IOC Report
MilkaCheats.exe

loading gif

Files

File Path
Type
Category
Malicious
MilkaCheats.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MilkaCheats.exe_c2e8cd84136b88415cdd6f491f1eb232dba620bf_a9999437_fdaf37f7-0491-4405-b11e-478f369dae63\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF581.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 27 15:44:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5FF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF62F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\static.lib
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MilkaCheats.exe
"C:\Users\user\Desktop\MilkaCheats.exe"
malicious
C:\Users\user\Desktop\MilkaCheats.exe
"C:\Users\user\Desktop\MilkaCheats.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6232 -s 232

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
messejawu.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://crisiwarny.store/e
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://crisiwarny.store/apihCb
unknown
https://crisiwarny.store:443/apiPackages
unknown
https://crisiwarny.store/O
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://crisiwarny.store/s:md
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://crisiwarny.store/rjm
unknown
https://crisiwarny.store:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://crisiwarny.store/Bm
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store:443/api2o4p.default-release/key4.dbPK
unknown
https://crisiwarny.store/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
messejawu.store
unknown
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
ProgramId
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
FileId
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
LowerCaseLongPath
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
LongPathHash
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
Name
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
OriginalFileName
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
Publisher
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
Version
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
BinFileVersion
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
BinaryType
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
ProductName
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
ProductVersion
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
LinkDate
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
BinProductVersion
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
AppxPackageFullName
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
AppxPackageRelativeId
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
Size
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
Language
\REGISTRY\A\{99162ac9-8a2d-d80e-c548-aa72b96b6fd9}\Root\InventoryApplicationFile\milkacheats.exe|94666a9fa145e59
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
EF000
unkown
page read and write
malicious
39D5000
trusted library allocation
page read and write
3A19000
trusted library allocation
page read and write
3A1A000
trusted library allocation
page read and write
1378000
heap
page read and write
39F4000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
144000
unkown
page readonly
39F4000
trusted library allocation
page read and write
3BD0000
trusted library allocation
page read and write
1388000
heap
page read and write
142000
unkown
page read and write
39F4000
trusted library allocation
page read and write
3A23000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
3A1C000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
3A3B000
trusted library allocation
page read and write
1357000
heap
page read and write
2E7E000
stack
page read and write
1395000
heap
page read and write
2E3D000
stack
page read and write
137C000
heap
page read and write
128D000
stack
page read and write
39F1000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
1210000
heap
page read and write
1390000
heap
page read and write
C0000
unkown
page readonly
1373000
heap
page read and write
1388000
heap
page read and write
134D000
heap
page read and write
141000
unkown
page execute and read and write
12F3000
heap
page read and write
3A39000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
1334000
heap
page read and write
39F1000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
136C000
heap
page read and write
3A04000
trusted library allocation
page read and write
1352000
heap
page read and write
39F6000
trusted library allocation
page read and write
136C000
heap
page read and write
1378000
heap
page read and write
1361000
heap
page read and write
3A14000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
137C000
heap
page read and write
1333000
heap
page read and write
12E4000
heap
page read and write
137C000
heap
page read and write
39FC000
trusted library allocation
page read and write
1390000
heap
page read and write
1333000
heap
page read and write
3A01000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
3BB8000
trusted library allocation
page read and write
1388000
heap
page read and write
EF000
unkown
page write copy
1213000
trusted library allocation
page read and write
1388000
heap
