IOC Report
SOA-injazfe-10424.vbs

loading gif

Files

File Path
Type
Category
Malicious
SOA-injazfe-10424.vbs
ASCII text, with very long lines (65377), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\WindowsApp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\task.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsApp.exe_35e67699cba98b9d4552eb86ecf816a67b210_275cf164_57c4a53a-0b6e-4f30-8b26-70b835a78d94\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B9E.tmp.dmp
Mini DuMP crash report, 16 streams, Sun Oct 6 16:21:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F87.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FC6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\task.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\task.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 6 13:45:08 2024, mtime=Sun Oct 6 13:45:08 2024, atime=Sun Oct 6 13:45:08 2024, length=220160, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SOA-injazfe-10424.vbs"
malicious
C:\Users\user\AppData\Local\Temp\WindowsApp.exe
"C:\Users\user~1\AppData\Local\Temp\WindowsApp.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "task" /tr "C:\Users\user\AppData\Roaming\task.exe"
malicious
C:\Users\user\AppData\Roaming\task.exe
C:\Users\user\AppData\Roaming\task.exe
malicious
C:\Users\user\AppData\Roaming\task.exe
"C:\Users\user\AppData\Roaming\task.exe"
malicious
C:\Users\user\AppData\Roaming\task.exe
C:\Users\user\AppData\Roaming\task.exe
malicious
C:\Users\user\AppData\Roaming\task.exe
"C:\Users\user\AppData\Roaming\task.exe"
malicious
C:\Users\user\AppData\Roaming\task.exe
C:\Users\user\AppData\Roaming\task.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1204 -s 3304

URLs

Name
IP
Malicious
isika.ddns.net
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot7048705146:AAEWMpbRl0e1tLVdgRabv3lMkCrjbYtiS70/sendMessage?chat_id=70620
unknown
malicious
https://api.telegram.org/bot7048705146:AAEWMpbRl0e1tLVdgRabv3lMkCrjbYtiS70/sendMessage?chat_id=7062075018&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A662C920EC437F040F44A%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%201YPBEL4ES%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.2
149.154.167.220
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1

Domains

Name
IP
Malicious
isika.ddns.net
45.88.91.147
malicious
ip-api.com
208.95.112.1
malicious
api.telegram.org
149.154.167.220
malicious
198.187.3.20.in-addr.arpa
unknown
malicious
50.23.12.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
45.88.91.147
isika.ddns.net
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WindowsApp_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
task
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FC2000
trusted library allocation
page read and write
malicious
231E000
trusted library allocation
page read and write
malicious
313A000
trusted library allocation
page read and write
malicious
2481000
trusted library allocation
page read and write
malicious
2D32000
trusted library allocation
page read and write
malicious
324C000
trusted library allocation
page read and write
malicious
1A2DB596000
heap
page read and write
1B1000
stack
page read and write
1A2DB561000
heap
page read and write
7FFB1E100000
unkown
page read and write
2CC1000
trusted library allocation
page read and write
7FFAAC3BD000
trusted library allocation
page execute and read and write
4B6000
heap
page read and write
7FFAAC560000
trusted library allocation
page read and write
305F000
stack
page read and write
7FFAAC547000
trusted library allocation
page read and write
2370000
heap
page read and write
254A000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
7FFAAC3A0000
trusted library allocation
page read and write
1B450000
heap
page read and write
1BE64000
stack
page read and write
1A2DB567000
heap
page read and write
2F50000
heap
page read and write
B00000
heap
page read and write
12F0000
heap
page read and write
790000
trusted library allocation
page read and write
1C510000
heap
page read and write
1090000
heap
page read and write
1A2D9746000
heap
page read and write
1C10F000
stack
page read and write
7FFAAC557000
trusted library allocation
page read and write
1305000
heap
page read and write
1A2DB577000
heap
page read and write
166F000
stack
page read and write
4B4000
heap
page read and write
1A2DBF61000
trusted library allocation
page read and write
1A2DB542000
heap
