IOC Report
Installer64x.exe1.exe

loading gif

Files

File Path
Type
Category
Malicious
Installer64x.exe1.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Installer64x.exe_c7c4cca8971b4e367c7f72b9e75ca82c490be3f_a55bbe4c_84a80423-770a-4036-9e8d-3e4b9124b2fe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68B5.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 13 12:33:38 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6981.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69B1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Installer64x.exe1.exe
"C:\Users\user\Desktop\Installer64x.exe1.exe"
malicious
C:\Users\user\Desktop\Installer64x.exe1.exe
"C:\Users\user\Desktop\Installer64x.exe1.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7020 -s 688

URLs

Name
IP
Malicious
https://citydisco.bet/.
unknown
https://citydisco.bet:443/gdJISi
unknown
https://duckduckgo.com/ac/?q=
unknown
https://citydisco.bet/2
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500000.1&cta
unknown
bugildbett.top/bAuz
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4CbW4pDk4pbW4CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_f6f292994d7c60be109e4c185cbc03032d36d17160d4e639
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://citydisco.bet/gdJIS66/hI
unknown
https://citydisco.bet/E
unknown
citydisco.bet/gdJIS
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://citydisco.bet/ka
unknown
https://citydisco.bet/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.51/conhost.exe6
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
cjlaspcorne.icu/DbIps
https://citydisco.bet:443/gdJIS
unknown
http://185.215.113.51/conhost.exeY
unknown
mrodularmall.top/aNzS
http://185.215.113.51/a
unknown
http://185.215.113.51/conhost.exeR
unknown
http://185.215.113.51/
unknown
http://185.215.113.51/conhost.exe
unknown
https://citydisco.bet:443/gdJIS/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
http://upx.sf.net
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500
unknown
jowinjoinery.icu/bdWUa
legenassedk.top/bdpWO
https://citydisco.bet:443/gdJISsw2cld.default-release/key4.dbPK
unknown
http://185.215.113.51:80/conhost.exe
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.51/O
unknown
http://185.215.113.51/conhost.exeF
unknown
featureccus.shop/bdMAn
https://www.ecosia.org/newtab/v20
unknown
htardwarehu.icu/Sbdsa
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://185.215.113.51/x
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://citydisco.bet/gdJIS
188.114.96.3
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
https://citydisco.bet/gdJISD
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
citydisco.bet
188.114.96.3

IPs

IP
Domain
Country
Malicious
188.114.96.3
citydisco.bet
European Union
185.215.113.51
unknown
Portugal

