IOC Report
CheatInjector.exe

loading gif

Files

File Path
Type
Category
Malicious
CheatInjector.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CheatInjector.ex_32976456f53d9ed7895573c0f1b9b852cfa91eea_d88013b7_19b5572d-dc75-4c90-9317-befffdb2e13c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER27E2.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 05:01:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2831.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2851.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\static.lib
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CheatInjector.exe
"C:\Users\user\Desktop\CheatInjector.exe"
malicious
C:\Users\user\Desktop\CheatInjector.exe
"C:\Users\user\Desktop\CheatInjector.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 280

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
prinyveri.cfd
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://crisiwarny.store/api/
unknown
https://crisiwarny.store/api#2
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://crisiwarny.store/N
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://crisiwarny.store/V
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://crisiwarny.store:443/apic
unknown
https://crisiwarny.store:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://crisiwarny.store/apiA2?
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
prinyveri.cfd
unknown
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
ProgramId
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
FileId
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
LowerCaseLongPath
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
LongPathHash
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
Name
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
OriginalFileName
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
Publisher
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
Version
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
BinFileVersion
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
BinaryType
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
ProductName
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
ProductVersion
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
LinkDate
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
BinProductVersion
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
AppxPackageFullName
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
AppxPackageRelativeId
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
Size
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
Language
\REGISTRY\A\{a89a6919-c405-8922-8a5a-d9310732b9b5}\Root\InventoryApplicationFile\cheatinjector.ex|b5399438795acf14
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4EF000
unkown
page read and write
malicious
159C000
heap
page read and write
166D000
heap
page read and write
FCC000
stack
page read and write
3CBC000
trusted library allocation
page read and write
1622000
heap
page read and write
163F000
stack
page read and write
1663000
heap
page read and write
1654000
heap
page read and write
149A000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
3C3F000
trusted library allocation
page read and write
545000
unkown
page readonly
3C81000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
1641000
heap
page read and write
3C52000
trusted library allocation
page read and write
162A000
heap
page read and write
3CA9000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
163B000
heap
page read and write
3C44000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
163C000
heap
page read and write
3C2F000
trusted library allocation
page read and write
167A000
heap
page read and write
1648000
heap
page read and write
1490000
heap
page read and write
3C30000
trusted library allocation
page read and write
1622000
heap
page read and write
3C5A000
trusted library allocation
page read and write
13B5000
heap
page read and write
165B000
heap
page read and write
164B000
heap
page read and write
3C3F000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
1630000
heap
page read and write
3C79000
trusted library allocation
page read and write
3A7F000
stack
page read and write
3C4B000
trusted library allocation
page read and write
3CD3000
trusted library allocation
page read and write
3E2B000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
166A000
heap
page read and write
1643000
heap
page read and write
325E000
stack
page read and write
3CBA000
trusted library allocation
page read and write
3C37000
trusted library allocation
page read and write
1629000
heap
page read and write
1520000
heap
page read and write
3C33000
trusted library allocation
page read and write
3C41000
trusted library allocation
page read and write
144A000
heap
page read and write
311D000
stack
page read and write
1668000
heap
page read and write
3C42000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
1616000
heap
page read and write
3C41000
trusted library allocation
page read and write
3C92000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
3ADE000
stack
page read and write
4C0000
unkown
page readonly
166D000
heap
page read and write
397E000
stack
page read and write
173E000
stack
page read and write
3C52000
trusted library allocation
page read and write
3C4D000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
165D000
heap
page read and write
3C62000
trusted library allocation
page read and write
1620000
heap
page read and write
3C32000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C20000
trusted library allocation
page read and write
144E000
heap
page read and write
164B000
heap
page read and write
3C8F000
trusted library allocation
page read and write
1624000
heap
page read and write
3C52000
trusted library allocation
page read and write
162B000
heap
page read and write
3C42000
trusted library allocation
page read and write
12FA000
stack
page read and write
3C52000
trusted library allocation
page read and write
3CBC000
trusted library allocation
page read and write
1620000
heap
page read and write
3C72000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C3E000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
156D000
stack
