Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SOA-injazfe-10424.vbs
|
ASCII text, with very long lines (65377), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\WindowsApp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\task.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsApp.exe_35e67699cba98b9d4552eb86ecf816a67b210_275cf164_57c4a53a-0b6e-4f30-8b26-70b835a78d94\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B9E.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sun Oct 6 16:21:25 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F87.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FC6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\task.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\task.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 6 13:45:08
2024, mtime=Sun Oct 6 13:45:08 2024, atime=Sun Oct 6 13:45:08 2024, length=220160, window=hide
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SOA-injazfe-10424.vbs"
|
||
C:\Users\user\AppData\Local\Temp\WindowsApp.exe
|
"C:\Users\user~1\AppData\Local\Temp\WindowsApp.exe"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "task" /tr "C:\Users\user\AppData\Roaming\task.exe"
|
||
C:\Users\user\AppData\Roaming\task.exe
|
C:\Users\user\AppData\Roaming\task.exe
|
||
C:\Users\user\AppData\Roaming\task.exe
|
"C:\Users\user\AppData\Roaming\task.exe"
|
||
C:\Users\user\AppData\Roaming\task.exe
|
C:\Users\user\AppData\Roaming\task.exe
|
||
C:\Users\user\AppData\Roaming\task.exe
|
"C:\Users\user\AppData\Roaming\task.exe"
|
||
C:\Users\user\AppData\Roaming\task.exe
|
C:\Users\user\AppData\Roaming\task.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1204 -s 3304
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
isika.ddns.net
|
|||
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot7048705146:AAEWMpbRl0e1tLVdgRabv3lMkCrjbYtiS70/sendMessage?chat_id=70620
|
unknown
|
||
https://api.telegram.org/bot7048705146:AAEWMpbRl0e1tLVdgRabv3lMkCrjbYtiS70/sendMessage?chat_id=7062075018&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A662C920EC437F040F44A%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%201YPBEL4ES%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2
|
149.154.167.220
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
isika.ddns.net
|
45.88.91.147
|
||
ip-api.com
|
208.95.112.1
|
||
api.telegram.org
|
149.154.167.220
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
||
50.23.12.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
45.88.91.147
|
isika.ddns.net
|
Bulgaria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
task
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2FC2000
|
trusted library allocation
|
page read and write
|
||
231E000
|
trusted library allocation
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
2D32000
|
trusted library allocation
|
page read and write
|
||
324C000
|
trusted library allocation
|
page read and write
|
||
1A2DB596000
|
heap
|
page read and write
|
||
1B1000
|
stack
|
page read and write
|
||
1A2DB561000
|
heap
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page execute and read and write
|
||
4B6000
|
heap
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
7FFAAC547000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
254A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
1B450000
|
heap
|
page read and write
|
||
1BE64000
|
stack
|
page read and write
|
||
1A2DB567000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1C510000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1A2D9746000
|
heap
|
page read and write
|
||
1C10F000
|
stack
|
page read and write
|
||
7FFAAC557000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
1A2DB577000
|
heap
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
1A2DBF61000
|
trusted library allocation
|
page read and write
|
||
1A2DB542000
|
heap
|
page read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
371000
|
stack
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
12F1000
|
stack
|
page read and write
|
||
1324E000
|
trusted library allocation
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
13A01000
|
trusted library allocation
|
page read and write
|
||
1C948000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
12525000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
2E4F000
|
stack
|
page read and write
|
||
1A2DB67B000
|
heap
|
page read and write
|
||
BE2000
|
unkown
|
page execute and read and write
|
||
7FFAAC38D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page execute and read and write
|
||
13165000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3A4000
|
trusted library allocation
|
page read and write
|
||
1A2D9746000
|
heap
|
page read and write
|
||
1A2D9686000
|
heap
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
1A2DB55B000
|
heap