page read and write
7FFB1E102000
unkown
page readonly
371000
stack
page read and write
2CAE000
stack
page read and write
7FFAAC560000
trusted library allocation
page read and write
12F1000
stack
page read and write
1324E000
trusted library allocation
page read and write
13A8000
heap
page read and write
13A01000
trusted library allocation
page read and write
1C948000
stack
page read and write
2CFF000
stack
page read and write
8FF000
stack
page read and write
12525000
trusted library allocation
page read and write
FC0000
heap
page read and write
7FFB1E0E0000
unkown
page readonly
2E4F000
stack
page read and write
1A2DB67B000
heap
page read and write
BE2000
unkown
page execute and read and write
7FFAAC38D000
trusted library allocation
page execute and read and write
7FFAAC460000
trusted library allocation
page execute and read and write
13165000
trusted library allocation
page read and write
7FFAAC3A4000
trusted library allocation
page read and write
1A2D9746000
heap
page read and write
1A2D9686000
heap
page read and write
F8C000
heap
page read and write
1A2DB55B000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
1A2DB5A0000
heap
page read and write
3D0000
heap
page read and write
122C7000
trusted library allocation
page read and write
1B516000
heap
page read and write
1C115000
heap
page read and write
1070000
heap
page read and write
47F000
heap
page read and write
1BC60000
heap
page read and write
FB0000
heap
page read and write
EC5000
heap
page read and write
1300000
heap
page read and write
124FE000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
7FFAAC460000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
7FFAAC4C6000
trusted library allocation
page execute and read and write
24EF000
trusted library allocation
page read and write
1A2DB741000
heap
page read and write
7FFAAC545000
trusted library allocation
page read and write
73C000
heap
page read and write
7FFAAC3A2000
trusted library allocation
page read and write
7FFAAC553000
trusted library allocation
page read and write
1A2DB3A6000
heap
page read and write
16B0000
heap
page execute and read and write
13DA000
heap
page read and write
1404000
heap
page read and write
2D23000
trusted library allocation
page read and write
1A2DB557000
heap
page read and write
7FFAAC380000
trusted library allocation
page read and write
1A2DB56A000
heap
page read and write
115E000
stack
page read and write
7FFAAC3C4000
trusted library allocation
page read and write
7FFAAC547000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page read and write
1BB9C000
stack
page read and write
7FFB1E0F6000
unkown
page readonly
7FFAAC3A3000
trusted library allocation
page execute and read and write
1B24E000
stack
page read and write
12AC9000
trusted library allocation
page read and write
7FFAAC3AD000
trusted library allocation
page execute and read and write
7FFAAC46C000
trusted library allocation
page execute and read and write
1A84D000
stack
page read and write
7FFAAC54C000
trusted library allocation
page read and write
1A2D9590000
heap
page read and write
850000
trusted library allocation
page read and write
F31000
stack
page read and write
13CC000
heap
page read and write
24FE000
trusted library allocation
page read and write
1377000
heap
page read and write
7FFAAC3DD000
trusted library allocation
page execute and read and write
1A2DB548000
heap
page read and write
1050000
heap
page read and write
13117000
trusted library allocation
page read and write
2517000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page execute and read and write
3020000
heap
page read and write
1A2DB548000
heap
page read and write
7FFB1E100000
unkown
page read and write
1BA1B000
stack
page read and write
1A2D9672000
heap
page read and write
7FFAAC530000
trusted library allocation
page read and write
1A2D9746000
heap
page read and write
31EF000
trusted library allocation
page read and write
F9D000
heap
page read and write
1A2D9570000
heap
page read and write
1A2D968F000
heap
page read and write
16C5000
heap
page read and write
1B88E000
stack
page read and write
1A2DB582000
heap
page read and write
1365000
heap
page read and write
1A2DBB90000
heap
page read and write
17CE000
stack
page read and write
7FFB1E100000
unkown
page read and write
50B000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
134C9000
trusted library allocation
page read and write
1A2DB543000
heap
page read and write
