IOC Report
setupx 2.exe1.exe

loading gif

Files

File Path
Type
Category
Malicious
setupx 2.exe1.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_setupx 2.exe1.ex_b960bcf5c1ad9c718bf922e3d60b4e76a167a2d_a301da1a_86186d1a-3de1-4e84-b5f3-cb69f66ea0fb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1315.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 13 12:33:31 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1410.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER147F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setupx 2.exe1.exe
"C:\Users\user\Desktop\setupx 2.exe1.exe"
malicious
C:\Users\user\Desktop\setupx 2.exe1.exe
"C:\Users\user\Desktop\setupx 2.exe1.exe"
malicious
C:\Users\user\Desktop\setupx 2.exe1.exe
"C:\Users\user\Desktop\setupx 2.exe1.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6724 -s 692

URLs

Name
IP
Malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://citydisco.bet:443/gdJIS
unknown
mrodularmall.top/aNzS
https://duckduckgo.com/ac/?q=
unknown
https://citydisco.bet/5
unknown
bugildbett.top/bAuz
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
jowinjoinery.icu/bdWUa
legenassedk.top/bdpWO
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
citydisco.bet/gdJIS
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
featureccus.shop/bdMAn
https://www.ecosia.org/newtab/v20
unknown
htardwarehu.icu/Sbdsa
https://citydisco.bet/
unknown
https://citydisco.bet/0l&1&
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://citydisco.bet:443/gdJISP
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://citydisco.bet/gdJIS
188.114.96.3
https://citydisco.bet/gdJISde(z
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
cjlaspcorne.icu/DbIps
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
citydisco.bet
188.114.96.3

