IOC Report
CheatInjector.exe1.exe

loading gif

Files

File Path
Type
Category
Malicious
CheatInjector.exe1.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CheatInjector.ex_18edc53277a54ad32ef23d6403a351e86d161b_553f006c_7b4e9e36-885d-474d-a533-3d10ee0bac2c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D57.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 13 12:39:38 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E43.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1EC1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CheatInjector.exe1.exe
"C:\Users\user\Desktop\CheatInjector.exe1.exe"
malicious
C:\Users\user\Desktop\CheatInjector.exe1.exe
"C:\Users\user\Desktop\CheatInjector.exe1.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8744 -s 136

URLs

Name
IP
Malicious
menuedgarli.shop/AUIqn
malicious
https://jowinjoinery.icu/
unknown
https://t.me/
unknown
https://jowinjoinery.icu/bdWUa
188.114.96.3
mrodularmall.top/aNzS
https://duckduckgo.com/ac/?q=
unknown
https://web.telegram.org
unknown
https://jowinjoinery.icu/bdWUampress
unknown
bugildbett.top/bAuz
https://mrodularmall.top/8
unknown
https://featureccus.shop/bdMAn
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://mrodularmall.top/p
unknown
jowinjoinery.icu/bdWUa
legenassedk.top/bdpWO
https://menuedgarli.shop/AUIqnBHR
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://mrodularmall.top/aNzStH
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
featureccus.shop/bdMAn
https://www.ecosia.org/newtab/v20
unknown
https://mrodularmall.top/aNzSf
unknown
https://mrodularmall.top/aNzS
104.21.32.1
htardwarehu.icu/Sbdsa
https://web.telegram.orgX-Frame-OptionsALLOW-FROM
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://web.telegram.orgPersistent-AuthWWW-AuthenticateVarystel_ssid=f7cc2ea85f50737ed6_132178671729
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://duckduckgo.com/chrome_newtabv209h
unknown
https://jowinjoinery.icu/bdWUaQ
unknown
https://mrodularmall.top/aNzSR
unknown
https://mrodularmall.top/aNzSV
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://t.me/asdawfq
149.154.167.99
https://gemini.google.com/app?q=
unknown
https://mrodularmall.top/
unknown
cjlaspcorne.icu/DbIps
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
menuedgarli.shop
unknown
malicious
jowinjoinery.icu
188.114.96.3
t.me
149.154.167.99
mrodularmall.top
104.21.32.1
featureccus.shop
unknown

IPs

IP
Domain
Country
Malicious
104.21.32.1
mrodularmall.top
United States
188.114.96.3
jowinjoinery.icu
European Union
149.154.167.99
t.me
United Kingdom