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
1A2DB5A0000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
122C7000
|
trusted library allocation
|
page read and write
|
||
1B516000
|
heap
|
page read and write
|
||
1C115000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
1BC60000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
124FE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
31D1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C6000
|
trusted library allocation
|
page execute and read and write
|
||
24EF000
|
trusted library allocation
|
page read and write
|
||
1A2DB741000
|
heap
|
page read and write
|
||
7FFAAC545000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
7FFAAC3A2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC553000
|
trusted library allocation
|
page read and write
|
||
1A2DB3A6000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page execute and read and write
|
||
13DA000
|
heap
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
2D23000
|
trusted library allocation
|
page read and write
|
||
1A2DB557000
|
heap
|
page read and write
|
||
7FFAAC380000
|
trusted library allocation
|
page read and write
|
||
1A2DB56A000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
7FFAAC3C4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC547000
|
trusted library allocation
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
1BB9C000
|
stack
|
page read and write
|
||
7FFB1E0F6000
|
unkown
|
page readonly
|
||
7FFAAC3A3000
|
trusted library allocation
|
page execute and read and write
|
||
1B24E000
|
stack
|
page read and write
|
||
12AC9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC46C000
|
trusted library allocation
|
page execute and read and write
|
||
1A84D000
|
stack
|
page read and write
|
||
7FFAAC54C000
|
trusted library allocation
|
page read and write
|
||
1A2D9590000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
F31000
|
stack
|
page read and write
|
||
13CC000
|
heap
|
page read and write
|
||
24FE000
|
trusted library allocation
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
7FFAAC3DD000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB548000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
13117000
|
trusted library allocation
|
page read and write
|
||
2517000
|
trusted library allocation
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page execute and read and write
|
||
3020000
|
heap
|
page read and write
|
||
1A2DB548000
|
heap
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
1BA1B000
|
stack
|
page read and write
|
||
1A2D9672000
|
heap
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1A2D9746000
|
heap
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
1A2D9570000
|
heap
|
page read and write
|
||
1A2D968F000
|
heap
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
1A2DB582000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
1A2DBB90000
|
heap
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
50B000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
31E3000
|
trusted library allocation
|
page read and write
|
||
134C9000
|
trusted library allocation
|
page read and write
|
||
1A2DB543000
|
heap
|
page read and write
|
||
1A2DB542000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
1A2DB55B000
|
heap
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
2537000
|
trusted library allocation
|
page read and write
|
||
1A2DB58E000
|
heap
|
page read and write
|
||
1B78E000
|
stack
|
page read and write
|
||
1A2DB575000
|
heap
|
page read and write
|
||
7FFAAC382000
|
trusted library allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
1AD7D000
|
stack
|
page read and write
|
||
71401FE000
|
stack
|
page read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
7FFAAC393000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
12CF0000
|
trusted library allocation
|
page read and write
|
||
1B4D1000
|
heap
|
page read and write
|
||
1A2DB57D000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
1AE7C000
|
stack
|
page read and write
|
||
1B34F000
|
stack
|
page read and write
|
||
1A2DB54D000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1A2D972E000
|
heap
|
page read and write
|
||
1B98D000
|
stack
|
page read and write
|
||
1A2DB55B000
|
heap
|
page read and write
|
||
1A2DBB10000
|
heap
|
page read and write
|
||
13200000
|
trusted library allocation
|
page read and write
|
||
1A2DB7A0000
|
heap
|
page read and write
|
||
1A2DB74A000
|
heap
|
page read and write
|
||
1A2DBF64000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page execute and read and write
|
||
870000
|
heap
|
page execute and read and write
|
||
1A2DB54C000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
1A2D975E000
|
heap
|
page read and write
|
||
1AA0C000
|
stack
|
page read and write
|
||
1B68D000
|
stack
|
page read and write
