IOC Report
23bGlBtTiX.exe

loading gif

Files

File Path
Type
Category
Malicious
23bGlBtTiX.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Costura\0356CB2390ED0D212B1CEB25ED194726\64\magick.native-q8-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\23bGlBtTiX.exe
"C:\Users\user\Desktop\23bGlBtTiX.exe"
malicious

URLs

Name
IP
Malicious
http://foo/Themes/ColorPicker/ColorPalette.xaml
unknown
http://foo/bar/themes/splitview.baml
unknown
http://defaultcontainer/MahApps.Metro;component/styles/themes/dark.blue.xaml
unknown
http://foo/styles/themes/light.emerald.xaml
unknown
https://raym.app/rcp/resources/12.0.0/demos/Rayman_2_Demo_2.zip
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/WindowButtonCommands.xaml
unknown
http://foo/bar/styles/controls.listbox.baml0
unknown
http://foo/styles/themes/light.indigo.xaml
unknown
https://nlog-project.org/
unknown
http://foo/Themes/SplitButton.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/ColorPicker/ColorPalette.xaml
unknown
https://steamcommunity.com/groups/RaymanControlPanel/discussions/0/1812044473314212117/
unknown
http://foo/Themes/TransitioningContentControl.xaml
unknown
http://foo/styles/themes/light.mauve.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/styles/themes/light.violet.xaml
unknown
https://raym.app/rcp/resources/12.0.0/utilities/r1/raykit/CLIENT.EXE
unknown
http://foo/bar/themes/contentcontrolex.baml
unknown
http://foo/styles/themes/dark.violet.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/Pivot.xaml
unknown
https://www.gog.com/game/rayman_3_hoodlum_havoc
unknown
http://defaultcontainer/MahApps.Metro;component/styles/themes/light.mauve.xaml
unknown
https://raym.app/rcp/resources/12.0.0/utilities/Vhttps://raym.app/rcp/resources/12.0.0/mods/Xhttps:/
unknown
http://foo/styles/themes/light.sienna.xaml
unknown
http://foo/bar/themes/hamburgermenutemplate.baml
unknown
https://raym.app/rcp/resources/12.0.0/games/PrintStudio1.zipyhttps://raym.app/rcp/resources/12.0.0/g
unknown
http://foo/bar/themes/numericupdown.baml
unknown
http://foo/styles/themes/light.green.xaml
unknown
http://foo/Themes/ToggleSwitch.xaml
unknown
http://foo/bar/styles/themes/light.sienna.baml
unknown
http://foo/styles/themes/dark.teal.xaml
unknown
https://raym.app/rcp/resources/12.0.0/utilities/r1/CompleteOST.zip
unknown
http://foo/Themes/Dialogs/BaseMetroDialog.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/Dialogs/BaseMetroDialog.xaml
unknown
http://foo/bar/styles/themes/dark.violet.baml
unknown
http://foo/Themes/MetroTabControl.xaml
unknown
http://foo/bar/styles/themes/dark.purple.baml
unknown
http://foo/Themes/ProgressRing.xaml
unknown
http://foo/styles/themes/light.magenta.xaml
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://raym.app/rcp/resources/12.0.0/demos/R3_Demo_1.zip
unknown
https://gamejolt.com/games/globoxmoment/428585#Globox
unknown
https://github.com/punker76/MahApps.Metro.SimpleChildWindow.git
unknown
http://foo/Themes/SplitView.xaml
unknown
https://gamejolt.com/games/rayman_bowling_2/532563
unknown
http://foo/bar/styles/themes/light.taupe.baml
unknown
http://foo/bar/themes/pivot.baml
unknown
http://foo/bar/themes/tile.baml
unknown
https://raym.app/rcp/resources/12.0.0/mods/rrr/RRR_Patched_Steam.zip
unknown
https://raym.app/rcp/resources/12.0.0/utilities/ro/Updater.zip1RaymanOriginspc_1.02.exe-Downloading
unknown
http://foo/bar/styles/themes/dark.magenta.baml
unknown
https://gamebanana.com/apiv11/Mod/Multi?_csvRowIds=
unknown
https://www.gog.com/game/rayman_2_the_great_escape
unknown
https://raym.app/maps/2https://raym.app/maps_r1/
unknown
http://foo/bar/themes/metrowindow.baml
unknown
http://foo/bar/styles/themes/dark.taupe.baml
unknown
http://foo/styles/themes/dark.purple.xaml
unknown
http://foo/bar/themes/colorpicker/colorpicker.baml
unknown
https://www.nuget.org/packages/NLog.Web.AspNetCore