Registry

Path
Value
Malicious
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
ProgramId
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
FileId
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
LowerCaseLongPath
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
LongPathHash
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
Name
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
OriginalFileName
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
Publisher
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
Version
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
BinFileVersion
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
BinaryType
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
ProductName
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
ProductVersion
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
LinkDate
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
BinProductVersion
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
AppxPackageFullName
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
AppxPackageRelativeId
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
Size
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
Language
\REGISTRY\A\{2f52e709-ac67-9b57-027b-862ffd15826c}\Root\InventoryApplicationFile\cheatinjector.ex|6ecef4e7c6d24336
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180013B9570CBE
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2789000
heap
page read and write
malicious
D72000
heap
page read and write
D75000
heap
page read and write
3691000
trusted library allocation
page read and write
36B3000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
E1E000
heap
page read and write
E08000
heap
page read and write
36C1000
trusted library allocation
page read and write
36B5000
trusted library allocation
page read and write
E54000
heap
page read and write
6E0000
heap
page read and write
E54000
heap
page read and write
37C7000
trusted library allocation
page read and write
DE4000
heap
page read and write
36D1000
trusted library allocation
page read and write
3791000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
DFD000
heap
page read and write
E2D000
heap
page read and write
E54000
heap
page read and write
3990000
heap
page read and write
DEB000
heap
page read and write
37A9000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
E54000
heap
page read and write
36C2000
trusted library allocation
page read and write
36AD000
trusted library allocation
page read and write
E54000
heap
page read and write
7D6000
unkown
page execute and read and write
37DE000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
DE1000
heap
page read and write
E54000
heap
page read and write
369A000
trusted library allocation
page read and write
36B7000
trusted library allocation
page read and write
D72000
heap
page read and write
E40000
heap
page read and write
DFE000
heap
page read and write
36BF000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
36FC000
trusted library allocation
page read and write
E54000
heap
page read and write
36B9000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
DE9000
heap
page read and write
DE9000
heap
page read and write
E54000
heap
page read and write
36F9000
trusted library allocation
page read and write
3AA4000
trusted library allocation
page read and write
36B5000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
3736000
trusted library allocation
page read and write
36FC000
trusted library allocation
page read and write
E54000
heap
page read and write
36D1000
trusted library allocation
page read and write
E21000
heap
page read and write
D96000
heap
page read and write
67D000
stack
page read and write
DED000
heap
page read and write
72E000
stack
page read and write
34A0000
trusted library allocation
page readonly
E54000
heap
page read and write
E54000
heap
page read and write
369B000
trusted library allocation
page read and write
3696000
trusted library allocation
page read and write
E54000
heap
page read and write
DE1000
heap
page read and write
E54000
heap
page read and write
E08000
heap
page read and write
37A7000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
D6C000
heap
page read and write
7D7000
unkown
page read and write
36E2000
trusted library allocation
page read and write
E54000
heap
page read and write
D40000
heap
page read and write
D72000
heap
page read and write
36B6000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
DF1000
heap
page read and write
DE0000
heap
page read and write
E54000
heap
page read and write
36B5000
trusted library allocation
page read and write
E54000
heap
page read and write
37DE000
trusted library allocation
page read and write
44A4000
trusted library allocation
page read and write
36B7000
trusted library allocation
page read and write
DA7000
heap
page read and write
36C1000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
E11000
heap
page read and write
3690000
trusted library allocation
page read and write
7DF000
unkown
page write copy
D8B000
heap
page read and write
3795000
trusted library allocation
page read and write
E54000
heap
page read and write
36B6000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
7DF000
unkown
page write copy
3798000
trusted library allocation
page read and write
E54000
heap
page read and write
E11000
heap
page read and write
36A3000
trusted library allocation
page read and write
7D6000
unkown
page write copy
36C2000
trusted library allocation
page read and write
3705000
trusted library allocation
page read and write
741000
unkown
page execute read
E54000
heap
page read and write
3E2E000
stack
page read and write
36B0000
trusted library allocation
page read and write
CEA000
heap
page read and write
36C2000
trusted library allocation
page read and write
37D8000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
D30000
heap
page read and write
E54000
heap
page read and write
36C2000
trusted library allocation
page read and write
FDF000
stack
page read and write
740000
unkown