|
||
230000
|
unkown
|
page readonly
|
||
134B000
|
heap
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page execute and read and write
|
||
945000
|
heap
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
1A2DB52F000
|
heap
|
page read and write
|
||
1B91D000
|
stack
|
page read and write
|
||
1126000
|
heap
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4C2000
|
trusted library allocation
|
page execute and read and write
|
||
12CC1000
|
trusted library allocation
|
page read and write
|
||
1A2DB544000
|
heap
|
page read and write
|
||
1BD6C000
|
stack
|
page read and write
|
||
458000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
7FFAAC3A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
118C000
|
heap
|
page read and write
|
||
7FFAAC496000
|
trusted library allocation
|
page execute and read and write
|
||
2512000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page execute and read and write
|
||
1A2D972E000
|
heap
|
page read and write
|
||
1313E000
|
trusted library allocation
|
page read and write
|
||
13DC000
|
heap
|
page read and write
|
||
1A2DC360000
|
heap
|
page read and write
|
||
1A2D9660000
|
heap
|
page read and write
|
||
479000
|
heap
|
page read and write
|
||
1A2D95D0000
|
heap
|
page read and write
|
||
F89000
|
heap
|
page read and write
|
||
12AF1000
|
trusted library allocation
|
page read and write
|
||
2F5D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3FC000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB789000
|
heap
|
page read and write
|
||
1A2DB70A000
|
heap
|
page read and write
|
||
1C84E000
|
stack
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
30D3000
|
trusted library allocation
|
page read and write
|
||
1CD49000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
1B65C000
|
stack
|
page read and write
|
||
1A2D975E000
|
heap
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC446000
|
trusted library allocation
|
page read and write
|
||
1A2DB57B000
|
heap
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page read and write
|
||
BB2000
|
unkown
|
page execute and read and write
|
||
1A2DB56A000
|
heap
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
1C14F000
|
heap
|
page read and write
|
||
7FFAAC392000
|
trusted library allocation
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FFAAC3B2000
|
trusted library allocation
|
page read and write
|
||
1A2DBD70000
|
heap
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
F61000
|
stack
|
page read and write
|
||
71402FE000
|
stack
|
page read and write
|
||
1A2DB56A000
|
heap
|
page read and write
|
||
7FFAAC3A3000
|
trusted library allocation
|
page execute and read and write
|
||
1BC63000
|
heap
|
page read and write
|
||
7FFAAC3AD000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
unkown
|
page execute and read and write
|
||
52E000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page execute and read and write
|
||
1A2DB584000
|
heap
|
page read and write
|
||
1A2D9744000
|
heap
|
page read and write
|
||
7FFAAC45C000
|
trusted library allocation
|
page execute and read and write
|
||
8A0000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
1C11F000
|
heap
|
page read and write
|
||
1A2DBF63000
|
trusted library allocation
|
page read and write
|
||
1A2DB050000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
1C155000
|
heap
|
page read and write
|
||
1A2DB74A000
|
heap
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page read and write
|
||
7FFAAC39D000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB3A0000
|
heap
|
page read and write
|
||
22C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3C0000
|
trusted library allocation
|
page read and write
|
||
1A2DBB00000
|
heap
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page read and write
|
||
1CB4E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
24FA000
|
trusted library allocation
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
1C193000
|
heap
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
1A2DB591000
|
heap
|
page read and write
|
||
7FFAAC3EC000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB56F000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
2842000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E0F6000
|
unkown
|
page readonly
|
||
1C17D000
|
heap
|
page read and write
|
||
138C9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
1A2D9697000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
1A2D969F000
|
heap
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC553000
|
trusted library allocation
|
page read and write
|
||
1191000
|
heap
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
7FFAAC3CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC456000
|
trusted library allocation
|
page read and write
|
||
1B4DD000
|
stack
|