IPs

IP
Domain
Country
Malicious
188.114.96.3
citydisco.bet
European Union

Registry

Path
Value
Malicious
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
ProgramId
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
FileId
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
LowerCaseLongPath
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
LongPathHash
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
Name
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
OriginalFileName
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
Publisher
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
Version
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
BinFileVersion
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
BinaryType
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
ProductName
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
ProductVersion
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
LinkDate
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
BinProductVersion
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
AppxPackageFullName
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
AppxPackageRelativeId
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
Size
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
Language
\REGISTRY\A\{d0f4f98f-6a6f-daed-15bf-46d1095f8a83}\Root\InventoryApplicationFile\setupx 2.exe1.ex|b480ee02f2567a65
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
304A000
heap
page read and write
malicious
1AB000
unkown
page readonly
3293000
trusted library allocation
page read and write
D2A000
heap
page read and write
D4D000
heap
page read and write
120000
unkown
page readonly
3293000
trusted library allocation
page read and write
D2A000
heap
page read and write
32AB000
trusted library allocation
page read and write
D4D000
heap
page read and write
CF7000
heap
page read and write
32D0000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
D38000
heap
page read and write
7047D000
unkown
page read and write
CC0000
heap
page read and write
32C3000
trusted library allocation
page read and write
121000
unkown
page execute read
3293000
trusted library allocation
page read and write
CBA000
heap
page read and write
35C9000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
C5A000
heap
page read and write
32AB000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
D4D000
heap
page read and write
1BF000
unkown
page write copy
35B1000
trusted library allocation
page read and write
154B000
heap
page read and write
C9C000
heap
page read and write
120000
unkown
page readonly
D48000
heap
page read and write
3270000
trusted library allocation
page read and write
70476000
unkown
page readonly
3295000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
32BD000
trusted library allocation
page read and write
D45000
heap
page read and write
327B000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
1BF000
unkown
page write copy
327B000
trusted library allocation
page read and write
3701000
trusted library allocation
page read and write
D48000
heap
page read and write
3271000
trusted library allocation
page read and write
EA6000
heap
page read and write
70460000
unkown
page readonly
D4D000
heap
page read and write
3271000
trusted library allocation
page read and write
121000
unkown
page execute read
CBC000
heap
page read and write
3293000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
2BCD000
stack
page read and write
3265000
trusted library allocation
page read and write
1B6000
unkown
page write copy
3276000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
D45000
heap
page read and write
326E000
trusted library allocation
page read and write
121000
unkown
page execute read
3293000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
348E000
stack
page read and write
32C9000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
A40000
heap
page read and write
3293000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
CFB000
heap
page read and write
32F1000
trusted library allocation
page read and write
D0F000
heap
page read and write
CB7000
heap
page read and write
1AB000
unkown
page readonly
32D0000
trusted library allocation
page read and write
D4E000
heap
page read and write
330B000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
1BF000
unkown
page write copy
326A000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
1BF000
unkown
page write copy
3295000
trusted library allocation
page read and write
D4C000
heap
page read and write
121000
unkown
page execute read
3250000
trusted library allocation
page read and write
1BA000
unkown
page readonly
3293000
trusted library allocation
page read and write
D0F000
heap
page read and write
32B1000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
CF7000
heap
page read and write
1B6000
unkown
page execute and read and write
3293000
trusted library allocation
page read and write
1740000
heap
page read and write
3270000
trusted library allocation
page read and write
CFB000
heap
page read and write
D3F000
heap
page read and write
D48000
heap
page read and write
D2A000
heap
page read and write
265D000
trusted library allocation
page read and write
1BA000
unkown
page readonly
AE7000
heap
page read and write
D48000
heap
page read and write
30C1000
trusted library allocation
page execute read
3293000
trusted library allocation
page read and write
1350000
heap
page read and write
CF7000
heap
page read and write
32AA000
trusted library allocation
page read and write
1AB000
unkown
page readonly
2F9D000
stack
page read and write
3A95000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
D2A000
heap
page read and write
CAE000
heap
page read and write
CF7000
heap
page read and write
32D3000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
D48000
heap
page read and write
32D1000
trusted library allocation
page read and write
3A92000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
2D0D000
stack
page read and write
3293000
trusted library allocation
page read and write
7EB000
stack
page read and write
3268000
trusted library allocation
page read and write
C9C000
heap
page read and write
1AB000
unkown
page readonly
CBA000
heap
page read and write
328A000
trusted library allocation
page read and write
CA7000
heap
page read and write
3293000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
D4D000
heap
page read and write
309F000
stack
page read and write
3274000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
D45000
heap
page read and write
D48000
heap
page read and write
CF7000
heap
page read and write
3271000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
E8D000
stack
page read and write
3293000
trusted library allocation
page read and write
32AF000
trusted library allocation
page read and write
155D000
heap
page read and write
2E0E000
stack
page read and write
32D7000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
1BF000
unkown
page write copy
1BF000
unkown
page write copy
C8C000
heap
page read and write
2F4F000
stack
page read and write
EA0000
heap
page read and write
D4E000
heap
page read and write
3661000
trusted library allocation
page read and write
1B6000
unkown
page write copy
3273000
trusted library allocation
page read and write
120000
unkown
page readonly
3304000
trusted library allocation
page read and write
1430000
heap
page read and write
36DC000
stack
page read and write
D38000
heap
page read and write
D2A000
heap
page read and write
32D7000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
CF7000
heap
page read and write
1AB000
unkown
page readonly
3293000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
32CE000
trusted library allocation
page read and write
3592000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
AE7000
heap
page read and write
D38000
heap
page read and write
CC0000
heap
page read and write
CC0000
heap
page read and write
C40000
remote allocation
page read and write
D3B000
heap