page read and write
3C5C000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
163F000
heap
page read and write
3C71000
trusted library allocation
page read and write
1671000
heap
page read and write
15C5000
heap
page read and write
3C61000
trusted library allocation
page read and write
3C70000
trusted library allocation
page read and write
1630000
heap
page read and write
3C83000
trusted library allocation
page read and write
1658000
heap
page read and write
1624000
heap
page read and write
1510000
remote allocation
page read and write
3D21000
heap
page read and write
15C5000
heap
page read and write
3C6B000
trusted library allocation
page read and write
166A000
heap
page read and write
3C42000
trusted library allocation
page read and write
15DA000
heap
page read and write
3C54000
trusted library allocation
page read and write
1390000
heap
page read and write
1630000
heap
page read and write
4EF000
unkown
page write copy
3C52000
trusted library allocation
page read and write
3C26000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
1632000
heap
page read and write
3C2F000
trusted library allocation
page read and write
1637000
heap
page read and write
163B000
heap
page read and write
3C7A000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
1510000
remote allocation
page read and write
3C3D000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
1588000
heap
page read and write
3C4D000
trusted library allocation
page read and write
1630000
heap
page read and write
3C42000
trusted library allocation
page read and write
3C66000
trusted library allocation
page read and write
15AF000
heap
page read and write
3E9C000
trusted library allocation
page read and write
3C6A000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
545000
unkown
page readonly
165D000
heap
page read and write
3C42000
trusted library allocation
page read and write
3C7E000
trusted library allocation
page read and write
3C99000
trusted library allocation
page read and write
3C4F000
trusted library allocation
page read and write
3D2D000
trusted library allocation
page read and write
3DD4000
trusted library allocation
page read and write
1654000
heap
page read and write
3C42000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
3C81000
trusted library allocation
page read and write
3D33000
trusted library allocation
page read and write
3CA1000
trusted library allocation
page read and write
3C4F000
trusted library allocation
page read and write
3C56000
trusted library allocation
page read and write
1240000
heap
page read and write
177F000
stack
page read and write
1666000
heap
page read and write
3C52000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
1669000
heap
page read and write
12CE000
stack
page read and write
3C38000
trusted library allocation
page read and write
3C29000
trusted library allocation
page read and write
15DA000
heap
page read and write
3C69000
trusted library allocation
page read and write
3C71000
trusted library allocation
page read and write
335F000
stack
page read and write
165D000
heap
page read and write
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
545000
unkown
page readonly
1624000
heap
page read and write
3C66000
trusted library allocation
page read and write
166D000
heap
page read and write
3C80000
trusted library allocation
page read and write
1615000
heap
page read and write
4C0000
unkown
page readonly
3CBC000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
4C1000
unkown
page execute read
3C52000
trusted library allocation
page read and write
3C53000
trusted library allocation
page read and write
1631000
heap
page read and write
3C21000
trusted library allocation
page read and write
3CAF000
trusted library allocation
page read and write
1624000
heap
page read and write
3C87000
trusted library allocation
page read and write
1654000
heap
page read and write
F9B000
stack
page read and write
4E4000
unkown
page readonly
162B000
heap
page read and write
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C81000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
3DFC000
trusted library allocation
page read and write
162B000
heap
page read and write
3CA9000
trusted library allocation
page read and write
1629000
heap
page read and write
3C3A000
trusted library allocation
page read and write
165D000
heap
page read and write
3C32000
trusted library allocation
page read and write
165D000
heap
page read and write
4C1000
unkown
page execute read
3C42000
trusted library allocation
page read and write
1624000
heap
page read and write
1645000
heap
page read and write
3C42000
trusted library allocation
page read and write
165D000
heap
page read and write
3C52000
trusted library allocation
page read and write
3D4C000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
1624000
heap
page read and write
3C52000
trusted library allocation
page read and write
3AE0000
heap
page read and write
1669000
heap
page read and write
1300000
heap
page read and write
163C000
heap
page read and write
4E4000
unkown
page readonly
1669000
heap
page read and write
1640000
heap
page read and write
3C42000
trusted library allocation
page read and write
3C5A000
trusted library allocation
page read and write
1663000
heap
page read and write
3C67000
trusted library allocation
page read and write
3C41000
trusted library allocation
page read and write
3C85000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
4E4000
unkown
page readonly
159C000
heap
page read and write
1668000
heap
page read and write
163B000
heap
page read and write
3C52000
trusted library allocation
page read and write
134E000
stack
page read and write
545000
unkown
page readonly
1631000
heap
page read and write
12D0000
heap
page read and write
4EF000
unkown
page write copy
1624000
heap
page read and write
163B000
heap
page read and write
1637000
heap
page read and write
4C0000
unkown
page readonly
1580000
heap
page read and write
3BEF000
stack
page read and write
1656000
heap
page read and write
3C69000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C7D000
trusted library allocation
page read and write
3D84000
trusted library allocation
page read and write
1645000
heap
page read and write
3C3D000
trusted library allocation
page read and write