1A2DB542000
heap
page read and write
450000
heap
page read and write
1A2DB55B000
heap
page read and write
2D21000
trusted library allocation
page read and write
2537000
trusted library allocation
page read and write
1A2DB58E000
heap
page read and write
1B78E000
stack
page read and write
1A2DB575000
heap
page read and write
7FFAAC382000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
1AD7D000
stack
page read and write
71401FE000
stack
page read and write
7FFB1E105000
unkown
page readonly
7FFAAC393000
trusted library allocation
page execute and read and write
7FFAAC3B0000
trusted library allocation
page read and write
12CF0000
trusted library allocation
page read and write
1B4D1000
heap
page read and write
1A2DB57D000
heap
page read and write
1310000
heap
page read and write
1AE7C000
stack
page read and write
1B34F000
stack
page read and write
1A2DB54D000
heap
page read and write
7F0000
heap
page read and write
1360000
heap
page read and write
1A2D972E000
heap
page read and write
1B98D000
stack
page read and write
1A2DB55B000
heap
page read and write
1A2DBB10000
heap
page read and write
13200000
trusted library allocation
page read and write
1A2DB7A0000
heap
page read and write
1A2DB74A000
heap
page read and write
1A2DBF64000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page execute and read and write
870000
heap
page execute and read and write
1A2DB54C000
heap
page read and write
312E000
stack
page read and write
1A2D975E000
heap
page read and write
1AA0C000
stack
page read and write
1B68D000
stack
page read and write
230000
unkown
page readonly
134B000
heap
page read and write
1318000
heap
page read and write
48A000
heap
page read and write
30B0000
heap
page execute and read and write
945000
heap
page read and write
7FFB1E100000
unkown
page read and write
1A2DB52F000
heap
page read and write
1B91D000
stack
page read and write
1126000
heap
page read and write
7FFAAC3BD000
trusted library allocation
page execute and read and write
7FFAAC4C2000
trusted library allocation
page execute and read and write
12CC1000
trusted library allocation
page read and write
1A2DB544000
heap
page read and write
1BD6C000
stack
page read and write
458000
heap
page read and write
430000
heap
page read and write
7FFAAC3A3000
trusted library allocation
page execute and read and write
7FFB1E105000
unkown
page readonly
118C000
heap
page read and write
7FFAAC496000
trusted library allocation
page execute and read and write
2512000
trusted library allocation
page read and write
7FFAAC3A0000
trusted library allocation
page read and write
7FFAAC3BD000
trusted library allocation
page execute and read and write
1A2D972E000
heap
page read and write
1313E000
trusted library allocation
page read and write
13DC000
heap
page read and write
1A2DC360000
heap
page read and write
1A2D9660000
heap
page read and write
479000
heap
page read and write
1A2D95D0000
heap
page read and write
F89000
heap
page read and write
12AF1000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
7FFAAC3FC000
trusted library allocation
page execute and read and write
1A2DB789000
heap
page read and write
1A2DB70A000
heap
page read and write
1C84E000
stack
page read and write
16C0000
heap
page read and write
30D3000
trusted library allocation
page read and write
1CD49000
stack
page read and write
1350000
trusted library allocation
page read and write
1B65C000
stack
page read and write
1A2D975E000
heap
page read and write
7FFAAC390000
trusted library allocation
page read and write
7FFAAC3BD000
trusted library allocation
page execute and read and write
7FFAAC446000
trusted library allocation
page read and write
1A2DB57B000
heap
page read and write
150F000
stack
page read and write
7FFAAC440000
trusted library allocation
page read and write
BB2000
unkown
page execute and read and write
1A2DB56A000
heap
page read and write
118A000
heap
page read and write
1C14F000
heap
page read and write
7FFAAC392000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page read and write
FB0000
heap
page read and write
7FFAAC3B2000
trusted library allocation
page read and write
1A2DBD70000
heap
page read and write
3201000
trusted library allocation
page read and write
200000
unkown
page readonly
F61000
stack
page read and write
71402FE000
stack
page read and write
1A2DB56A000
heap
page read and write
7FFAAC3A3000
trusted library allocation
page execute and read and write
1BC63000
heap