Registry

Path
Value
Malicious
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
ProgramId
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
FileId
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
LowerCaseLongPath
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
LongPathHash
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
Name
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
OriginalFileName
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
Publisher
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
Version
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
BinFileVersion
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
BinaryType
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
ProductName
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
ProductVersion
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
LinkDate
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
BinProductVersion
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
AppxPackageFullName
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
AppxPackageRelativeId
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
Size
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
Language
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2A7C000
heap
page read and write
malicious
3C46000
trusted library allocation
page read and write
151D000
heap
page read and write
148C000
heap
page read and write
151B000
heap
page read and write
3C0E000
trusted library allocation
page read and write
10FB000
stack
page read and write
14E2000
heap
page read and write
3BBB000
trusted library allocation
page read and write
AAB000
unkown
page readonly
3BE7000
trusted library allocation
page read and write
3BB1000
trusted library allocation
page read and write
3BB6000
trusted library allocation
page read and write
ABA000
unkown
page readonly
360F000
stack
page read and write
3BCA000
trusted library allocation
page read and write
1206000
heap
page read and write
3C0E000
trusted library allocation
page read and write
3BAF000
trusted library allocation
page read and write
13A0000
remote allocation
page read and write
3BAA000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3DB3000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
3BE5000
trusted library allocation
page read and write
1515000
heap
page read and write
3BB0000
trusted library allocation
page read and write
151D000
heap
page read and write
3BEE000
trusted library allocation
page read and write
14E2000
heap
page read and write
3BD5000
trusted library allocation
page read and write
3D9A000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3BD3000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
151B000
heap
page read and write
14E5000
heap
page read and write
3C1A000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BEA000
trusted library allocation
page read and write
152E000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
402E000
stack
page read and write
11D0000
heap
page read and write
3BAA000
trusted library allocation
page read and write
3C90000
heap
page read and write
3BC1000
trusted library allocation
page read and write
3C1B000
trusted library allocation
page read and write
1472000
heap
page read and write
1517000
heap
page read and write
14E2000
heap
page read and write
3C46000
trusted library allocation
page read and write
39EE000
stack
page read and write
3BA4000
trusted library allocation
page read and write
146B000
heap
page read and write
148C000
heap
page read and write
1340000
heap
page read and write
3BC7000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
14E4000
heap
page read and write
138E000
stack
page read and write
3BBB000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
151B000
heap
page read and write
14E4000
heap
page read and write
1471000
heap
page read and write
3D90000
trusted library allocation
page read and write
3C16000
trusted library allocation
page read and write
3C46000
trusted library allocation
page read and write
38ED000
stack
page read and write
14EC000
heap
page read and write
3C0A000
trusted library allocation
page read and write
AAB000
unkown
page readonly
3BE7000
trusted library allocation
page read and write
1471000
heap
page read and write
ABF000
unkown
page write copy
3BD9000
trusted library allocation
page read and write
3BCC000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3B9F000
trusted library allocation
page read and write
3BE6000
trusted library allocation
page read and write
14D0000
heap
page read and write
3BC3000
trusted library allocation
page read and write
3C0E000
trusted library allocation
page read and write
3BE7000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
1527000
heap
page read and write
150C000
heap
page read and write
150E000
heap
page read and write
3BD1000
trusted library allocation
page read and write
3C26000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
1100000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
13C6000
heap
page read and write
3BBA000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
1517000
heap
page read and write
3BCA000
trusted library allocation
page read and write
1518000
heap
page read and write
F50000
heap
page read and write
3C3B000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
1504000
heap
page read and write
3BEE000
trusted library allocation
page read and write
1504000
heap
page read and write
152E000
heap
page read and write
148D000
heap
page read and write
A20000
unkown
page readonly
146B000
heap
page read and write
1498000
heap
page read and write
14CF000
heap
page read and write
14D1000
heap
page read and write
3BC7000
trusted library allocation
page read and write
10F0000
heap
page read and write
3BCA000
trusted library allocation
page read and write
152E000
heap
page read and write
151D000
heap
page read and write
ABF000
unkown
page write copy
3BA5000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
1517000
heap
page read and write
3C09000
trusted library allocation
page read and write
1527000
heap
page read and write
3BAA000
trusted library allocation