unknown
http://foo/bar/styles/themes/light.indigo.baml
unknown
http://foo/styles/themes/dark.yellow.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/styles/themes/dark.emerald.xaml
unknown
https://raym.app/rcp/
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/HotKeyBox.xaml
unknown
http://foo/bar/themes/hamburgermenu.baml
unknown
https://gitlab.gnome.org/GNOME/glib/issues/new
unknown
https://raym.app/rcp/resources/12.0.0/demos/Rayman_M_Demo.zip
unknown
https://raym.app/rcp/resources/12.0.0/demos/R3_Demo_4.zip
unknown
https://raym.app/rcp/resources/12.0.0/games/RavingRabbidsActivityCenter.zipORaymanRavingRabbids_Demo
unknown
http://foo/Themes/HamburgerMenuTemplate.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/ContentControlEx.xaml
unknown
http://foo/bar/styles/themes/dark.emerald.baml
unknown
https://gamejolt.com/games/Rayman_ReDesigner/539216
unknown
http://foo/styles/themes/light.teal.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/Styles/Controls.Scrollbars.xaml
unknown
https://github.com/microsoft/XamlBehaviorsWpf
unknown
https://imagemagick.orgsoftwareThumb::Image::WidthThumb::Image::HeightThumb::Document::Pages
unknown
http://foo/bar/styles/themes/light.mauve.baml
unknown
http://foo/styles/themes/light.cyan.xaml
unknown
http://foo/bar/styles/themes/dark.olive.baml
unknown
http://foo/bar/styles/themes/light.pink.baml
unknown
http://defaultcontainer/MahApps.Metro;component/Styles/Controls.Shared.xaml
unknown
https://gamejolt.com/games/Rayman_The_Dark_Magicians_Reign_of_terror/237701YRayman
unknown
https://raym.app/rcp/resources/12.0.0/demos/Rayman_1_Demo_2.zip
unknown
https://raym.app/rcp/resources/12.0.0/utilities/r1/raykit/us/MAPPER.EXE
unknown
http://foo/styles/themes/light.red.xaml
unknown
https://imagemagick.org/0
unknown
http://html4/loose.dtd
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/ToggleSwitch.xaml
unknown
https://efg2.com/Lab/Library/ImageProcessing/DHALF.TXT
unknown
http://foo/Themes/MetroWindow.xaml
unknown
http://foo/Themes/MetroHeader.xaml
unknown
https://raym.app/rcp/resources/12.0.0/games/RavingRabbidsActivityCenter.ziprhttps://raym.app/rcp/res
unknown
http://defaultcontainer/MahApps.Metro;component/styles/themes/dark.lime.xaml
unknown
http://foo/Themes/RangeSlider.xaml
unknown
http://metro.mahapps.com/winfx/xaml/iconpacks
unknown
https://raym.app/rcp/resources/12.0.0/demos/R3_Demo_3.zip7Rayman3_Demo_20030108_Win32
unknown
http://.css
unknown
https://store.steampowered.com/app/?https://steamcommunity.com/app/%steam://rungameid/
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/ColorPicker/ColorEyeDropper.xaml
unknown
http://defaultcontainer/MahApps.Metro;component/Themes/MetroWindow.xaml
unknown
There are 90 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1DAD1FDB000
unkown
page readonly
malicious
1DAD37D2000
unkown
page readonly
malicious
1DAD41D2000
unkown
page readonly
malicious
1DAD60C1000
trusted library allocation
page read and write
malicious
1DAE6351000
trusted library allocation
page read and write
1DAE6820000
trusted library allocation
page read and write
1DAD317E000
unkown
page readonly
1DAEF1C4000
heap
page read and write
7FFD9B949000
trusted library allocation
page read and write
1DAD3296000
unkown
page readonly
7FFD9B980000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
7FFDF3401000
unkown
page readonly
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
1DAF1744000
heap
page read and write
1DAEF32A000
heap
page read and write
1DAF1865000
heap
page read and write
7FFDF30A9000
unkown
page readonly
1DAF1727000
heap
page read and write
1DAF174A000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1DAD6058000
heap
page read and write
7FFDF33D4000
unkown
page readonly
1DAEF380000
heap
page read and write
1DAEF2A7000
heap
page read and write
7FFD9B91D000
trusted library allocation