page readonly
E12000
heap
page read and write
45F000
remote allocation
page execute and read and write
3B7D000
trusted library allocation
page read and write
E54000
heap
page read and write
36C1000
trusted library allocation
page read and write
E1E000
heap
page read and write
DF7000
heap
page read and write
DF5000
heap
page read and write
E54000
heap
page read and write
2CFD000
stack
page read and write
7CB000
unkown
page readonly
2963000
trusted library allocation
page read and write
7CB000
unkown
page readonly
36DC000
trusted library allocation
page read and write
36B4000
trusted library allocation
page read and write
D8B000
heap
page read and write
338D000
stack
page read and write
368F000
stack
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
D8D000
heap
page read and write
E54000
heap
page read and write
36DC000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
7DA000
unkown
page readonly
37D8000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
E54000
heap
page read and write
30BE000
stack
page read and write
37DE000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
E54000
heap
page read and write
DE1000
heap
page read and write
3798000
trusted library allocation
page read and write
E54000
heap
page read and write
36B9000
trusted library allocation
page read and write
324E000
stack
page read and write
36B2000
trusted library allocation
page read and write
36B5000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
3C0D000
trusted library allocation
page read and write
36C0000
trusted library allocation
page read and write
3991000
heap
page read and write
36B1000
trusted library allocation
page read and write
E54000
heap
page read and write
2E3D000
stack
page read and write
3580000
heap
page read and write
E54000
heap
page read and write
36A8000
trusted library allocation
page read and write
DF1000
heap
page read and write
36D1000
trusted library allocation
page read and write
3699000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
E11000
heap
page read and write
31BF000
stack
page read and write
36B3000
trusted library allocation
page read and write
E12000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
36F7000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
E0B000
heap
page read and write
E21000
heap
page read and write
37DE000
trusted library allocation
page read and write
E54000
heap
page read and write
D96000
heap
page read and write
DE4000
heap
page read and write
36B0000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
E1E000
heap
page read and write
DE4000
heap
page read and write
36C0000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
3798000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
36A3000
trusted library allocation
page read and write
DA8000
heap
page read and write
37DD000
trusted library allocation
page read and write
E54000
heap
page read and write
E50000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
37DE000
trusted library allocation
page read and write
36C5000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
D96000
heap
page read and write
36A0000
trusted library allocation
page read and write
36C2000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
D99000
heap
page read and write
36E6000
trusted library allocation
page read and write
E08000
heap
page read and write
D72000
heap
page read and write
E54000
heap
page read and write
DA7000
heap
page read and write
36B4000
trusted library allocation
page read and write
E54000
heap
page read and write
37D0000
trusted library allocation
page read and write
E54000
heap
page read and write
369F000
trusted library allocation
page read and write
DA7000
heap
page read and write
DF7000
heap
page read and write
E08000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
3F9A000
trusted library allocation
page read and write
E54000
heap
page read and write
37DE000
trusted library allocation
page read and write
7D6000
unkown
page write copy
36B5000
trusted library allocation
page read and write
6D0000
heap
page read and write
36C2000
trusted library allocation
page read and write
3AD5000
trusted library allocation
page read and write
7DA000
unkown
page readonly
7DA000
unkown
page readonly
37A9000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
3A9E000
trusted library allocation
page read and write
36FA000
trusted library allocation
page read and write
DFE000
heap
page read and write
37DE000
trusted library allocation
page read and write
DE0000
heap
page read and write
D6C000
heap
page read and write
E54000
heap
page read and write
37DE000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
E54000
heap
page read and write
D6A000
heap
page read and write
E1E000
heap
page read and write
34A2000
trusted library allocation
page readonly
DE4000
heap
page read and write
E11000
heap
page read and write
E2A000
heap
page read and write
36B9000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
DE4000
heap
page read and write
D90000
heap
page read and write
E54000
heap
page read and write
36E1000
trusted library allocation
page read and write
7CB000
unkown
page readonly
E54000
heap
page read and write
37A9000
trusted library allocation
page read and write
37A4000
trusted library allocation
page read and write
36E6000
trusted library allocation
page read and write
369F000
trusted library allocation
page read and write
307E000
stack
page read and write
37DE000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
E54000
heap
page read and write
3714000
trusted library allocation
page read and write
DFE000
heap
page read and write
E54000
heap
page read and write
D96000
heap
page read and write
36A4000
trusted library allocation
page read and write
D8B000
heap
page read and write
DFE000
heap
page read and write
E54000
heap
page read and write
D6C000
heap
page read and write
D5D000
heap
page read and write
E54000
heap
page read and write
D8B000
heap
page read and write
D72000
heap
page read and write
E54000
heap
page read and write
DF7000
heap
page read and write
37A9000
trusted library allocation