page read and write
3C07000
trusted library allocation
page read and write
3BC6000
trusted library allocation
page read and write
151B000
heap
page read and write
3BBB000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
150E000
heap
page read and write
3C02000
trusted library allocation
page read and write
1518000
heap
page read and write
3A02000
trusted library allocation
page readonly
3BCA000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
3BD4000
trusted library allocation
page read and write
3C46000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
3BDE000
trusted library allocation
page read and write
14E7000
heap
page read and write
3C0B000
trusted library allocation
page read and write
1517000
heap
page read and write
3BD4000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
14EC000
heap
page read and write
11ED000
heap
page read and write
3C0E000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
AB6000
unkown
page write copy
3BED000
trusted library allocation
page read and write
3BC4000
trusted library allocation
page read and write
1504000
heap
page read and write
14ED000
heap
page read and write
1517000
heap
page read and write
14E7000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
2CD5000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
1463000
heap
page read and write
45E000
remote allocation
page execute and read and write
3C31000
trusted library allocation
page read and write
1236000
heap
page read and write
3B9F000
trusted library allocation
page read and write
1510000
heap
page read and write
3BBA000
trusted library allocation
page read and write
1504000
heap
page read and write
A21000
unkown
page execute read
14FA000
heap
page read and write
150E000
heap
page read and write
3BAA000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
ABF000
unkown
page write copy
3BB7000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
133E000
stack
page read and write
3BB4000
trusted library allocation
page read and write
3BDE000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
3DCC000
stack
page read and write
AAB000
unkown
page readonly
3B91000
trusted library allocation
page read and write
12FD000
stack
page read and write
3B98000
trusted library allocation
page read and write
14E5000
heap
page read and write
150C000
heap
page read and write
3C0B000
trusted library allocation
page read and write
3BE9000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
3C01000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
3BEC000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
3E6B000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
13A0000
remote allocation
page read and write
3BFC000
trusted library allocation
page read and write
11E0000
heap
page read and write
3BAE000
trusted library allocation
page read and write
150C000
heap
page read and write
3BA4000
trusted library allocation
page read and write
1527000
heap
page read and write
3BBA000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
150E000
heap
page read and write
1504000
heap
page read and write
EFC000
stack
page read and write
3BED000
trusted library allocation
page read and write
3BEE000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3F03000
trusted library allocation
page read and write
1517000
heap
page read and write
1474000
heap
page read and write
3BEA000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
A21000
unkown
page execute read
375F000
stack
page read and write
365E000
stack
page read and write
3BCB000
trusted library allocation
page read and write
3BB7000
trusted library allocation
page read and write
3C17000
trusted library allocation
page read and write
3C02000
trusted library allocation
page read and write
3E73000
trusted library allocation
page read and write
1518000
heap
page read and write
3BBA000
trusted library allocation
page read and write
3E63000
trusted library allocation
page read and write
3B9F000
trusted library allocation
page read and write
14E7000
heap
page read and write
3BE7000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
1504000
heap
page read and write
3BCA000
trusted library allocation
page read and write
14FD000
heap
page read and write
1030000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
350D000
stack
page read and write
37AD000
stack
page read and write
3BCA000
trusted library allocation
page read and write
1490000
heap
page read and write
3BF2000
trusted library allocation
page read and write
ABA000
unkown
page readonly
3BCC000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
151B000
heap
page read and write
1230000
heap
page read and write
1504000
heap
page read and write
3BB5000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
3BD3000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
3BC6000
trusted library allocation
page read and write
151B000
heap
page read and write
14E0000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3BC6000
trusted library allocation
page read and write
1517000
heap
page read and write
3BCB000
trusted library allocation
page read and write
3BB7000
trusted library allocation
page read and write
3BC4000
trusted library allocation
page read and write
3BEB000
trusted library allocation
page read and write
150C000
heap
page read and write
3B9F000
trusted library allocation
page read and write
14E7000
heap
page read and write
3B91000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
3BD7000
trusted library allocation
page read and write
3B9F000
trusted library allocation
page read and write
3B96000
trusted library allocation
page read and write
3A00000
trusted library allocation
page readonly
3BA4000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
1430000
heap
page read and write
3BBB000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
BFC000
stack
page read and write
3BE2000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
1518000
heap
page read and write
A20000
unkown
page readonly
3C3A000
trusted library allocation
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
3BD6000
trusted library allocation
page read and write
1469000
heap
