IOC Report
7ITPeT3VWW.exe

loading gif

Files

File Path
Type
Category
Malicious
7ITPeT3VWW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7ITPeT3VWW.exe_392958df52fafd03bf95a85ca8f5874405d8c_a80dd0fe_e452142c-69af-4a0a-ab2a-4b2fe8a9f3ad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14A2.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Mar 29 07:59:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER154F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER157F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7ITPeT3VWW.exe
"C:\Users\user\Desktop\7ITPeT3VWW.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 1768

URLs

Name
IP
Malicious
communicationgenerwo.shop
malicious
pillowbrocccolipe.shop
malicious
enthusiasimtitleow.shop
malicious
wagonglidemonkywo.shop
malicious
worryfillvolcawoi.shop
malicious
dismissalcylinderhostw.shop
malicious
diskretainvigorousiw.shop
malicious
cleartotalfisherwo.shop
malicious
affordcharmcropwo.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://wagonglidemonkywo.shop/api$
unknown
https://wagonglidemonkywo.shop/m
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://wagonglidemonkywo.shop/apiyX
unknown
https://wagonglidemonkywo.shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://wagonglidemonkywo.shop/v
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://wagonglidemonkywo.shop/744-1-2
unknown
https://wagonglidemonkywo.shop/api
104.21.38.98
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://wagonglidemonkywo.shop/apiwyF
unknown
https://wagonglidemonkywo.shop/apio$
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://wagonglidemonkywo.shop/apiK
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
wagonglidemonkywo.shop
104.21.38.98
malicious