page read and write
|
||
130C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3A2000
|
trusted library allocation
|
page read and write
|
||
139D9000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
1A2DB89C000
|
heap
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
12F57000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
7FFAAC392000
|
trusted library allocation
|
page read and write
|
||
1A2DB592000
|
heap
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFAAC44C000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB574000
|
heap
|
page read and write
|
||
1BD6B000
|
stack
|
page read and write
|
||
7FFAAC3C0000
|
trusted library allocation
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
1A2DB70C000
|
heap
|
page read and write
|
||
122C1000
|
trusted library allocation
|
page read and write
|
||
112C000
|
heap
|
page read and write
|
||
1BF64000
|
stack
|
page read and write
|
||
1B24D000
|
stack
|
page read and write
|
||
7FFAAC4CB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3D4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC45C000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB70A000
|
heap
|
page read and write
|
||
7FF474090000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DC379000
|
heap
|
page read and write
|
||
7FFAAC486000
|
trusted library allocation
|
page execute and read and write
|
||
1B200000
|
trusted library allocation
|
page read and write
|
||
12481000
|
trusted library allocation
|
page read and write
|
||
1A2DB56A000
|
heap
|
page read and write
|
||
7FFAAC3BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC436000
|
trusted library allocation
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page execute and read and write
|
||
6DC000
|
heap
|
page read and write
|
||
7FFAAC4D4000
|
trusted library allocation
|
page execute and read and write
|
||
1BB9D000
|
stack
|
page read and write
|
||
13227000
|
trusted library allocation
|
page read and write
|
||
13A28000
|
trusted library allocation
|
page read and write
|
||
1A2DB569000
|
heap
|
page read and write
|
||
2504000
|
trusted library allocation
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
23A000
|
unkown
|
page readonly
|
||
13F0000
|
trusted library section
|
page read and write
|
||
1C122000
|
heap
|
page read and write
|
||
1A2F0000
|
trusted library allocation
|
page read and write
|
||
1A2D9669000
|
heap
|
page read and write
|
||
1BFD0000
|
heap
|
page read and write
|
||
1BE6E000
|
stack
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
1A2D9690000
|
heap
|
page read and write
|
||
1A2D975E000
|
heap
|
page read and write
|
||
7FFAAC3AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4C4000
|
trusted library allocation
|
page execute and read and write
|
||
71403FE000
|
stack
|
page read and write
|
||
1C514000
|
heap
|
page read and write
|
||
7FFAAC3C2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54E000
|
trusted library allocation
|
page read and write
|
||
1A2DB58E000
|
heap
|
page read and write
|
||
7FFAAC39D000
|
trusted library allocation
|
page execute and read and write
|
||
160F000
|
stack
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
7FFAAC527000
|
trusted library allocation
|
page read and write
|
||
1A2DB010000
|
heap
|
page read and write
|
||
130C7000
|
trusted library allocation
|
page read and write
|
||
1A2DB5A1000
|
heap
|
page read and write
|
||
27FA000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page execute and read and write
|
||
FFB000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
7FFAAC3B2000
|
trusted library allocation
|
page read and write
|
||
1A2DB56C000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
1A2DB542000
|
heap
|
page read and write
|
||
1A2DBF66000
|
trusted library allocation
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
1C142000
|
heap
|
page read and write
|
||
1A2DBF62000
|
trusted library allocation
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
7FFAAC384000
|
trusted library allocation
|
page read and write
|
||
1A2D9689000
|
heap
|
page read and write
|
||
1A2DB7A1000
|
heap
|
page read and write
|
||
1A2DB77E000
|
heap
|
page read and write
|
||
1A2DBF65000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1A2D9697000
|
heap
|
page read and write
|
||
7FFAAC43C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC394000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
heap
|
page execute and read and write
|
||
7FFAAC55C000
|
trusted library allocation
|
page read and write
|
||
1C14D000
|
heap
|
page read and write
|
||
1A2DB581000
|
heap
|
page read and write
|
||
1A2DB9AD000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
7FFAAC383000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB559000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FFAAC3D0000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