page read and write
11C0000
heap
page read and write
3BB4000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BE0000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
3BE7000
trusted library allocation
page read and write
3B9A000
trusted library allocation
page read and write
1517000
heap
page read and write
14D1000
heap
page read and write
3BCA000
trusted library allocation
page read and write
AB7000
unkown
page read and write
3BE9000
trusted library allocation
page read and write
14CF000
heap
page read and write
3BBA000
trusted library allocation
page read and write
3BC6000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
3BBE000
trusted library allocation
page read and write
3C46000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
1471000
heap
page read and write
3D92000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
1518000
heap
page read and write
1517000
heap
page read and write
14E5000
heap
page read and write
3BA4000
trusted library allocation
page read and write
3BE2000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BE9000
trusted library allocation
page read and write
3BA5000
trusted library allocation
page read and write
1490000
heap
page read and write
3C31000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
150C000
heap
page read and write
14EC000
heap
page read and write
3BC6000
trusted library allocation
page read and write
3BD6000
trusted library allocation
page read and write
146D000
heap
page read and write
38AE000
stack
page read and write
3BBB000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
ABA000
unkown
page readonly
1518000
heap
page read and write
3DEB000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
ABA000
unkown
page readonly
1410000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3C10000
trusted library allocation
page read and write
1518000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3C2B000
trusted library allocation
page read and write
151B000
heap
page read and write
1504000
heap
page read and write
1504000
heap
page read and write
14EC000
heap
page read and write
3BF2000
trusted library allocation
page read and write
A20000
unkown
page readonly
3BBB000
trusted library allocation
page read and write
3BF2000
trusted library allocation
page read and write
1517000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3BA4000
trusted library allocation
page read and write
150C000
heap
page read and write
3BCA000
trusted library allocation
page read and write
1517000
heap
page read and write
3D94000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
152E000
heap
page read and write
A20000
unkown
page readonly
148E000
heap
page read and write
AB6000
unkown
page write copy
3BF4000
trusted library allocation
page read and write
3DCB000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3BE5000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BBF000
trusted library allocation
page read and write
1527000
heap
page read and write
3BCA000
trusted library allocation
page read and write
AAB000
unkown
page readonly
3BBB000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
3C0E000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
140E000
stack
page read and write
151D000
heap
page read and write
A21000
unkown
page execute read
3BBA000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
3A01000
trusted library allocation
page execute read
13A0000
remote allocation
page read and write
3BC1000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BBF000
trusted library allocation
page read and write
150E000
heap
page read and write
3C3B000
trusted library allocation
page read and write
AB6000
unkown
page execute and read and write
340E000
stack
page read and write
3BCA000
trusted library allocation
page read and write
3BB7000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
3BF7000
trusted library allocation
page read and write
14DD000
heap
page read and write
3BC1000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
13C0000
heap
page read and write
3760000
trusted library allocation
page read and write
1504000
heap
page read and write
3BB7000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3BE8000
trusted library allocation
page read and write
3BB6000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
1499000
heap
page read and write
150E000
heap
page read and write
3BEB000
trusted library allocation
page read and write
1500000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
151A000
heap
page read and write
3BAB000
trusted library allocation
page read and write
AB6000
unkown
page write copy
14DD000
heap
page read and write
1517000
heap
page read and write
3C27000
trusted library allocation
page read and write
3BA6000
trusted library allocation
page read and write
3BCA000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
150E000
heap
page read and write
3BAA000
trusted library allocation
page read and write
11DB000
heap
page read and write
3BF6000
trusted library allocation
page read and write
47A1000
trusted library allocation
page read and write
150E000
heap
page read and write
148C000
heap
page read and write
3BDB000
trusted library allocation
page read and write
14FF000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3E2C000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
3BC7000
trusted library allocation
page read and write
ABF000
unkown
page write copy
3BCC000
trusted library allocation
page read and write
3BBA000
trusted library allocation
page read and write
DAB000
stack
page read and write
148C000
heap
page read and write
3BCA000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
1517000
heap
page read and write
3E3B000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
4299000
trusted library allocation
page read and write
A21000
unkown
page execute read
1070000
heap
page read and write
330D000
stack
page read and write
148E000
heap
page read and write
3BAF000
trusted library allocation
page read and write
3BA4000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
143A000
heap
page read and write
There are 466 hidden memdumps, click here to show them.