IPs

IP
Domain
Country
Malicious
104.21.38.98
wagonglidemonkywo.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
ProgramId
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
FileId
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
LowerCaseLongPath
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
LongPathHash
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
Name
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
OriginalFileName
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
Publisher
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
Version
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
BinFileVersion
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
BinaryType
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
ProductName
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
ProductVersion
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
LinkDate
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
BinProductVersion
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
AppxPackageFullName
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
AppxPackageRelativeId
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
Size
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
Language
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2190000
direct allocation
page execute and read and write
malicious
2DE3000
trusted library allocation
page read and write
8C0000
heap
page read and write
2DF8000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
2F2C000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
2D75000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
2D9A000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
86A000
heap
page read and write
2D95000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
2E15000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2DCE000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
647000
heap
page read and write
2DF4000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
8D3000
heap
page read and write
2E22000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
8EC000
heap
page read and write
2F5F000
trusted library allocation
page read and write
2DEA000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2E15000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
8EC000
heap
page read and write
2D95000
trusted library allocation
page read and write
78F000
stack
page read and write
2D94000
trusted library allocation
page read and write
85C000
heap
page read and write
2E10000
trusted library allocation
page read and write
9B000
stack
page read and write
2D9D000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
640000
heap
page read and write
2DEB000
trusted library allocation
page read and write
8E8000
heap
page read and write
8EC000
heap
page read and write
8EA000
heap
page read and write
2E1F000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
8EA000
heap
page read and write
2DA3000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
2F81000
trusted library allocation
page read and write
7FE000
heap
page read and write
2360000
remote allocation
page read and write
2D95000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
645000
heap
page read and write
2DEC000
trusted library allocation
page read and write
3DC6000
trusted library allocation
page read and write
411000
unkown
page readonly
329F000
stack
page read and write
2DE7000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
8E8000
heap
page read and write
2DFF000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
2D6F000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
84E000
heap
page read and write
2DF5000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
8CF000
heap
page read and write
2D9F000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
8C4000
heap
page read and write
2DA3000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
54B000
unkown
page readonly
2D8D000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
85C000
heap
page read and write
23CE000
stack
page read and write
2D56000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
254E000
stack
page read and write
8CD000
heap
page read and write
86A000
heap
page read and write
2E27000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
8C8000
heap
page read and write
8E8000
heap
page read and write
2DE7000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
8E2000
heap
page read and write
2D62000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
8E7000
heap
page read and write
2D5A000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2EFA000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
86D000
heap
page read and write
2DE3000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
8C0000
heap
page read and write
2F89000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
233D000
stack
page read and write
8C8000
heap
page read and write
2380000
heap
page read and write
2D9D000
trusted library allocation
page read and write
2360000
remote allocation
page read and write
21E0000
direct allocation
page read and write
447000
unkown
page execute and read and write
2DA3000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
630000
heap
page read and write
2D9D000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
8ED000
heap
page read and write
2DF3000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2B0E000
stack
page read and write
2E35000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
8EA000
heap
page read and write
2DEC000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
24CD000
stack
page read and write
2D9D000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
2E33000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2F3C000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
2D97000
trusted library allocation
page read and write
41A000
unkown
page readonly
2E4E000
trusted library allocation
page read and write
2F7D000
trusted library allocation
page read and write
7CE000
stack
page read and write
2D74000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
7F0000
heap
page read and write
2DFD000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
8EA000
heap
page read and write
2D70000
trusted library allocation
page read and write
2580000
heap
page read and write
2D72000
trusted library allocation
page read and write
86A000
heap
page read and write
2DA3000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
197000
stack
page read and write
2DFF000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2360000
remote allocation
page read and write
8E2000
heap
page read and write
2DF4000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
54B000
unkown
page readonly
2E63000
trusted library allocation
page read and write
857000
heap
page read and write
2DF8000
trusted library allocation
page read and write
278F000
stack
page read and write
2DA3000
trusted library allocation
page read and write
8ED000
heap
page read and write
2DE7000
trusted library allocation
page read and write
2E19000
trusted library allocation
page read and write
8C4000
heap
page read and write
2D95000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
857000
heap
page read and write
2C0F000
stack
page read and write
2DE7000
trusted library allocation
page read and write
7FA000
heap
page read and write
32D0000
trusted library allocation
page read and write
2D87000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
8C1000
heap
page read and write
2E4E000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
268F000
stack
page read and write
2DA3000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
84E000
heap
page read and write
2F34000
trusted library allocation
page read and write
88C000
heap
page read and write
2DF5000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
8CD000
heap
page read and write
319E000
stack
page read and write
863000
heap
page read and write
2D7C000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
2E94000
trusted library allocation
page read and write
8EC000
heap
page read and write
8ED000
heap
page read and write
2E22000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
8DD000
heap
page read and write
2D4E000
stack
page read and write
2E4E000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
223D000
stack
page read and write
2E51000
heap
page read and write
2DEC000
trusted library allocation
page read and write
8EC000
heap
page read and write
2D9D000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
2DA3000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
8E0000
heap
page read and write
2DA3000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
8EA000
heap
page read and write
8E7000
heap
page read and write
2D5C000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
38B2000
trusted library allocation
page read and write
8EE000
heap
page read and write
86D000
heap
page read and write
2D9D000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
8C8000
heap
page read and write
2E53000
trusted library allocation
page read and write
8EA000
heap
page read and write
2D70000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
446000
unkown
page write copy
8E0000
heap
page read and write
2E4E000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
80F000
heap
page execute and read and write
2DFD000
trusted library allocation
page read and write
401000
unkown
page execute read
2C4E000
stack
page read and write
2DE3000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
8D1000
heap
page read and write
2D5F000
trusted library allocation
page read and write
8E5000
heap
page read and write
83A000
heap
page read and write
2DEC000
trusted library allocation
page read and write
2D77000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
8E8000
heap
page read and write
250E000
stack
page read and write
2D95000
trusted library allocation
page read and write
86D000
heap
page read and write
2D9F000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
21E0000
heap
page read and write
9EE000
stack
page read and write
84C000
heap
page read and write
2DE7000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
85C000
heap
page read and write
2D86000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
84B000
heap
page read and write
2D79000
trusted library allocation
page read and write
2350000
heap
page read and write
1F0000
heap
page read and write
857000
heap
page read and write
2DA5000
trusted library allocation
page read and write
68E000
stack
page read and write
2DF1000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
84D000
heap
page read and write
2D9E000
trusted library allocation
page read and write
2D8D000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
400000
unkown
page readonly
2D74000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2E50000
heap
page read and write
2E4E000
trusted library allocation
page read and write
8E0000
heap
page read and write
2D8C000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2DA3000
trusted library allocation
page read and write
33A0000
heap
page read and write
2D91000
trusted library allocation
page read and write
8D1000
heap
page read and write
2D9D000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
8C8000
heap
page read and write
2D9D000
trusted library allocation
page read and write
There are 403 hidden memdumps, click here to show them.