageFullName
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
AppxPackageRelativeId
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
Size
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
Language
\REGISTRY\A\{bf92a4c5-0b48-627f-e5a3-c198d1c36208}\Root\InventoryApplicationFile\7y18r(97).exe|ee6af4ac90e50ef8
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2570000
heap
page execute and read and write
malicious
33D5000
trusted library allocation
page read and write
684000
heap
page read and write
33F6000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
19D000
stack
page read and write
341B000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
8D8000
heap
page read and write
88B000
heap
page read and write
3401000
trusted library allocation
page read and write
33D8000
trusted library allocation
page read and write
800000
heap
page read and write
33E9000
trusted library allocation
page read and write
8C6000
heap
page read and write
33DF000
trusted library allocation
page read and write
8EB000
heap
page read and write
33CF000
trusted library allocation
page read and write
3403000
trusted library allocation
page read and write
873000
heap
page read and write
8DA000
heap
page read and write
33CE000
trusted library allocation
page read and write
33E2000
trusted library allocation
page read and write
8D6000
heap
page read and write
33CF000
trusted library allocation
page read and write
889000
heap
page read and write
3411000
trusted library allocation
page read and write
238A000
direct allocation
page read and write
8EB000
heap
page read and write
8B3000
heap
page read and write
27B1000
heap
page read and write
8AB000
heap
page read and write
3408000
trusted library allocation
page read and write
426B000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
8A0000
heap
page read and write
8D8000
heap
page read and write
3421000
trusted library allocation
page read and write
8D8000
heap
page read and write
8CE000
heap
page read and write
33DF000
trusted library allocation
page read and write
8C1000
heap
page read and write
33CC000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
8A1000
heap
page read and write
35A4000
trusted library allocation
page read and write
8AE000
heap
page read and write
340E000
trusted library allocation
page read and write
8E8000
heap
page read and write
3419000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
8AB000
heap
page read and write
2BD2000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
8E9000
heap
page read and write
33C1000
trusted library allocation
page read and write
83B000
heap
page read and write
26AE000
stack
page read and write
9C000
stack
page read and write
2B20000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
33C0000
trusted library allocation
page read and write
343D000
trusted library allocation
page read and write
84C000
heap
page read and write
2B20000
heap
page read and write
2DBD000
stack
page read and write
3D56000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
3840000
heap
page read and write
33E5000
trusted library allocation
page read and write
8AC000
heap
page read and write
4C1000
unkown
page read and write
33AE000
stack
page read and write
4B7000
unkown
page write copy
34C3000
trusted library allocation
page read and write
8E8000
heap
page read and write
3411000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
684000
heap
page read and write
8CE000
heap
page read and write
341F000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
883000
heap
page read and write
684000
heap
page read and write
3407000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
4C9000
unkown
page readonly
684000
heap
page read and write
8DF000
heap
page read and write
326F000
stack
page read and write
2BEA000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
8B4000
heap
page read and write
8CA000
heap
page read and write
33DA000
trusted library allocation
page read and write
4B7000
unkown
page read and write
825000
heap
page read and write
2391000
direct allocation
page read and write
8BB000
heap
page read and write
8CD000
heap
page read and write
2398000
direct allocation
page read and write
27B2000
heap
page read and write
8CA000
heap
page read and write
8BC000
heap
page read and write
3407000
trusted library allocation
page read and write
27B1000
heap
page read and write
78F000
stack
page read and write
8C7000
heap
page read and write
8F1000
heap
page read and write
3461000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
3423000
trusted library allocation
page read and write
8BC000
heap
page read and write
33D6000
trusted library allocation
page read and write
899000
heap
page read and write
33C1000
trusted library allocation
page read and write
8CA000
heap
page read and write
33E7000
trusted library allocation
page read and write
3659000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
8A1000
heap
page read and write
33CC000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
8C7000
heap
page read and write
33DF000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
27C0000
heap
page read and write
863000
heap
page read and write