page read and write
7FFAAC3AD000
trusted library allocation
page execute and read and write
BE0000
unkown
page execute and read and write
52E000
heap
page read and write
1100000
trusted library allocation
page read and write
1160000
heap
page read and write
EA0000
heap
page read and write
BB0000
unkown
page execute and read and write
1A2DB584000
heap
page read and write
1A2D9744000
heap
page read and write
7FFAAC45C000
trusted library allocation
page execute and read and write
8A0000
heap
page read and write
10E0000
trusted library allocation
page read and write
247E000
stack
page read and write
1C11F000
heap
page read and write
1A2DBF63000
trusted library allocation
page read and write
1A2DB050000
heap
page read and write
12D0000
heap
page read and write
7FFAAC3B0000
trusted library allocation
page read and write
1C155000
heap
page read and write
1A2DB74A000
heap
page read and write
7FFAAC430000
trusted library allocation
page read and write
7FFAAC39D000
trusted library allocation
page execute and read and write
1A2DB3A0000
heap
page read and write
22C1000
trusted library allocation
page read and write
7FFAAC3C0000
trusted library allocation
page read and write
1A2DBB00000
heap
page read and write
7FFAAC390000
trusted library allocation
page read and write
1CB4E000
stack
page read and write
6D0000
heap
page read and write
24FA000
trusted library allocation
page read and write
71F000
stack
page read and write
1C193000
heap
page read and write
7FFAAC3B0000
trusted library allocation
page read and write
1A2DB591000
heap
page read and write
7FFAAC3EC000
trusted library allocation
page execute and read and write
1A2DB56F000
heap
page read and write
1162000
heap
page read and write
2842000
trusted library allocation
page read and write
7FFAAC3A0000
trusted library allocation
page read and write
7FFB1E0F6000
unkown
page readonly
1C17D000
heap
page read and write
138C9000
trusted library allocation
page read and write
7FFAAC520000
trusted library allocation
page read and write
1A2D9697000
heap
page read and write
AAE000
stack
page read and write
1A2D969F000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page execute and read and write
7FFAAC553000
trusted library allocation
page read and write
1191000
heap
page read and write
114E000
heap
page read and write
7FFAAC3CD000
trusted library allocation
page execute and read and write
7FFAAC456000
trusted library allocation
page read and write
1B4DD000
stack
page read and write
130C1000
trusted library allocation
page read and write
7FFAAC3A2000
trusted library allocation
page read and write
139D9000
trusted library allocation
page read and write
1700000
heap
page read and write
1A2DB89C000
heap
page read and write
134D000
heap
page read and write
12F57000
trusted library allocation
page read and write
3C0000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
7FFAAC392000
trusted library allocation
page read and write
1A2DB592000
heap
page read and write
830000
trusted library allocation
page read and write
720000
heap
page read and write
7D0000
heap
page read and write
7FFAAC44C000
trusted library allocation
page execute and read and write
1A2DB574000
heap
page read and write
1BD6B000
stack
page read and write
7FFAAC3C0000
trusted library allocation
page read and write
131F000
stack
page read and write
1406000
heap
page read and write
1A2DB70C000
heap
page read and write
122C1000
trusted library allocation
page read and write
112C000
heap
page read and write
1BF64000
stack
page read and write
1B24D000
stack
page read and write
7FFAAC4CB000
trusted library allocation
page execute and read and write
7FFAAC3D4000
trusted library allocation
page read and write
7FFAAC45C000
trusted library allocation
page execute and read and write
1A2DB70A000
heap
page read and write
7FF474090000
trusted library allocation
page execute and read and write
1A2DC379000
heap
page read and write
7FFAAC486000
trusted library allocation
page execute and read and write
1B200000
trusted library allocation
page read and write
12481000
trusted library allocation
page read and write
1A2DB56A000
heap
page read and write
7FFAAC3BD000
trusted library allocation
page execute and read and write
7FFAAC436000
trusted library allocation
page read and write
1B8CE000
stack
page read and write
7FFAAC4D0000
trusted library allocation
page execute and read and write
6DC000
heap
page read and write
7FFAAC4D4000
