IOC Report
baVrLvRHZY.exe

loading gif

Files

File Path
Type
Category
Malicious
baVrLvRHZY.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_baVrLvRHZY.exe_293258f491b43234cfed95b48a8988732956b6_8e2e74b8_15b024d6-5631-43e3-9e61-f42da62bd43b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_baVrLvRHZY.exe_aad8d77e4466af63bc3e88c343230884b657c5b_8e2e74b8_22fbda1c-b214-4d6a-94b5-6e50f358672c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_baVrLvRHZY.exe_f2c3ece052b999f51da42e75b5f7865f37d5f_8e2e74b8_345b9d0b-7892-4c39-819e-2de6257e2101\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B7C.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 14:43:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C68.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C98.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EE7.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 14:43:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA13A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD8F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB88A.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 1 14:43:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB994.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB9F3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\baVrLvRHZY.exe
"C:\Users\user\Desktop\baVrLvRHZY.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1476
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1524
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1636

URLs

Name
IP
Malicious
accountasifkwosov.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
incredibleextedwj.shop
malicious
liabilitynighstjsko.shop
malicious
https://accountasifkwosov.shop/hb
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://accountasifkwosov.shop/&b
unknown
https://duckduckgo.com/ac/?q=
unknown
https://accountasifkwosov.shop/apiGecko)
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://accountasifkwosov.shop/RbS1M
unknown
https://accountasifkwosov.shop:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://accountasifkwosov.shop/Lb
unknown
https://accountasifkwosov.shop/ubt1b
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://accountasifkwosov.shop/apiaH
unknown
https://www.mozilla.or
unknown
https://accountasifkwosov.shop/~b
unknown
https://accountasifkwosov.shop/
unknown
https://accountasifkwosov.shop/res01
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://accountasifkwosov.shop/apiw8
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://accountasifkwosov.shop/S=
unknown
https://accountasifkwosov.shop/apid
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://accountasifkwosov.shop/apir
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://accountasifkwosov.shop/api
172.67.141.11
https://accountasifkwosov.shop/apiaoP
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
accountasifkwosov.shop
172.67.141.11
malicious