page read and write
1395000
heap
page read and write
1378000
heap
page read and write
3BD5000
trusted library allocation
page read and write
36EE000
stack
page read and write
3C48000
trusted library allocation
page read and write
3A3C000
trusted library allocation
page read and write
137C000
heap
page read and write
137C000
heap
page read and write
39F3000
trusted library allocation
page read and write
1334000
heap
page read and write
3AF8000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
1373000
heap
page read and write
39F4000
trusted library allocation
page read and write
136C000
heap
page read and write
3A04000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1270000
heap
page read and write
C1000
unkown
page execute read
D90000
heap
page read and write
3A1C000
trusted library allocation
page read and write
1378000
heap
page read and write
3A04000
trusted library allocation
page read and write
3A34000
trusted library allocation
page read and write
3A20000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
39DA000
trusted library allocation
page read and write
1390000
heap
page read and write
1389000
heap
page read and write
39D1000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
3A61000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
1388000
heap
page read and write
39F0000
trusted library allocation
page read and write
134E000
heap
page read and write
1378000
heap
page read and write
3A04000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
12BD000
heap
page read and write
1377000
heap
page read and write
3A0B000
trusted library allocation
page read and write
1388000
heap
page read and write
3A04000
trusted library allocation
page read and write
3A66000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
1361000
heap
page read and write
137C000
heap
page read and write
39E5000
trusted library allocation
page read and write
39FB000
trusted library allocation
page read and write
12F3000
heap
page read and write
39FB000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
137C000
heap
page read and write
3A04000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
1332000
heap
page read and write
31FF000
stack
page read and write
12B9000
heap
page read and write
3A1B000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
1342000
heap
page read and write
39E4000
trusted library allocation
page read and write
39E8000
trusted library allocation
page read and write
1388000
heap
page read and write
136C000
heap
page read and write
39F3000
trusted library allocation
page read and write
137C000
heap
page read and write
1388000
heap
page read and write
39E4000
trusted library allocation
page read and write
1388000
heap
page read and write
3A13000
trusted library allocation
page read and write
144000
unkown
page readonly
1388000
heap
page read and write
3A06000
trusted library allocation
page read and write
39FD000
trusted library allocation
page read and write
3A25000
trusted library allocation
page read and write
3A34000
trusted library allocation
page read and write
C1000
unkown
page execute read
12F0000
heap
page read and write
1360000
heap
page read and write
3A04000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
135F000
heap
page read and write
1370000
heap
page read and write
3A06000
trusted library allocation
page read and write
12F0000
heap
page read and write
39E9000
trusted library allocation
page read and write
3A55000
trusted library allocation
page read and write
1395000
heap
page read and write
45ED000
trusted library allocation
page read and write
136A000
heap
page read and write
39D5000
trusted library allocation
page read and write
3A13000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
138A000
heap
page read and write
C0000
unkown
page readonly
3A04000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
3A18000
trusted library allocation
page read and write
3AD1000
heap
page read and write
39EF000
trusted library allocation
page read and write
1334000
heap
page read and write
39D8000
trusted library allocation
page read and write
3A09000
trusted library allocation
page read and write
137C000
heap
page read and write
1334000
heap
page read and write
39EC000
trusted library allocation
page read and write
39EC000
trusted library allocation
page read and write
3B80000
trusted library allocation
page read and write
E4000
unkown
page readonly
39F4000
trusted library allocation
page read and write
1373000
heap
page read and write
3A36000
trusted library allocation
page read and write
120D000
stack
page read and write
137C000
heap
page read and write
3A01000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
12F1000
heap
page read and write
39E4000
trusted library allocation
page read and write
135B000
heap
page read and write
135A000
heap
page read and write
159F000
stack
page read and write
E4000
unkown
page readonly
13AE000
stack
page read and write
1377000
heap
page read and write
137C000
heap
page read and write
137C000
heap
page read and write
39CF000
stack
page read and write
39D5000
trusted library allocation
page read and write
136B000
heap
page read and write
127E000
heap
page read and write
3A04000
trusted library allocation
page read and write
3A24000