page read and write
1DAE6DE4000
trusted library allocation
page read and write
7FFD9BB14000
trusted library allocation
page read and write
1DAD4760000
trusted library section
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1DAF4000000
trusted library allocation
page read and write
1DAD4593000
heap
page read and write
7FFD9BA79000
trusted library allocation
page read and write
7FFDF359F000
unkown
page readonly
7FFD9BB40000
trusted library allocation
page read and write
7FFDF33E1000
unkown
page readonly
7FFDF379A000
unkown
page read and write
7FFDF37F3000
unkown
page readonly
1DAD7320000
trusted library allocation
page read and write
7FFD9BA3F000
trusted library allocation
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
1DAF4030000
trusted library allocation
page read and write
7FFDF308F000
unkown
page readonly
1DAEF180000
heap
page read and write
1DAF1834000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
1DAEE890000
trusted library section
page read and write
1DAF1839000
heap
page read and write
1DAF15E0000
trusted library allocation
page read and write
5004DFD000
stack
page read and write
1DAF1600000
trusted library section
page readonly
1DAD74E1000
trusted library allocation
page read and write
1DAF1746000
heap
page read and write
7FFD9BAED000
trusted library allocation
page read and write
7FFDF3736000
unkown
page read and write
1DAF16B9000
heap
page read and write
1DAE6D31000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1DAE6DDB000
trusted library allocation
page read and write
1DAEF1F5000
heap
page read and write
1DAF3790000
heap
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FF475B11000
trusted library allocation
page execute read
1DAD44E2000
heap
page read and write
1DAD5FF2000
heap
page read and write
1DAF198D000
heap
page read and write
7FFDF307F000
unkown
page readonly
7FFD9B9B0000
trusted library allocation
page read and write
1DAD46B8000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1DAF1740000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FF475AF2000
trusted library allocation
page readonly
1DAD21A7000
unkown
page readonly
1DAD4515000
heap
page read and write
7FFD9B9A7000
trusted library allocation
page read and write
1DAEEEC0000
trusted library section
page read and write
1DAF17B7000
heap
page read and write
1DAF187D000
heap
page read and write
1DAEF370000
heap
page read and write
1DAD4740000
trusted library section
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1DAD44AC000
heap
page read and write
1DAE6DDE000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B99F000
trusted library allocation
page read and write
1DAF4180000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1DAD60B0000
heap
page execute and read and write
7FFD9B934000
trusted library allocation
page read and write
7FF475AF1000
trusted library allocation
page execute read
50019EC000
stack
page read and write
1DAF1630000
heap
page read and write
7FFDF349B000
unkown
page readonly
1DAEF183000
heap
page read and write
1DAD60A3000
heap
page read and write
1DAF16F8000
heap
page read and write
7FF475B18000
trusted library allocation
page readonly
1DAF1946000
heap
page read and write
50039FE000
stack
page read and write
1DAF180E000
heap
page read and write
7FF475B00000
trusted library allocation
page readonly
1DAD6060000
heap
page read and write
1DAD6EEC000
trusted library allocation
page read and write
1DAF1863000
heap
page read and write
1DAEF070000
heap
page read and write
7FFDF3005000
unkown
page readonly
7FFD9BAA0000
trusted library allocation
page read and write
1DAE6FFE000
trusted library allocation
page read and write
1DAD605C000
heap
page read and write
1DAF19DA000
heap
page read and write
7FFD9BAFD000
trusted library allocation
page read and write
1DAF41A0000
trusted library allocation
page read and write
1DAF171B000
heap
page read and write