trusted library allocation
page execute and read and write
1BB9D000
stack
page read and write
13227000
trusted library allocation
page read and write
13A28000
trusted library allocation
page read and write
1A2DB569000
heap
page read and write
2504000
trusted library allocation
page read and write
7FFAAC440000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
E60000
heap
page read and write
23A000
unkown
page readonly
13F0000
trusted library section
page read and write
1C122000
heap
page read and write
1A2F0000
trusted library allocation
page read and write
1A2D9669000
heap
page read and write
1BFD0000
heap
page read and write
1BE6E000
stack
page read and write
2CFE000
trusted library allocation
page read and write
1A2D9690000
heap
page read and write
1A2D975E000
heap
page read and write
7FFAAC3AD000
trusted library allocation
page execute and read and write
7FFAAC4C4000
trusted library allocation
page execute and read and write
71403FE000
stack
page read and write
1C514000
heap
page read and write
7FFAAC3C2000
trusted library allocation
page read and write
7FFAAC54E000
trusted library allocation
page read and write
1A2DB58E000
heap
page read and write
7FFAAC39D000
trusted library allocation
page execute and read and write
160F000
stack
page read and write
1339000
heap
page read and write
7FFAAC527000
trusted library allocation
page read and write
1A2DB010000
heap
page read and write
130C7000
trusted library allocation
page read and write
1A2DB5A1000
heap
page read and write
27FA000
trusted library allocation
page read and write
F69000
heap
page read and write
713000
heap
page read and write
2CB0000
heap
page execute and read and write
FFB000
heap
page read and write
940000
heap
page read and write
6FB000
heap
page read and write
7FFAAC3B2000
trusted library allocation
page read and write
1A2DB56C000
heap
page read and write
2F51000
trusted library allocation
page read and write
1A2DB542000
heap
page read and write
1A2DBF66000
trusted library allocation
page read and write
7FFAAC570000
trusted library allocation
page read and write
1C142000
heap
page read and write
1A2DBF62000
trusted library allocation
page read and write
770000
trusted library allocation
page read and write
7FFAAC384000
trusted library allocation
page read and write
1A2D9689000
heap
page read and write
1A2DB7A1000
heap
page read and write
1A2DB77E000
heap
page read and write
1A2DBF65000
trusted library allocation
page read and write
F70000
heap
page read and write
1A2D9697000
heap
page read and write
7FFAAC43C000
trusted library allocation
page execute and read and write
7FFAAC570000
trusted library allocation
page execute and read and write
7FFAAC3A0000
trusted library allocation
page read and write
7FFAAC394000
trusted library allocation
page read and write
1BC60000
heap
page execute and read and write
7FFAAC55C000
trusted library allocation
page read and write
1C14D000
heap
page read and write
1A2DB581000
heap
page read and write
1A2DB9AD000
heap
page read and write
8A5000
heap
page read and write
7FFAAC383000
trusted library allocation
page execute and read and write
1A2DB559000
heap
page read and write
FE0000
heap
page read and write
7FFAAC3D0000
trusted library allocation
page read and write
13A0000
heap
page read and write
131D7000
trusted library allocation
page read and write
1430000
heap
page execute and read and write
3215000
trusted library allocation
page read and write
7FFB1E100000
unkown
page read and write
7FFAAC550000
trusted library allocation
page read and write
1A2D9744000
heap
page read and write
7FFB1E102000
unkown
page readonly
7FFAAC4A0000
trusted library allocation
page execute and read and write
7FFAAC3B3000
trusted library allocation
page execute and read and write
1C110000
heap
page read and write
1A2DBF67000
trusted library allocation
page read and write
114A000
heap
page read and write
1A2DB3A4000
heap
page read and write
FC0000
heap
page read and write
124B0000
trusted library allocation
page read and write
130F0000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page read and write
1AF4C000
stack
page read and write
17D5000
heap
page read and write
2250000
heap
page execute and read and write
1A2DBD60000
heap
page read and write
7FFAAC4C0000
trusted library allocation
page execute and read and write
2D40000
heap
page read and write
7FFAAC541000
trusted library allocation
page read and write
1A2DB583000