trusted library allocation
page read and write
134F000
heap
page read and write
39E3000
trusted library allocation
page read and write
12CE000
heap
page read and write
39D4000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
30FE000
stack
page read and write
134A000
heap
page read and write
39F4000
trusted library allocation
page read and write
136C000
heap
page read and write
3A34000
trusted library allocation
page read and write
C1000
unkown
page execute read
3A04000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
39FC000
trusted library allocation
page read and write
1395000
heap
page read and write
3A09000
trusted library allocation
page read and write
3A1A000
trusted library allocation
page read and write
3A08000
trusted library allocation
page read and write
1342000
heap
page read and write
39D7000
trusted library allocation
page read and write
1290000
remote allocation
page read and write
3A14000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1378000
heap
page read and write
1342000
heap
page read and write
3A52000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
135D000
heap
page read and write
1390000
heap
page read and write
3A45000
trusted library allocation
page read and write
133D000
heap
page read and write
459000
remote allocation
page execute and read and write
3A6D000
trusted library allocation
page read and write
D0B000
stack
page read and write
37EF000
stack
page read and write
3C6F000
trusted library allocation
page read and write
3A44000
trusted library allocation
page read and write
358D000
stack
page read and write
159F000
stack
page read and write
1388000
heap
page read and write
3ADF000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
3A1B000
trusted library allocation
page read and write
134E000
heap
page read and write
3A04000
trusted library allocation
page read and write
137C000
heap
page read and write
12F3000
heap
page read and write
1378000
heap
page read and write
3A18000
trusted library allocation
page read and write
E4000
unkown
page readonly
1390000
heap
page read and write
3A04000
trusted library allocation
page read and write
1388000
heap
page read and write
137C000
heap
page read and write
137C000
heap
page read and write
39F4000
trusted library allocation
page read and write
134F000
heap
page read and write
149F000
stack
page read and write
3A75000
trusted library allocation
page read and write
1290000
remote allocation
page read and write
39DE000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3A04000
trusted library allocation
page read and write
3A12000
trusted library allocation
page read and write
1378000
heap
page read and write
137C000
heap
page read and write
3A04000
trusted library allocation
page read and write
1391000
heap
page read and write
38C0000
heap
page read and write
39EB000
trusted library allocation
page read and write
3A2C000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
FBC000
stack
page read and write
39F3000
trusted library allocation
page read and write
3A38000
trusted library allocation
page read and write
39E8000
trusted library allocation
page read and write
3A01000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
130C000
heap
page read and write
3B30000
trusted library allocation
page read and write
39D5000
trusted library allocation
page read and write
136C000
heap
page read and write
3AD0000
heap
page read and write
1388000
heap
page read and write
3A45000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
384E000
stack
page read and write
39E4000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
EF000
unkown
page write copy
135E000
heap
page read and write
EF000
unkown
page write copy
1342000
heap
page read and write
3A2A000
trusted library allocation
page read and write
1378000
heap
page read and write
15DE000
stack
page read and write
39DA000
trusted library allocation
page read and write
39F4000
trusted library allocation
page read and write
12CE000
heap
page read and write
10FA000
stack
page read and write
3A19000
trusted library allocation
page read and write
40DC000
trusted library allocation
page read and write
39EC000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
12A8000
heap
page read and write
D95000
heap
page read and write
3A41000
trusted library allocation
page read and write
3A34000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
136C000
heap
page read and write
3A34000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1388000
heap
page read and write
39F1000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
144000
unkown
page readonly
3A08000
trusted library allocation
page read and write
3BA8000
trusted library allocation
page read and write
2F7D000
stack
page read and write
E4000
unkown
page readonly
39F4000
trusted library allocation
page read and write
144000
unkown
page readonly
1353000
heap
page read and write
39EB000
trusted library allocation
page read and write
3A1C000
trusted library allocation
page read and write
136A000
heap
page read and write
137D000
heap
page read and write
3A30000
trusted library allocation
page read and write
D97000
heap
page read and write
39FB000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1357000
heap
page read and write