7FFDF37E9000
unkown
page read and write
7FFD9B93E000
trusted library allocation
page read and write
1DAF1A0E000
heap
page read and write
7FFDF3241000
unkown
page readonly
1DAEF18F000
heap
page read and write
1DAF1856000
heap
page read and write
7FFDF312A000
unkown
page readonly
7FFD9BB70000
trusted library allocation
page read and write
7FF475AF0000
trusted library allocation
page readonly
7FF475B12000
trusted library allocation
page readonly
1DAD450D000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
7FF475B02000
trusted library allocation
page readonly
1DAD45A0000
heap
page read and write
1DAF185B000
heap
page read and write
7FFD9BA3A000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1DAE6B3D000
trusted library allocation
page read and write
1DAEEA24000
heap
page execute and read and write
7FFD9BA4A000
trusted library allocation
page read and write
7FF475B14000
trusted library allocation
page readonly
1DAEE9A0000
trusted library section
page read and write
1DAE6D58000
trusted library allocation
page read and write
1DAD32A3000
unkown
page readonly
7FF475B1D000
trusted library allocation
page execute read
1DAF4150000
trusted library allocation
page read and write
7FFD9BB43000
trusted library allocation
page read and write
7FFDF2230000
unkown
page readonly
1DAF4010000
trusted library allocation
page read and write
7FFD9B914000
trusted library allocation
page read and write
1DAD30ED000
unkown
page readonly
7FFD9BAC0000
trusted library allocation
page read and write
1DAD34E0000
unkown
page readonly
50049FB000
stack
page read and write
1DAEF1D3000
heap
page read and write
1DAD3218000
unkown
page readonly
1DAF1871000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1DAF1848000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1DAEE0F0000
trusted library allocation
page read and write
1DAEE980000
trusted library section
page read and write
7FFDF31C3000
unkown
page readonly
1DAE60C1000
trusted library allocation
page read and write
1DAEF267000
heap
page read and write
1DAF1879000
heap
page read and write
1DAD32A5000
unkown
page readonly
1DAF4140000
trusted library allocation
page read and write
50041F4000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FF475B01000
trusted library allocation
page execute read
1DAE6D52000
trusted library allocation
page read and write
1DAEF3BB000
heap
page read and write
7FFDF3797000
unkown
page read and write
7FFD9BA0B000
trusted library allocation
page read and write
50029FE000
stack
page read and write
1DAE6D3A000
trusted library allocation
page read and write
7FF475B05000
trusted library allocation
page execute read
7FF475B0D000
trusted library allocation
page execute read
7FFDF2C31000
unkown
page execute read
1DAD3419000
unkown
page readonly
1DAF1811000
heap
page read and write
1DAF4210000
trusted library allocation
page read and write
1DAEEEB0000
trusted library section
page read and write
7FFDF3795000
unkown
page read and write
1DAEF19E000
heap
page read and write
1DAEF319000
heap
page read and write
1DAD44CE000
heap
page read and write
5002DFD000
stack
page read and write
1DAD35F3000
unkown
page readonly
7FF475B13000
trusted library allocation
page execute read
1DAF41F0000
trusted library allocation
page read and write
1DAF4040000
trusted library allocation
page read and write
1DAE60C8000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
1DAEF243000
heap
page read and write
1DAD4663000
trusted library allocation
page read and write
7FFD9B94B000
trusted library allocation
page read and write
1DAF1755000
heap
page read and write
7FF475B06000
trusted library allocation
page readonly
1DAF1752000
heap
page read and write
1DAEF1C1000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1DAD605E000
heap
page read and write
7FFDF3790000
unkown
page read and write
7FFDF377F000
unkown
page read and write
1DAD4306000