page read and write
E54000
heap
page read and write
37DE000
trusted library allocation
page read and write
DE9000
heap
page read and write
37DE000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
37A7000
trusted library allocation
page read and write
E54000
heap
page read and write
740000
unkown
page readonly
D8D000
heap
page read and write
7CB000
unkown
page readonly
E54000
heap
page read and write
E54000
heap
page read and write
36CE000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
E54000
heap
page read and write
37A9000
trusted library allocation
page read and write
E54000
heap
page read and write
36B4000
trusted library allocation
page read and write
E21000
heap
page read and write
36BC000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
E54000
heap
page read and write
36B3000
trusted library allocation
page read and write
3D2E000
stack
page read and write
E54000
heap
page read and write
36CB000
trusted library allocation
page read and write
E54000
heap
page read and write
36E3000
trusted library allocation
page read and write
E54000
heap
page read and write
E1E000
heap
page read and write
36BD000
trusted library allocation
page read and write
E54000
heap
page read and write
3791000
trusted library allocation
page read and write
DF1000
heap
page read and write
3691000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
D8B000
heap
page read and write
3691000
trusted library allocation
page read and write
E54000
heap
page read and write
3691000
trusted library allocation
page read and write
DA8000
heap
page read and write
D73000
heap
page read and write
37B5000
trusted library allocation
page read and write
D48000
heap
page read and write
D7C000
heap
page read and write
9DB000
stack
page read and write
36A4000
trusted library allocation
page read and write
3790000
trusted library allocation
page read and write
E54000
heap
page read and write
3704000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
37AE000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
9AE000
stack
page read and write
3798000
trusted library allocation
page read and write
DE4000
heap
page read and write
E2A000
heap
page read and write
34A1000
trusted library allocation
page execute read
7DA000
unkown
page readonly
379D000
trusted library allocation
page read and write
369D000
trusted library allocation
page read and write
E54000
heap
page read and write
DE9000
heap
page read and write
D6A000
heap
page read and write
3991000
heap
page read and write
37AD000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
36EE000
trusted library allocation
page read and write
E54000
heap
page read and write
E08000
heap
page read and write
36D1000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
37C8000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
348E000
stack
page read and write
37C9000
trusted library allocation
page read and write
36BC000
trusted library allocation
page read and write
DE4000
heap
page read and write
36C2000
trusted library allocation
page read and write
E1E000
heap
page read and write
36F4000
trusted library allocation
page read and write
D8B000
heap
page read and write
E54000
heap
page read and write
DFD000
heap
page read and write
D6A000
heap
page read and write
3700000
trusted library allocation
page read and write
D6C000
heap
page read and write
CFB000
stack
page read and write
E54000
heap
page read and write
37B0000
trusted library allocation
page read and write
3699000
trusted library allocation
page read and write
E54000
heap
page read and write
D94000
heap
page read and write
D96000
heap
page read and write
37A8000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
741000
unkown
page execute read
3791000
trusted library allocation
page read and write
3716000
trusted library allocation
page read and write
E54000
heap
page read and write
37C9000
trusted library allocation
page read and write
D96000
heap
page read and write
3798000
trusted library allocation
page read and write
D72000
heap
page read and write
D7C000
heap
page read and write
E2A000
heap
page read and write
36C2000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
3791000
trusted library allocation
page read and write
E54000
heap
page read and write
E1E000
heap
page read and write
E2A000
heap
page read and write
31E0000
remote allocation
page read and write
E54000
heap
page read and write
3C3F000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
37BC000
trusted library allocation
page read and write
E54000
heap
page read and write
36BF000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
E54000
heap
page read and write
334F000
stack
page read and write
E54000
heap
page read and write
741000
unkown
page execute read
E54000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
36B4000
trusted library allocation
page read and write
E54000
heap
page read and write
D6A000
heap
page read and write
37D8000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
CE0000
heap
page read and write
57C000
stack
page read and write
36E2000
trusted library allocation
page read and write
D8D000
heap
page read and write
E54000
heap
page read and write
36C2000
trusted library allocation
page read and write
E21000
heap
page read and write
DE9000
heap
page read and write
E54000
heap
page read and write
369F000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
36A6000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
DA8000
heap
page read and write
2DFD000
stack
page read and write
DE4000
heap
page read and write
36E2000
trusted library allocation
page read and write
D8D000
heap
page read and write
E08000
heap
page read and write
37DE000
trusted library allocation
page read and write
E54000
heap
page read and write
DFE000
heap
page read and write
36C5000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
36C2000
trusted library allocation
page read and write
2960000
heap
page read and write
DA7000
heap
page read and write
3ACC000
stack
page read and write
36B1000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