27C0000
heap
page read and write
8BB000
heap
page read and write
33E5000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
8AB000
heap
page read and write
3458000
trusted library allocation
page read and write
684000
heap
page read and write
8CD000
heap
page read and write
3432000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
8E9000
heap
page read and write
34C5000
trusted library allocation
page read and write
2DC0000
remote allocation
page read and write
33E4000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
8D6000
heap
page read and write
344C000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
27B5000
heap
page read and write
3417000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
8C1000
heap
page read and write
3415000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
8B0000
heap
page read and write
34FC000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
8CD000
heap
page read and write
351C000
trusted library allocation
page read and write
33FA000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
8F9000
heap
page read and write
361F000
stack
page read and write
33CF000
trusted library allocation
page read and write
356E000
trusted library allocation
page read and write
88E000
heap
page read and write
8A0000
heap
page read and write
8D5000
heap
page read and write
684000
heap
page read and write
684000
heap
page read and write
33CF000
trusted library allocation
page read and write
8E9000
heap
page read and write
33C1000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
8D7000
heap
page read and write
33C6000
trusted library allocation
page read and write
2750000
heap
page execute and read and write
33CF000
trusted library allocation
page read and write
8B5000
heap
page read and write
8E8000
heap
page read and write
2BDC000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
8B0000
heap
page read and write
27B1000
heap
page read and write
8CE000
heap
page read and write
8AE000
heap
page read and write
33CC000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
8B3000
heap
page read and write
8FA000
heap
page read and write
26F0000
direct allocation
page read and write
3400000
trusted library allocation
page read and write
8DB000
heap
page read and write
33CF000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
4B9000
unkown
page read and write
530000
heap
page read and write
33F8000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
27B0000
heap
page read and write
8D5000
heap
page read and write
385B000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
4C2000
unkown
page write copy
344C000
trusted library allocation
page read and write
8D8000
heap
page read and write
29AF000
stack
page read and write
33DE000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
8D8000
heap
page read and write
33C8000
trusted library allocation
page read and write
8C4000
heap
page read and write
33F0000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
8AD000
heap
page read and write
4C6000
unkown
page readonly
8BB000
heap
page read and write
33CC000
trusted library allocation
page read and write
650000
heap
page read and write
8CA000
heap
page read and write
8A1000
heap
page read and write
64E000
stack
page read and write
3594000
trusted library allocation
page read and write
8BE000
heap
page read and write
34E4000
trusted library allocation
page read and write
8AE000
heap
page read and write
89E000
heap
page read and write
33CF000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
8C4000
heap
page read and write
401000
unkown
page execute read
684000
heap
page read and write
8CD000
heap
page read and write
8B5000
heap
page read and write
33CA000
trusted library allocation
page read and write
684000
heap
page read and write
33EB000
trusted library allocation
page read and write
868000
heap
page read and write
8D8000
heap
page read and write
684000
heap
page read and write
3408000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
3448000
trusted library allocation
page read and write
2AB1000
unclassified section
page execute read
878000
heap
page read and write
8B3000
heap
page read and write
33F6000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
32AE000
stack
page read and write
36E2000
trusted library allocation
page read and write
8D7000
heap
page read and write
2AF1000
unclassified section
page write copy
23E1000
direct allocation
page read and write
8B5000
heap
page read and write
891000
heap
page read and write
23B6000
direct allocation
page read and write
3406000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
23C4000
direct allocation
page read and write
33C9000
trusted library allocation
page read and write
8D5000
heap
page read and write
33CF000
trusted library allocation
page read and write
8B5000
heap
page read and write
8DF000
heap
page read and write
33CF000
trusted library allocation
page read and write
8EF000
heap
page read and write
895000
heap
page read and write
8D5000
heap
page read and write
2AF7000
unclassified section
page read and write
27B1000
heap
page read and write
33F9000
trusted library allocation
page read and write
86D000
heap
page read and write