unkown
page readonly
1DAF4190000
trusted library allocation
page read and write
1DAD32B3000
unkown
page readonly
7FFDF3251000
unkown
page readonly
7FFD9B770000
trusted library allocation
page read and write
1DAD75A9000
trusted library allocation
page read and write
7FFDF3635000
unkown
page readonly
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1DAEE9C0000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BAF9000
trusted library allocation
page read and write
1DAD6104000
trusted library allocation
page read and write
7FFDF379E000
unkown
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1DAD2BA7000
unkown
page readonly
1DAF19CB000
heap
page read and write
1DAF41D0000
trusted library allocation
page read and write
1DAD46B0000
heap
page read and write
1DAEF1EE000
heap
page read and write
1DAEE448000
heap
page read and write
1DAD3425000
unkown
page readonly
1DAD44A6000
heap
page read and write
1DAEEA20000
heap
page execute and read and write
1DAF1742000
heap
page read and write
1DAD4683000
heap
page read and write
1DAD34ED000
unkown
page readonly
7FFD9B983000
trusted library allocation
page read and write
1DAEF38E000
heap
page read and write
1DAEF23C000
heap
page read and write
1DAD4795000
heap
page read and write
1DAD3456000
unkown
page readonly
1DAF1677000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1DAD3429000
unkown
page readonly
1DAD30E4000
unkown
page readonly
1DAD3689000
unkown
page readonly
7FFD9BB53000
trusted library allocation
page read and write
1DAEF1BF000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1DAD1210000
unkown
page readonly
1DAD30D4000
unkown
page readonly
1DAEF248000
heap
page read and write
7FFDF3498000
unkown
page readonly
1DAD4650000
trusted library allocation
page read and write
1DAF4160000
trusted library allocation
page read and write
1DAD6B09000
trusted library allocation
page read and write
7FF475B03000
trusted library allocation
page execute read
1DAF1804000
heap
page read and write
7FFDF31DD000
unkown
page readonly
1DAF37B0000
trusted library allocation
page read and write
1DAEF188000
heap
page read and write
1DAF1748000
heap
page read and write
1DAEF2D9000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1DAEF2E4000
heap
page read and write
1DAF19D0000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
1DAEEA30000
trusted library section
page read and write
1DAD4995000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1DAEF1C7000
heap
page read and write
1DAF16B4000
heap
page read and write
1DAF17A4000
heap
page read and write
7FF475B15000
trusted library allocation
page execute read
1DAD4630000
trusted library allocation
page read and write
7FFDF33C6000
unkown
page readonly
1DAF16FB000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1DAD4770000
trusted library section
page read and write
1DAD4990000
heap
page read and write
7FF475B19000
trusted library allocation
page execute read
1DAF4020000
trusted library allocation
page read and write
1DAEF1EB000
heap
page read and write
1DAF16BC000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1DAF173E000
heap
page read and write
50045FB000
stack
page read and write
1DAD45C0000
heap
page read and write
1DAEF3A2000
heap
page read and write
7FF475B0B000
trusted library allocation
page execute read
7FFD9BA90000
trusted library allocation
page execute and read and write
1DAEF208000
heap
page read and write
1DAEF323000
heap
page read and write
1DAD4584000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
1DAE6DD1000
trusted library allocation
page read and write
1DAD450F000
heap
page read and write
7FFDF325F000
unkown
page readonly
1DAEF1E4000
heap
page read and write
1DAD4790000
heap
page read and write
1DAD46A0000
trusted library section
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B9FB000
trusted library allocation
page read and write
1DAF175D000
heap