1654000
heap
page read and write
3C68000
trusted library allocation
page read and write
3CA9000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
1630000
heap
page read and write
13B7000
heap
page read and write
3C42000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
349F000
stack
page read and write
3C3F000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
1663000
heap
page read and write
1614000
heap
page read and write
391D000
stack
page read and write
3C57000
trusted library allocation
page read and write
163F000
heap
page read and write
3C38000
trusted library allocation
page read and write
1614000
heap
page read and write
3C36000
trusted library allocation
page read and write
3C73000
trusted library allocation
page read and write
3D64000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
187F000
stack
page read and write
3C57000
trusted library allocation
page read and write
381D000
stack
page read and write
3C7D000
trusted library allocation
page read and write
ECC000
stack
page read and write
1645000
heap
page read and write
3C52000
trusted library allocation
page read and write
1632000
heap
page read and write
163F000
heap
page read and write
3C4B000
trusted library allocation
page read and write
541000
unkown
page execute and read and write
1616000
heap
page read and write
3CBC000
trusted library allocation
page read and write
321E000
stack
page read and write
1616000
heap
page read and write
163B000
heap
page read and write
3CA9000
trusted library allocation
page read and write
339E000
stack
page read and write
3C2E000
trusted library allocation
page read and write
3C87000
trusted library allocation
page read and write
1656000
heap
page read and write
3C3F000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
1624000
heap
page read and write
3C61000
trusted library allocation
page read and write
1663000
heap
page read and write
165B000
heap
page read and write
3C4B000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
13B0000
heap
page read and write
3D21000
heap
page read and write
3C42000
trusted library allocation
page read and write
1641000
heap
page read and write
15AF000
heap
page read and write
1632000
heap
page read and write
165D000
heap
page read and write
459000
remote allocation
page execute and read and write
167B000
heap
page read and write
165D000
heap
page read and write
1654000
heap
page read and write
4836000
trusted library allocation
page read and write
3FCC000
trusted library allocation
page read and write
14EE000
stack
page read and write
1635000
heap
page read and write
3C68000
trusted library allocation
page read and write
3C3A000
trusted library allocation
page read and write
3C3F000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C4B000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
1657000
heap
page read and write
3C78000
trusted library allocation
page read and write
543000
unkown
page read and write
3CC2000
trusted library allocation
page read and write
1616000
heap
page read and write
3D20000
heap
page read and write
3C90000
trusted library allocation
page read and write
1631000
heap
page read and write
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
163F000
heap
page read and write
1230000
heap
page read and write
3EB1000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3C29000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
4C1000
unkown
page execute read
3C59000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
163F000
heap
page read and write
3C42000
trusted library allocation
page read and write
1624000
heap
page read and write
165D000
heap
page read and write
1510000
remote allocation
page read and write
3C39000
trusted library allocation
page read and write
3CCB000
trusted library allocation
page read and write
4C0000
unkown
page readonly
3C52000
trusted library allocation
page read and write
3C3E000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
1648000
heap
page read and write
3C52000
trusted library allocation
page read and write
3CB3000
trusted library allocation
page read and write
4E4000
unkown
page readonly
1440000
heap
page read and write
1637000
heap
page read and write
3C41000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
1630000
heap
page read and write
3C87000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
138E000
stack
page read and write
165B000
heap
page read and write
1598000
heap
page read and write
4C1000
unkown
page execute read
1616000
heap
page read and write
165A000
heap
page read and write
1640000
heap
page read and write
1636000
heap
page read and write
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C4F000
trusted library allocation
page read and write
3C92000
trusted library allocation
page read and write
3C7A000
trusted library allocation
page read and write
4EF000
unkown
page write copy
3C52000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
3C37000
trusted library allocation
page read and write
162D000
heap
page read and write
3C67000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
3C3A000
trusted library allocation
page read and write
128E000
stack
page read and write
3C5A000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
1670000
heap
page read and write
3C87000
trusted library allocation
page read and write
3C42000
trusted library allocation
page read and write
3C54000
trusted library allocation
page read and write
1631000
heap
page read and write
3C4F000
trusted library allocation
page read and write
3C4A000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
163F000
heap
page read and write
3C4D000
trusted library allocation
page read and write
165A000
heap
page read and write
3C92000
trusted library allocation
page read and write
432A000
trusted library allocation
page read and write
1635000
heap
page read and write
1671000
heap
page read and write
1667000
heap
page read and write
3C84000
trusted library allocation
page read and write
3C29000
trusted library allocation
page read and write
3C21000
trusted library allocation
page read and write
165A000
heap
page read and write
3C49000
trusted library allocation
page read and write
1630000
heap
page read and write
There are 415 hidden memdumps, click here to show them.