342E000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
8E9000
heap
page read and write
3410000
trusted library allocation
page read and write
2B10000
heap
page read and write
33F7000
trusted library allocation
page read and write
8AF000
heap
page read and write
351E000
stack
page read and write
8BC000
heap
page read and write
343E000
trusted library allocation
page read and write
8B5000
heap
page read and write
33EC000
trusted library allocation
page read and write
375C000
trusted library allocation
page read and write
2AAA000
stack
page read and write
340A000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
360A000
trusted library allocation
page read and write
880000
heap
page read and write
342E000
trusted library allocation
page read and write
2DC0000
remote allocation
page read and write
23D3000
direct allocation
page read and write
684000
heap
page read and write
23A8000
direct allocation
page read and write
3417000
trusted library allocation
page read and write
2DC0000
remote allocation
page read and write
8E8000
heap
page read and write
33E2000
trusted library allocation
page read and write
27B1000
heap
page read and write
33CF000
trusted library allocation
page read and write
8BA000
heap
page read and write
3415000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
8BA000
heap
page read and write
33CF000
trusted library allocation
page read and write
2C7E000
stack
page read and write
2AEE000
unclassified section
page readonly
33DD000
trusted library allocation
page read and write
89F000
heap
page read and write
33C6000
trusted library allocation
page read and write
886000
heap
page read and write
8B5000
heap
page read and write
33F7000
trusted library allocation
page read and write
680000
heap
page read and write
33CA000
trusted library allocation
page read and write
8CD000
heap
page read and write
33CE000
trusted library allocation
page read and write
8AC000
heap
page read and write
33C6000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
4C4000
unkown
page readonly
341D000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
316E000
stack
page read and write
3440000
trusted library allocation
page read and write
2B01000
unclassified section
page readonly
808000
heap
page read and write
33C8000
trusted library allocation
page read and write
684000
heap
page read and write
8F0000
heap
page read and write
88E000
heap
page read and write
400000
unkown
page readonly
8AC000
heap
page read and write
3403000
trusted library allocation
page read and write
23E8000
direct allocation
page read and write
7CE000
stack
page read and write
4D7000
unkown
page readonly
8D8000
heap
page read and write
33CC000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
2CBE000
stack
page read and write
33EF000
trusted library allocation
page read and write
8E8000
heap
page read and write
33E0000
trusted library allocation
page read and write
26EC000
stack
page read and write
3460000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
869000
heap
page read and write
33E1000
trusted library allocation
page read and write
8CA000
heap
page read and write
8B5000
heap
page read and write
8B5000
heap
page read and write
33E8000
trusted library allocation
page read and write
2B7D000
stack
page read and write
340E000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
8AF000
heap
page read and write
8CD000
heap
page read and write
8CD000
heap
page read and write
870000
heap
page read and write
33FB000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
85B000
heap
page read and write
8AD000
heap
page read and write
880000
heap
page read and write
8AB000
heap
page read and write
33CC000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
8BE000
heap
page read and write
23CC000
direct allocation
page read and write
9FF000
stack
page read and write
23AF000
direct allocation
page read and write
33F6000
trusted library allocation
page read and write
23DA000
direct allocation
page read and write
342F000
trusted library allocation
page read and write
8AE000
heap
page read and write
8F0000
heap
page read and write
340E000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
878000
heap
page read and write
33F4000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
8CD000
heap
page read and write
684000
heap
page read and write
8F9000
heap
page read and write
8C4000
heap
page read and write
8AE000
heap
page read and write
341E000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
3407000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
27B1000
heap
page read and write
8F1000
heap
page read and write
8DA000
heap
page read and write
8B0000
heap
page read and write
33D6000
trusted library allocation
page read and write
3437000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
B00000
heap
page read and write
342A000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
359C000
trusted library allocation
page read and write
8EB000
heap
page read and write
340E000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
33F8000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
There are 431 hidden memdumps, click here to show them.