page read and write
1DAD4572000
heap
page read and write
1DAF17F5000
heap
page read and write
1DAEEF20000
trusted library allocation
page read and write
1DAE6D27000
trusted library allocation
page read and write
1DAD5FB4000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1DAF41E0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1DAD4930000
trusted library section
page read and write
1DAF16C3000
heap
page read and write
7FFDF3099000
unkown
page readonly
7FFD9B91B000
trusted library allocation
page read and write
1DAEF2E0000
heap
page read and write
7FFDF373B000
unkown
page write copy
1DAD31FA000
unkown
page readonly
1DAF183D000
heap
page read and write
1DAF1801000
heap
page read and write
1DAD345D000
unkown
page readonly
7FFD9BA42000
trusted library allocation
page read and write
1DAE6D4F000
trusted library allocation
page read and write
1DAD6109000
trusted library allocation
page read and write
1DAF1733000
heap
page read and write
1DAD43C0000
heap
page read and write
1DAD44A0000
heap
page read and write
7FFDF3780000
unkown
page write copy
7FF475B0C000
trusted library allocation
page readonly
1DAE6FDE000
trusted library allocation
page read and write
1DAD44E5000
heap
page read and write
7FF475B1B000
trusted library allocation
page execute read
1DAD5FB0000
heap
page read and write
1DAEF1FB000
heap
page read and write
1DAEF170000
heap
page read and write
1DAD1C12000
unkown
page readonly
1DAF15F0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1DAD4950000
heap
page read and write
7FF475B07000
trusted library allocation
page execute read
7FFDF2231000
unkown
page execute read
7FFD9BAE2000
trusted library allocation
page read and write
1DAF180C000
heap
page read and write
7FFDF372D000
unkown
page write copy
1DAEEE90000
trusted library section
page read and write
1DAEF386000
heap
page read and write
7FF475B20000
trusted library allocation
page execute and read and write
7FFD9BB28000
trusted library allocation
page read and write
1DAD4660000
trusted library allocation
page read and write
1DAD6065000
heap
page read and write
1DAE7026000
trusted library allocation
page read and write
7FF475B1A000
trusted library allocation
page readonly
1DAD4680000
heap
page read and write
1DAD45E0000
heap
page read and write
1DAEF36A000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B959000
trusted library allocation
page read and write
7FF475AF3000
trusted library allocation
page execute read
1DAF4170000
trusted library allocation
page read and write
7FFDF3731000
unkown
page write copy
1DAE6D34000
trusted library allocation
page read and write
1DAD3460000
unkown
page readonly
7FFD9B9A3000
trusted library allocation
page read and write
7FFD9B924000
trusted library allocation
page read and write
1DAD1F61000
unkown
page readonly
7FF475B0A000
trusted library allocation
page readonly
1DAF176B000
heap
page read and write
1DAD3436000
unkown
page readonly
1DAEF196000
heap
page read and write
50035FE000
stack
page read and write
7FF475B04000
trusted library allocation
page readonly
7FFD9BAD0000
trusted library allocation
page read and write
1DAEF1C9000
heap
page read and write
1DAD5FC0000
heap
page read and write
1DAD1212000
unkown
page readonly
1DAD30FD000
unkown
page readonly
1DAF33B2000
trusted library allocation
page read and write
1DAEF33A000
heap
page read and write
1DAEE0C0000
trusted library allocation
page read and write
7FFD9BAA6000
trusted library allocation
page read and write
1DAEE9E0000
trusted library section
page read and write
1DAF41B0000
trusted library allocation
page read and write
7FFDF340C000
unkown
page readonly
1DAEF223000
heap
page read and write
1DAD31F1000
unkown
page readonly
7FFD9B9A0000
trusted library allocation
page read and write
1DAF16FF000
heap
page read and write
1DAD31F8000
unkown
page readonly
There are 382 hidden memdumps, click here to show them.