131D7000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page execute and read and write
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
1A2D9744000
|
heap
|
page read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
7FFAAC4A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3B3000
|
trusted library allocation
|
page execute and read and write
|
||
1C110000
|
heap
|
page read and write
|
||
1A2DBF67000
|
trusted library allocation
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
1A2DB3A4000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
124B0000
|
trusted library allocation
|
page read and write
|
||
130F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1AF4C000
|
stack
|
page read and write
|
||
17D5000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page execute and read and write
|
||
1A2DBD60000
|
heap
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page execute and read and write
|
||
2D40000
|
heap
|
page read and write
|
||
7FFAAC541000
|
trusted library allocation
|
page read and write
|
||
1A2DB583000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C4000
|
trusted library allocation
|
page execute and read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
323B000
|
trusted library allocation
|
page read and write
|
||
1A2DB3A4000
|
heap
|
page read and write
|
||
7FFAAC3AD000
|
trusted library allocation
|
page execute and read and write
|
||
12F51000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page execute and read and write
|
||
12D17000
|
trusted library allocation
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
12D3E000
|
trusted library allocation
|
page read and write
|
||
1A2DC380000
|
heap
|
page read and write
|
||
1A2DB587000
|
heap
|
page read and write
|
||
1BB85000
|
stack
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
47D000
|
heap
|
page read and write
|
||
1A2DB3E9000
|
heap
|
page read and write
|
||
1AC70000
|
heap
|
page execute and read and write
|
||
1AF7E000
|
stack
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
1A2DB589000
|
heap
|
page read and write
|
||
1A2DB576000
|
heap
|
page read and write
|
||
1A2DB742000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1A2DB55B000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page execute and read and write
|
||
D31000
|
stack
|
page read and write
|
||
13C6000
|
heap
|
page read and write
|
||
1BA9D000
|
stack
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
1A2DB3A2000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC40C000
|
trusted library allocation
|
page execute and read and write
|
||
713F9BA000
|
stack
|
page read and write
|
||
1A2DB548000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
7FFAAC3AD000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB56F000
|
heap
|
page read and write
|
||
1A2D95D5000
|
heap
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
12D65000
|
trusted library allocation
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
1A2D967C000
|
heap
|
page read and write
|
||
13759000
|
trusted library allocation
|
page read and write
|
||
1B0F0000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
125F000
|
stack
|
page read and write
|
||
1B6C0000
|
heap
|
page execute and read and write
|
||
1A2D975E000
|
heap
|
page read and write
|
||
133F000
|
heap
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
1A2DBF68000
|
trusted library allocation
|
page read and write
|
||
7FFAAC466000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3CB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4C2000
|
trusted library allocation
|
page execute and read and write
|
||
12CC7000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
1A2D975E000
|
heap
|
page read and write
|
||
1A2DB588000
|
heap
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
7FFAAC541000
|
trusted library allocation
|
page read and write
|
||
1A2D9490000
|
heap
|
page read and write
|
||
1CA47000
|
stack
|
page read and write
|
||
1A2DB3A1000
|
heap
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
1A2DB557000
|
heap
|
page read and write
|
||
1A2DB4A1000
|
heap
|
page read and write
|
||
7FFAAC3B2000
|
trusted library allocation
|
page read and write
|
||
1C40C000
|
stack
|
page read and write
|
||
1C130000
|
heap
|
page read and write
|
||
1B491000
|
heap
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
7FFAAC3A4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
1A2DB74A000
|
heap
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
1A2D9681000
|
heap
|
page read and write
|
||
1C70C000
|
stack
|
page read and write
|
||
250F000
|
trusted library allocation
|
page read and write
|
||
2CD4000
|
trusted library allocation
|
page read and write
|
||
1A2DB55B000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3C4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3B6000