IPs

IP
Domain
Country
Malicious
172.67.141.11
accountasifkwosov.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
ProgramId
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
FileId
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
LowerCaseLongPath
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
LongPathHash
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
Name
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
OriginalFileName
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
Publisher
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
Version
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
BinFileVersion
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
BinaryType
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
ProductName
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
ProductVersion
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
LinkDate
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
BinProductVersion
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
AppxPackageFullName
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
AppxPackageRelativeId
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
Size
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
Language
\REGISTRY\A\{cfbe5b5f-166b-d8cf-1281-c0937c784e4c}\Root\InventoryApplicationFile\bavrlvrhzy.exe|97d1c4eaec870a0f
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
4221000
trusted library allocation
page read and write
4214000
trusted library allocation
page read and write
1CE6000
heap
page read and write
4229000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
1A85000
heap
page read and write
4251000
trusted library allocation
page read and write
4263000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
1A80000
heap
page read and write
4230000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
9B000
stack
page read and write
40AF000
stack
page read and write
4258000
trusted library allocation
page read and write
1A0D000
unkown
page read and write
4266000
trusted library allocation
page read and write
4237000
trusted library allocation
page read and write
4300000
heap
page read and write
4211000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
1CCA000
heap
page read and write
4222000
trusted library allocation
page read and write
41FE000
stack
page read and write
4241000
trusted library allocation
page read and write
3C1F000
stack
page read and write
1CC8000
heap
page read and write
4234000
trusted library allocation
page read and write
1C5A000
heap
page read and write
420E000
trusted library allocation
page read and write
4207000
trusted library allocation
page read and write
401000
unkown
page execute read
1A0F000
unkown
page readonly
4249000
trusted library allocation
page read and write
4208000
trusted library allocation
page read and write
4237000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
4263000
trusted library allocation
page read and write
1CD5000
heap
page read and write
424E000
trusted library allocation
page read and write
4248000
trusted library allocation
page read and write
1CE4000
heap
page read and write
4216000
trusted library allocation
page read and write
1CE0000
heap
page read and write
4227000
trusted library allocation
page read and write
4276000
trusted library allocation
page read and write
3ADE000
stack
page read and write
40FE000
stack
page read and write
3830000
remote allocation
page read and write
1D34000
heap
page read and write
425D000
trusted library allocation
page read and write
4268000
trusted library allocation
page read and write
4268000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
420A000
trusted library allocation
page read and write
426F000
trusted library allocation
page read and write
1D4E000
heap
page read and write
36EF000
stack
page read and write
1CCA000
heap
page read and write
421F000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
42B6000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
1A7E000
stack
page read and write
421F000
trusted library allocation
page read and write
1F0000
heap
page read and write
420E000
trusted library allocation
page read and write
1D4B000
heap
page read and write
4241000
trusted library allocation
page read and write
1CE0000
heap
page read and write
1BB0000
direct allocation
page execute and read and write
420B000
trusted library allocation
page read and write
426A000
trusted library allocation
page read and write
423C000
trusted library allocation
page read and write
4237000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
4226000
trusted library allocation
page read and write
1D4E000
heap
page read and write
4221000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
1D37000
heap
page read and write
4205000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
425E000
trusted library allocation
page read and write
4214000
trusted library allocation
page read and write
455F000
stack
page read and write
4712000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
1CE3000
heap
page read and write
3FAE000
stack
page read and write
3B1E000
stack
page read and write
4244000
trusted library allocation
page read and write
4202000
trusted library allocation
page read and write
4207000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
4250000
trusted library allocation
page read and write
1CE6000
heap
page read and write
4223000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
426D000
trusted library allocation
page read and write
4242000
trusted library allocation
page read and write
4215000
trusted library allocation
page read and write
1CE6000
heap
page read and write
420A000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
425A000
trusted library allocation
page read and write
197000
stack
page read and write
433E000
trusted library allocation
page read and write
1D35000
heap
page read and write
1CCA000
heap
page read and write
4201000
trusted library allocation
page read and write
43AE000
trusted library allocation
page read and write
1C5E000
heap
page read and write
4211000
trusted library allocation
page read and write
422F000
trusted library allocation
page read and write
4236000
trusted library allocation
page read and write
423E000
trusted library allocation
page read and write
1CCA000
heap
page read and write
4205000
trusted library allocation
page read and write
1CD5000
heap
page read and write
4220000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
428F000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
4326000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
4307000
trusted library allocation
page read and write
1D4C000
heap
page read and write
1D4E000
heap
page read and write
4301000
heap
page read and write
4237000
trusted library allocation
page read and write
1CE0000
heap
page read and write
43E6000
trusted library allocation
page read and write
4276000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
426E000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
1C90000
heap
page read and write
1CE6000
heap
page read and write
4259000
trusted library allocation
page read and write
428D000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
428D000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
1CD5000
heap
page read and write
428D000
trusted library allocation
page read and write
3830000
remote allocation
page read and write
4232000
trusted library allocation
page read and write
428A000
trusted library allocation
page read and write
1CE0000
heap
page read and write
4269000
trusted library allocation
page read and write
1CE6000
heap
page read and write
421A000
trusted library allocation
page read and write
430D000
trusted library allocation
page read and write
1D4E000
heap
page read and write
4229000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
1CE3000
heap
page read and write
4C1F000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
448000
unkown
page execute and read and write
1A30000
heap
page read and write
4268000
trusted library allocation
page read and write
4215000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
389E000
stack
page read and write
422E000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
4247000
trusted library allocation
page read and write
425A000
trusted library allocation
page read and write
419000
unkown
page write copy
425F000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
421B000
trusted library allocation
page read and write
4227000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
42B6000
trusted library allocation
page read and write
1CD5000
heap
page read and write
1D4C000
heap
page read and write
421C000
trusted library allocation
page read and write
421A000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
4700000
heap
page read and write
424B000
trusted library allocation
page read and write
42B6000
trusted library allocation
page read and write
400000
unkown
page readonly
4220000
trusted library allocation
page read and write
1D4B000
heap
page read and write
4257000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
1E4F000
stack
page read and write
1A0F000
unkown
page readonly
42B6000
trusted library allocation
page read and write
459E000
trusted library allocation
page read and write
1CD5000
heap
page read and write
4247000
trusted library allocation
page read and write
420A000
trusted library allocation
page read and write
420E000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
372E000
stack
page read and write
5138000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
422D000
trusted library allocation
page read and write
1CE6000
heap
page read and write
420D000
trusted library allocation
page read and write
4476000
trusted library allocation
page read and write
422C000
trusted library allocation
page read and write
4278000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
4242000
trusted library allocation
page read and write
426D000
trusted library allocation
page read and write
4215000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
4204000
trusted library allocation
page read and write
1CE3000
heap
page read and write
4220000
trusted library allocation
page read and write
4252000
trusted library allocation
page read and write
4237000
trusted library allocation
page read and write
39DD000
stack
page read and write
426D000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
425C000
trusted library allocation
page read and write
4226000
trusted library allocation
page read and write
1D4C000
heap
page read and write
3850000
heap
page read and write
1D4C000
heap
page read and write
4239000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
1CCA000
heap
page read and write
43D6000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
1C10000
heap
page read and write
1CD5000
heap
page read and write
4242000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
4248000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
4282000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
445E000
stack
page read and write
399F000
stack
page read and write
4257000
trusted library allocation
page read and write
4247000
trusted library allocation
page read and write
428D000
trusted library allocation
page read and write
1D3D000
heap
page read and write
4268000
trusted library allocation
page read and write
3830000
remote allocation
page read and write
4246000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
1C00000
heap
page read and write
421B000
trusted library allocation
page read and write
382D000
stack
page read and write
4200000
trusted library allocation
page read and write
4282000
trusted library allocation
page read and write
428F000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
4263000
trusted library allocation
page read and write
1C64000
heap
page execute and read and write
4210000
trusted library allocation
page read and write
422D000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
1D4B000
heap
page read and write
1D4E000
heap
page read and write
4246000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
420E000
trusted library allocation
page read and write
426C000
trusted library allocation
page read and write
420E000
trusted library allocation
page read and write
423C000
trusted library allocation
page read and write
1D39000
heap
page read and write
423E000
trusted library allocation
page read and write
1CE2000
heap
page read and write
412000
unkown
page readonly
4208000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
420D000
trusted library allocation
page read and write
4599000
trusted library allocation
page read and write
4236000
trusted library allocation
page read and write
1C00000
direct allocation
page read and write
1A87000
heap
page read and write
4271000
trusted library allocation
page read and write
1CE0000
heap
page read and write
4220000
trusted library allocation
page read and write
4237000
trusted library allocation
page read and write
4216000
trusted library allocation
page read and write
1C50000
heap
page read and write
1BAE000
stack
page read and write
422C000
trusted library allocation
page read and write
1D40000
heap
page read and write
4220000
trusted library allocation
page read and write
43DE000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
There are 311 hidden memdumps, click here to show them.