E54000
heap
page read and write
740000
unkown
page readonly
E54000
heap
page read and write
E54000
heap
page read and write
36B5000
trusted library allocation
page read and write
3795000
trusted library allocation
page read and write
E54000
heap
page read and write
CEE000
heap
page read and write
D96000
heap
page read and write
DE4000
heap
page read and write
E54000
heap
page read and write
36BF000
trusted library allocation
page read and write
36BF000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
E54000
heap
page read and write
36C1000
trusted library allocation
page read and write
7DF000
unkown
page write copy
E54000
heap
page read and write
36B5000
trusted library allocation
page read and write
DE1000
heap
page read and write
DE5000
heap
page read and write
372E000
trusted library allocation
page read and write
DF7000
heap
page read and write
E54000
heap
page read and write
3798000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
E09000
heap
page read and write
36F4000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
3798000
trusted library allocation
page read and write
3B6D000
trusted library allocation
page read and write
DE4000
heap
page read and write
37DE000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
E11000
heap
page read and write
37DE000
trusted library allocation
page read and write
7DF000
unkown
page write copy
36D1000
trusted library allocation
page read and write
E54000
heap
page read and write
E08000
heap
page read and write
E54000
heap
page read and write
DE1000
heap
page read and write
E11000
heap
page read and write
2F7E000
stack
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
37A9000
trusted library allocation
page read and write
D6A000
heap
page read and write
DF7000
heap
page read and write
E54000
heap
page read and write
37A8000
trusted library allocation
page read and write
E54000
heap
page read and write
36A2000
trusted library allocation
page read and write
E54000
heap
page read and write
36C6000
trusted library allocation
page read and write
3B75000
trusted library allocation
page read and write
D8D000
heap
page read and write
E54000
heap
page read and write
E11000
heap
page read and write
E54000
heap
page read and write
E08000
heap
page read and write
3792000
trusted library allocation
page read and write
E54000
heap
page read and write
3791000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
36B4000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
2F3D000
stack
page read and write
37DE000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
36A6000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
E54000
heap
page read and write
D96000
heap
page read and write
37C0000
trusted library allocation
page read and write
36C2000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
740000
unkown
page readonly
37DD000
trusted library allocation
page read and write
9C0000
heap
page read and write
3791000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
36B4000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
36C2000
trusted library allocation
page read and write
E54000
heap
page read and write
36E2000
trusted library allocation
page read and write
E54000
heap
page read and write
37D8000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
DA7000
heap
page read and write
36B0000
trusted library allocation
page read and write
37C9000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
D6C000
heap
page read and write
37DE000
trusted library allocation
page read and write
EDF000
stack
page read and write
E54000
heap
page read and write
E2A000
heap
page read and write
E54000
heap
page read and write
3691000
trusted library allocation
page read and write
36E2000
trusted library allocation
page read and write
7D6000
unkown
page write copy
3AF5000
trusted library allocation
page read and write
36B6000
trusted library allocation
page read and write
DEE000
heap
page read and write
31E0000
remote allocation
page read and write
3692000
trusted library allocation
page read and write
D8B000
heap
page read and write
37DE000
trusted library allocation
page read and write
34FE000
stack
page read and write
36A3000
trusted library allocation
page read and write
31E0000
remote allocation
page read and write
E54000
heap
page read and write
E21000
heap
page read and write
36DB000
trusted library allocation
page read and write
E54000
heap
page read and write
3ABD000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
3791000
trusted library allocation
page read and write
37B3000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
E54000
heap
page read and write
36B7000
trusted library allocation
page read and write
3793000
trusted library allocation
page read and write
E54000
heap
page read and write
36BF000
trusted library allocation
page read and write
36C2000
trusted library allocation
page read and write
3698000
trusted library allocation
page read and write
DE5000
heap
page read and write
36E2000
trusted library allocation
page read and write
370F000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
E08000
heap
page read and write
356E000
stack
page read and write
3693000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
37A9000
trusted library allocation
page read and write
D96000
heap
page read and write
36CB000
trusted library allocation
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
37BF000
trusted library allocation
page read and write
DE1000
heap
page read and write
DE4000
heap
page read and write
741000
unkown
page execute read
36BB000
trusted library allocation
page read and write
D72000
heap
page read and write
E54000
heap
page read and write
36B0000
trusted library allocation
page read and write
E21000
heap
page read and write
DE0000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
36B0000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
E54000
heap
page read and write
DE4000
heap
page read and write
D72000
heap
page read and write
D8B000
heap
page read and write
There are 633 hidden memdumps, click here to show them.