|
trusted library allocation
|
page read and write
|
||
1A2D968A000
|
heap
|
page read and write
|
||
1A2DB89D000
|
heap
|
page read and write
|
||
7FFAAC456000
|
trusted library allocation
|
page read and write
|
||
1C117000
|
heap
|
page read and write
|
||
1BB1E000
|
stack
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC54C000
|
trusted library allocation
|
page read and write
|
||
1C188000
|
heap
|
page read and write
|
||
7FFAAC3B4000
|
trusted library allocation
|
page read and write
|
||
1A2DB597000
|
heap
|
page read and write
|
||
1330000
|
trusted library section
|
page read and write
|
||
7FFAAC537000
|
trusted library allocation
|
page read and write
|
||
1A2DBBC0000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
1C197000
|
heap
|
page read and write
|
||
1CC4C000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
2894000
|
trusted library allocation
|
page read and write
|
||
1A2DB56F000
|
heap
|
page read and write
|
||
7FFAAC52C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page execute and read and write
|
||
B05000
|
heap
|
page read and write
|
||
7FFAAC3CD000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB4A0000
|
heap
|
page read and write
|
||
323D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC3FC000
|
trusted library allocation
|
page execute and read and write
|
||
131D1000
|
trusted library allocation
|
page read and write
|
||
250B000
|
trusted library allocation
|
page read and write
|
||
1C74E000
|
stack
|
page read and write
|
||
1A2DBF60000
|
trusted library allocation
|
page read and write
|
||
22CD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3A4000
|
trusted library allocation
|
page read and write
|
||
1B04B000
|
stack
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
48C000
|
heap
|
page read and write
|
||
1BA8D000
|
stack
|
page read and write
|
||
1AE40000
|
heap
|
page execute and read and write
|
||
1A2D9697000
|
heap
|
page read and write
|
||
22EA000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
1A2DB576000
|
heap
|
page read and write
|
||
7FFAAC476000
|
trusted library allocation
|
page execute and read and write
|
||
1A2D9685000
|
heap
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
1A2D9744000
|
heap
|
page read and write
|
||
863000
|
trusted library allocation
|
page read and write
|
||
1A2DB578000
|
heap
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
7FFAAC3C4000
|
trusted library allocation
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
7FFAAC545000
|
trusted library allocation
|
page read and write
|
||
1B14E000
|
stack
|
page read and write
|
||
1A2D9744000
|
heap
|
page read and write
|
||
1B7CB000
|
stack
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
1C11A000
|
heap
|
page read and write
|
||
7FFAAC486000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DB57E000
|
heap
|
page read and write
|
||
1C185000
|
heap
|
page read and write
|
||
1B75C000
|
stack
|
page read and write
|
||
1A2DB567000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
322C000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FFAAC547000
|
trusted library allocation
|
page read and write
|
||
1C190000
|
heap
|
page read and write
|
||
21EE000
|
stack
|
page read and write
|
||
7FFAAC3C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3B2000
|
trusted library allocation
|
page read and write
|
||
1BF90000
|
heap
|
page read and write
|
||
1A2DB56F000
|
heap
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page execute and read and write
|
||
8AD000
|
heap
|
page read and write
|
||
7FFAAC3BC000
|
trusted library allocation
|
page read and write
|
||
1A2DB56F000
|
heap
|
page read and write
|
||
1ACF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3A2000
|
trusted library allocation
|
page read and write
|
||
291A000
|
trusted library allocation
|
page read and write
|
||
1AF80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4C6000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DBF50000
|
heap
|
page read and write
|
||
7FFAAC54E000
|
trusted library allocation
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
713FFFE000
|
stack
|
page read and write
|
||
202000
|
unkown
|
page readonly
|
||
1BC9E000
|
stack
|
page read and write
|
||
7FFAAC3DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC486000
|
trusted library allocation
|
page execute and read and write
|
||
1705000
|
heap
|
page read and write
|
||
7FFAAC4D4000
|
trusted library allocation
|
page execute and read and write
|
||
7F5000
|
heap
|
page read and write
|
||
7FFAAC3B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4CB000
|
trusted library allocation
|
page execute and read and write
|
||
744000
|
heap
|
page read and write
|
There are 621 hidden memdumps, click here to show them.