page read and write
3293000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
1540000
heap
page read and write
3293000
trusted library allocation
page read and write
CF7000
heap
page read and write
32AB000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
D07000
heap
page read and write
120000
unkown
page readonly
3351000
heap
page read and write
32AB000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
120000
unkown
page readonly
3260000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
D49000
heap
page read and write
3300000
trusted library allocation
page read and write
D48000
heap
page read and write
30C2000
trusted library allocation
page readonly
3276000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
462000
remote allocation
page execute and read and write
3671000
trusted library allocation
page read and write
329B000
trusted library allocation
page read and write
C95000
heap
page read and write
C92000
heap
page read and write
1AB000
unkown
page readonly
2E4E000
stack
page read and write
CC0000
heap
page read and write
CC3000
heap
page read and write
1B6000
unkown
page write copy
326A000
trusted library allocation
page read and write
32A2000
trusted library allocation
page read and write
D45000
heap
page read and write
3293000
trusted library allocation
page read and write
32A5000
trusted library allocation
page read and write
CB7000
heap
page read and write
D44000
heap
page read and write
32AA000
trusted library allocation
page read and write
3FA0000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
D4C000
heap
page read and write
CB7000
heap
page read and write
CF9000
heap
page read and write
70461000
unkown
page execute read
32BB000
trusted library allocation
page read and write
3669000
trusted library allocation
page read and write
CF7000
heap
page read and write
120000
unkown
page readonly
329C000
trusted library allocation
page read and write
1BA000
unkown
page readonly
3300000
trusted library allocation
page read and write
D13000
heap
page read and write
3030000
heap
page read and write
121000
unkown
page execute read
D4D000
heap
page read and write
3293000
trusted library allocation
page read and write
D38000
heap
page read and write
C82000
heap
page read and write
D3D000
heap
page read and write
32BA000
trusted library allocation
page read and write
D3D000
heap
page read and write
32A1000
trusted library allocation
page read and write
D48000
heap
page read and write
1B7000
unkown
page read and write
3283000
trusted library allocation
page read and write
D07000
heap
page read and write
121000
unkown
page execute read
32BB000
trusted library allocation
page read and write
3283000
trusted library allocation
page read and write
C8C000
heap
page read and write
32DC000
trusted library allocation
page read and write
C40000
remote allocation
page read and write
3293000
trusted library allocation
page read and write
35E9000
trusted library allocation
page read and write
D3D000
heap
page read and write
D48000
heap
page read and write
32E4000
trusted library allocation
page read and write
CFA000
heap
page read and write
32BB000
trusted library allocation
page read and write
37DE000
stack
page read and write
CC0000
heap
page read and write
36A9000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
C40000
remote allocation
page read and write
D3A000
heap
page read and write
D4D000
heap
page read and write
3298000
trusted library allocation
page read and write
1BA000
unkown
page readonly
CAE000
heap
page read and write
330B000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
D4C000
heap
page read and write
C9C000
heap
page read and write
32D7000
trusted library allocation
page read and write
D45000
heap
page read and write
A50000
heap
page read and write
1B6000
unkown
page write copy
3293000
trusted library allocation
page read and write
32A2000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
D3D000
heap
page read and write
D14000
heap
page read and write
32B3000
trusted library allocation
page read and write
358E000
stack
page read and write
3293000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
3298000
trusted library allocation
page read and write
6EB000
stack
page read and write
C9C000
heap
page read and write
CB7000
heap
page read and write
30C0000
trusted library allocation
page readonly
3270000
trusted library allocation
page read and write
CF9000
heap
page read and write
32C2000
trusted library allocation
page read and write
D4E000
heap
page read and write
3350000
heap
page read and write
32CB000
trusted library allocation
page read and write
2CCE000
stack
page read and write
CA1000
heap
page read and write
328B000
trusted library allocation
page read and write
12FC000
stack
page read and write
D45000
heap
page read and write
D4E000
heap
page read and write
32FC000
trusted library allocation
page read and write
1B6000
unkown
page write copy
3298000
trusted library allocation
page read and write
D0A000
heap
page read and write
FFC000
stack
page read and write
D14000
heap
page read and write
3293000
trusted library allocation
page read and write
D48000
heap
page read and write
1470000
heap
page read and write
32CB000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
D4D000
heap
page read and write
3300000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
CF7000
heap
page read and write
3286000
trusted library allocation
page read and write
CAE000
heap
page read and write
329E000
trusted library allocation
page read and write
AC0000
heap
page read and write
3279000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
D38000
heap
page read and write
2B8D000
stack
page read and write
D3A000
heap
page read and write
3280000
trusted library allocation
page read and write
CBB000
heap
page read and write
3283000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
329B000
trusted library allocation
page read and write
1BA000
unkown
page readonly
3290000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
D4D000
heap
page read and write
3265000
trusted library allocation
page read and write
D45000
heap
page read and write
3273000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
329B000
trusted library allocation
page read and write
D2A000
heap
page read and write
3300000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
32A9000
trusted library allocation
page read and write
3351000
heap
page read and write
328B000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
D48000
heap
page read and write
D4D000
heap
page read and write
C93000
heap
page read and write
3293000
trusted library allocation
page read and write
CF7000
heap
page read and write
C00000
heap
page read and write
3598000
trusted library allocation
page read and write
D3C000
heap
page read and write
32C7000
trusted library allocation
page read and write
AE0000
heap
page read and write
D4E000
heap
page read and write
3258000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
D4D000
heap
page read and write
3260000
trusted library allocation
page read and write
CAE000
heap
page read and write
C92000
heap
page read and write
7047F000
unkown
page readonly
326A000
trusted library allocation
page read and write
3269000
trusted library allocation
page read and write
CBA000
heap
page read and write
3293000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
D48000
heap
page read and write
3279000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
AE5000
heap
page read and write
32A7000
trusted library allocation
page read and write
C92000
heap
page read and write
C50000
heap
page read and write
3294000
trusted library allocation
page read and write
1BA000
unkown
page readonly
D45000
heap
page read and write
328A000
trusted library allocation
page read and write
3639000
trusted library allocation
page read and write
3293000
trusted library allocation
page read and write
CC1000
heap
page read and write
There are 421 hidden memdumps, click here to show them.