heap
page read and write
FC5000
heap
page read and write
1630000
trusted library allocation
page read and write
7FFAAC4C4000
trusted library allocation
page execute and read and write
2BA0000
heap
page read and write
323B000
trusted library allocation
page read and write
1A2DB3A4000
heap
page read and write
7FFAAC3AD000
trusted library allocation
page execute and read and write
12F51000
trusted library allocation
page read and write
31C0000
heap
page execute and read and write
12D17000
trusted library allocation
page read and write
FC7000
heap
page read and write
12D3E000
trusted library allocation
page read and write
1A2DC380000
heap
page read and write
1A2DB587000
heap
page read and write
1BB85000
stack
page read and write
7FFAAC3B0000
trusted library allocation
page read and write
47D000
heap
page read and write
1A2DB3E9000
heap
page read and write
1AC70000
heap
page execute and read and write
1AF7E000
stack
page read and write
1375000
heap
page read and write
1A2DB589000
heap
page read and write
1A2DB576000
heap
page read and write
1A2DB742000
heap
page read and write
EC0000
heap
page read and write
1A2DB55B000
heap
page read and write
2F40000
heap
page execute and read and write
D31000
stack
page read and write
13C6000
heap
page read and write
1BA9D000
stack
page read and write
7FFB1E100000
unkown
page read and write
1A2DB3A2000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
7FFAAC40C000
trusted library allocation
page execute and read and write
713F9BA000
stack
page read and write
1A2DB548000
heap
page read and write
1120000
heap
page read and write
410000
heap
page read and write
7FFAAC3AD000
trusted library allocation
page execute and read and write
1A2DB56F000
heap
page read and write
1A2D95D5000
heap
page read and write
7FFB1E100000
unkown
page read and write
12D65000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
1A2D967C000
heap
page read and write
13759000
trusted library allocation
page read and write
1B0F0000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
FF0000
heap
page read and write
1B44E000
stack
page read and write
125F000
stack
page read and write
1B6C0000
heap
page execute and read and write
1A2D975E000
heap
page read and write
133F000
heap
page read and write
FF5000
heap
page read and write
1A2DBF68000
trusted library allocation
page read and write
7FFAAC466000
trusted library allocation
page execute and read and write
7FFAAC3CB000
trusted library allocation
page execute and read and write
7FFAAC4C2000
trusted library allocation
page execute and read and write
12CC7000
trusted library allocation
page read and write
400000
heap
page read and write
F60000
heap
page read and write
30C1000
trusted library allocation
page read and write
1A2D975E000
heap
page read and write
1A2DB588000
heap
page read and write
13C9000
heap
page read and write
7FFAAC541000
trusted library allocation
page read and write
1A2D9490000
heap
page read and write
1CA47000
stack
page read and write
1A2DB3A1000
heap
page read and write
2CEA000
trusted library allocation
page read and write
7FFAAC560000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
22B0000
heap
page read and write
1A2DB557000
heap
page read and write
1A2DB4A1000
heap
page read and write
7FFAAC3B2000
trusted library allocation
page read and write
1C40C000
stack
page read and write
1C130000
heap
page read and write
1B491000
heap
page read and write
133D000
heap
page read and write
7FFAAC3A4000
trusted library allocation
page read and write
7FFAAC540000
trusted library allocation
page read and write
1A2DB74A000
heap
page read and write
7FFAAC3B0000
trusted library allocation
page read and write
1A2D9681000
heap
page read and write
1C70C000
stack
page read and write
250F000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
1A2DB55B000
heap
page read and write
1300000
heap
page read and write
7FFAAC3A0000
trusted library allocation
page read and write
7FFAAC3C4000
trusted library allocation
page read and write
7FFAAC3B6000
trusted library allocation
page read and write
1A2D968A000
heap
page read and write
1A2DB89D000
heap
page read and write
7FFAAC456000
trusted library allocation
page read and write
1C117000
heap
page read and write
1BB1E000
stack
page read and write
7FFAAC460000
trusted library allocation
page execute and read and write
7FFAAC54C000
trusted library allocation
page read and write
1C188000
heap
page read and write