1388000
heap
page read and write
D80000
heap
page read and write
3A34000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
39D1000
trusted library allocation
page read and write
1395000
heap
page read and write
1390000
heap
page read and write
137C000
heap
page read and write
368E000
stack
page read and write
3A72000
trusted library allocation
page read and write
3AD9000
trusted library allocation
page read and write
3A34000
trusted library allocation
page read and write
1388000
heap
page read and write
3A70000
trusted library allocation
page read and write
136A000
heap
page read and write
39F4000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1389000
heap
page read and write
3A21000
trusted library allocation
page read and write
3A6A000
trusted library allocation
page read and write
3A02000
trusted library allocation
page read and write
136C000
heap
page read and write
1359000
heap
page read and write
16DE000
stack
page read and write
D70000
heap
page read and write
1378000
heap
page read and write
134A000
heap
page read and write
39F4000
trusted library allocation
page read and write
12BD000
heap
page read and write
39F4000
trusted library allocation
page read and write
39DE000
trusted library allocation
page read and write
127A000
heap
page read and write
3A20000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
3A14000
trusted library allocation
page read and write
1378000
heap
page read and write
39FE000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1342000
heap
page read and write
1378000
heap
page read and write
3B10000
trusted library allocation
page read and write
39EC000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1358000
heap
page read and write
137C000
heap
page read and write
137D000
heap
page read and write
1391000
heap
page read and write
39F3000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1390000
heap
page read and write
1342000
heap
page read and write
13C0000
heap
page read and write
1352000
heap
page read and write
3A04000
trusted library allocation
page read and write
3A06000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
39DC000
trusted library allocation
page read and write
3A39000
trusted library allocation
page read and write
1355000
heap
page read and write
39E8000
trusted library allocation
page read and write
EBC000
stack
page read and write
137C000
heap
page read and write
39F4000
trusted library allocation
page read and write
137C000
heap
page read and write
2FBE000
stack
page read and write
3A05000
trusted library allocation
page read and write
1361000
heap
page read and write
1220000
heap
page read and write
39F4000
trusted library allocation
page read and write
1359000
heap
page read and write
39FD000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
3A32000
trusted library allocation
page read and write
1388000
heap
page read and write
12F3000
heap
page read and write
1390000
heap
page read and write
DDE000
stack
page read and write
3A04000
trusted library allocation
page read and write
39FF000
trusted library allocation
page read and write
3A1F000
trusted library allocation
page read and write
137C000
heap
page read and write
39F4000
trusted library allocation
page read and write
137D000
heap
page read and write
1389000
heap
page read and write
1388000
heap
page read and write
1240000
heap
page read and write
39F4000
trusted library allocation
page read and write
C0000
unkown
page readonly
3A13000
trusted library allocation
page read and write
1395000
heap
page read and write
39E4000
trusted library allocation
page read and write
39D0000
trusted library allocation
page read and write
39E3000
trusted library allocation
page read and write
1388000
heap
page read and write
3A2F000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
12A0000
heap
page read and write
1361000
heap
page read and write
3A04000
trusted library allocation
page read and write
3A01000
trusted library allocation
page read and write
135A000
heap
page read and write
39F1000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
134F000
heap
page read and write
1230000
heap
page read and write
3A04000
trusted library allocation
page read and write
1290000
remote allocation
page read and write
3A04000
trusted library allocation
page read and write
3A0D000
trusted library allocation
page read and write
39E4000
trusted library allocation
page read and write
133D000
heap
page read and write
1395000
heap
page read and write
3A04000
trusted library allocation
page read and write
39DD000
trusted library allocation
page read and write
3A2E000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
C0000
unkown
page readonly
3A27000
trusted library allocation
page read and write
39F3000
trusted library allocation
page read and write
C1000
unkown
page execute read
136A000
heap
page read and write
39D1000
trusted library allocation
page read and write
1342000
heap
page read and write
30BE000
stack
page read and write
1390000
heap
page read and write
12E4000
heap
page read and write
3A1B000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
3A04000
trusted library allocation
page read and write
1389000
heap
page read and write
There are 463 hidden memdumps, click here to show them.