7FFAAC3B4000
trusted library allocation
page read and write
1A2DB597000
heap
page read and write
1330000
trusted library section
page read and write
7FFAAC537000
trusted library allocation
page read and write
1A2DBBC0000
heap
page read and write
1450000
heap
page read and write
F9A000
heap
page read and write
1370000
trusted library allocation
page read and write
1C197000
heap
page read and write
1CC4C000
stack
page read and write
E80000
heap
page read and write
2894000
trusted library allocation
page read and write
1A2DB56F000
heap
page read and write
7FFAAC52C000
trusted library allocation
page read and write
7FFAAC470000
trusted library allocation
page execute and read and write
B05000
heap
page read and write
7FFAAC3CD000
trusted library allocation
page execute and read and write
1A2DB4A0000
heap
page read and write
323D000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page execute and read and write
7FFAAC3FC000
trusted library allocation
page execute and read and write
131D1000
trusted library allocation
page read and write
250B000
trusted library allocation
page read and write
1C74E000
stack
page read and write
1A2DBF60000
trusted library allocation
page read and write
22CD000
trusted library allocation
page read and write
7FFAAC3A4000
trusted library allocation
page read and write
1B04B000
stack
page read and write
1650000
trusted library allocation
page read and write
48C000
heap
page read and write
1BA8D000
stack
page read and write
1AE40000
heap
page execute and read and write
1A2D9697000
heap
page read and write
22EA000
trusted library allocation
page read and write
17D0000
heap
page read and write
1A2DB576000
heap
page read and write
7FFAAC476000
trusted library allocation
page execute and read and write
1A2D9685000
heap
page read and write
7FFB1E0E0000
unkown
page readonly
1A2D9744000
heap
page read and write
863000
trusted library allocation
page read and write
1A2DB578000
heap
page read and write
6F3000
heap
page read and write
7FFAAC3C4000
trusted library allocation
page read and write
1455000
heap
page read and write
7FFAAC545000
trusted library allocation
page read and write
1B14E000
stack
page read and write
1A2D9744000
heap
page read and write
1B7CB000
stack
page read and write
711000
heap
page read and write
1C11A000
heap
page read and write
7FFAAC486000
trusted library allocation
page execute and read and write
1A2DB57E000
heap
page read and write
1C185000
heap
page read and write
1B75C000
stack
page read and write
1A2DB567000
heap
page read and write
1150000
heap
page read and write
322C000
trusted library allocation
page read and write
7F0000
heap
page read and write
7FFAAC547000
trusted library allocation
page read and write
1C190000
heap
page read and write
21EE000
stack
page read and write
7FFAAC3C0000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page read and write
7FFAAC3B2000
trusted library allocation
page read and write
1BF90000
heap
page read and write
1A2DB56F000
heap
page read and write
7FFAAC4B0000
trusted library allocation
page execute and read and write
8AD000
heap
page read and write
7FFAAC3BC000
trusted library allocation
page read and write
1A2DB56F000
heap
page read and write
1ACF0000
trusted library allocation
page read and write
7FFAAC3A2000
trusted library allocation
page read and write
291A000
trusted library allocation
page read and write
1AF80000
trusted library allocation
page read and write
7FFAAC3FC000
trusted library allocation
page execute and read and write
7FFAAC4C6000
trusted library allocation
page execute and read and write
1A2DBF50000
heap
page read and write
7FFAAC54E000
trusted library allocation
page read and write
F86000
heap
page read and write
73E000
heap
page read and write
713FFFE000
stack
page read and write
202000
unkown
page readonly
1BC9E000
stack
page read and write
7FFAAC3DC000
trusted library allocation
page execute and read and write
7FFAAC486000
trusted library allocation
page execute and read and write
1705000
heap
page read and write
7FFAAC4D4000
trusted library allocation
page execute and read and write
7F5000
heap
page read and write
7FFAAC3B4000
trusted library allocation
page read and write
7FFAAC3CD000
trusted library allocation
page execute and read and write
7FFAAC4CB000
trusted library allocation
page execute and read and write
744000
heap
page read and write
There are 621 hidden memdumps, click here to show them.