IOC Report
QT4aLb3P98.exe

loading gif

Files

File Path
Type
Category
Malicious
QT4aLb3P98.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\Windows Defender\en-GB\wRRcPdViqk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Defender\en-GB\wRRcPdViqk.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\QT4aLb3P98.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\eE9QbXcUOX.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Media\Sonata\wRRcPdViqk.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Defender\en-GB\62cf92e5da7ec3
JPEG 2000 image
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wRRcPdViqk.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\wLOamAKQX5
ASCII text, with no line terminators
dropped
C:\Windows\Media\Sonata\62cf92e5da7ec3
ASCII text, with very long lines (790), with no line terminators
dropped
C:\Windows\Media\Sonata\wRRcPdViqk.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QT4aLb3P98.exe
"C:\Users\user\Desktop\QT4aLb3P98.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "wRRcPdViqkw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Defender\en-GB\wRRcPdViqk.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "wRRcPdViqk" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-GB\wRRcPdViqk.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "wRRcPdViqkw" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Defender\en-GB\wRRcPdViqk.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "wRRcPdViqkw" /sc MINUTE /mo 6 /tr "'C:\Windows\Media\Sonata\wRRcPdViqk.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "wRRcPdViqk" /sc ONLOGON /tr "'C:\Windows\Media\Sonata\wRRcPdViqk.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "wRRcPdViqkw" /sc MINUTE /mo 11 /tr "'C:\Windows\Media\Sonata\wRRcPdViqk.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\eE9QbXcUOX.bat"
malicious
C:\Windows\Media\Sonata\wRRcPdViqk.exe
C:\Windows\Media\Sonata\wRRcPdViqk.exe
malicious
C:\Windows\Media\Sonata\wRRcPdViqk.exe
C:\Windows\Media\Sonata\wRRcPdViqk.exe
malicious
C:\Windows\Media\Sonata\wRRcPdViqk.exe
"C:\Windows\Media\Sonata\wRRcPdViqk.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://a1009608.xsph.ru/
unknown
malicious
http://a1009608.xsph.ru/1132d6f3.php?rgHy1i1qGuabZNE=KZftVioRcmp7cZPF&3f1b5944bfad4eb3eab4f036622470d5=3fcabe54654b82392e895aa4c4e7b395&a9d3e3cdc71e35b96ad20cf4efbd4740=gY3MmNzQjNkhTNzE2M1YWZwAjZ1QTZ0ITO1Y2NmVmY4YDNwEzYjZmM&rgHy1i1qGuabZNE=KZftVioRcmp7cZPF
141.8.192.103
malicious
http://a1009608.xsph.ru
unknown
malicious
http://a1009608.xsph.ru/@=MjZ2QmMzETM
malicious
http://a1009608.xsph.ru/1132d6f3.php?rgHy1i1qGuabZNE=KZftVioRcmp7cZPF&3f1b5944bfad4eb3eab4f036622470
unknown
malicious
https://cp.sprinthost.ru
unknown
https://index.from.sh/pages/game.html
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cp.sprinthost.ru/auth/login
unknown

Domains

Name
IP
Malicious
a1009608.xsph.ru
141.8.192.103
malicious

IPs

IP
Domain
Country
Malicious
141.8.192.103
a1009608.xsph.ru
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\a17ffecd695de276adbd77f3335e75a96d6964b0
0b3b5211087f96787fdda4ad353e5bf3ace489e5
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wRRcPdViqk_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
24D1000
trusted library allocation
page read and write
malicious
1327F000
trusted library allocation
page read and write
malicious
3271000
trusted library allocation
page read and write
malicious
2FB1000
trusted library allocation
page read and write
malicious
2EE1000
trusted library allocation
page read and write
malicious
3429000
trusted library allocation
page read and write
malicious
1BFAE000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B94B000
trusted library allocation
page read and write
BCF000
stack
page read and write
10C3000
heap
page read and write
7FFD9B891000
trusted library allocation
page execute and read and write
114F000
heap
page read and write
EA0000
unkown
page readonly
87D000
heap
page read and write
3B0000
heap
page read and write
1385000
heap
page read and write
7FFD9B90A000
trusted library allocation
page read and write
112E000
heap
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
180BDBC0000
heap
page read and write
3448000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
1B71D000
stack
page read and write
1795000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1765000
heap
page read and write
7FFD9B916000
trusted library allocation
page read and write
1C324000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
1770000
trusted library section
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
1B2F2000
stack
page read and write
7FFD9B762000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
848000
heap
page read and write
7FFD9B941000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1123000
heap
page read and write
1C318000
heap
page read and write
12FC1000
trusted library allocation
page read and write
1BD6E000
stack
page read and write
2633000
trusted library allocation
page read and write
2595000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2E1E000
stack
page read and write
1147000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B792000
trusted library allocation
page read and write
1335000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
1301B000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1AF10000
trusted library allocation
page read and write
87B000
heap
page read and write
2DC0000
heap
page read and write
14CB000
heap
page read and write
1330000
heap
page read and write
1102000
heap
page read and write
9C0000
heap
page read and write
1B97E000
stack
page read and write
2625000
trusted library allocation
page read and write
9B0000
heap
page execute and read and write
3D0000
heap
page read and write
1BDAE000
stack
page read and write
7FF3FF080000
trusted library allocation
page execute and read and write
1000FE000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
8A5000
heap
page read and write
344A000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1BD3E000
stack
page read and write
1BCA0000
heap
page execute and read and write
1050000
heap
page read and write
1AEF0000
heap
page execute and read and write
13271000
trusted library allocation
page read and write
DE6000
stack
page read and write
7F0000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
1C35F000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1BB6F000
stack
page read and write
10B9000
heap
page read and write
7FFD9B978000
trusted library allocation
page read and write
180BDA00000
heap
page read and write
1C31D000
heap
page read and write
830000
heap
page read and write
180BDA22000
heap
page read and write
1BEAE000
stack
page read and write
10AE000
heap
page read and write
2631000
trusted library allocation
page read and write
1B3FE000
stack
page read and write
116A000
heap
page read and write
135F000
stack
page read and write
1700000
trusted library allocation
page read and write
1316000
stack
page read and write
1380000
heap
page read and write
1BA60000
heap
page execute and read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
323E000
stack
page read and write
1327D000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page read and write
99E000
stack
page read and write
1AFFE000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
10BA000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
150F000
heap
page read and write
1088000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B777000
trusted library allocation
page read and write
136B5000
trusted library allocation
page read and write
124DF000
trusted library allocation
page read and write
7FFD9B8BA000
trusted library allocation
page execute and read and write
950000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1BE4A000
stack
page read and write
2F9F000
trusted library allocation
page read and write
180BD9E0000
heap
page read and write
153E000
stack
page read and write
810000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
2ED0000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1295000
heap
page read and write
1C364000
heap
page read and write
13A0000
trusted library allocation
page read and write
1BC4E000
stack
page read and write
7FFD9B8B6000
trusted library allocation
page execute and read and write
180BDA07000
heap
page read and write
2FA2000
trusted library allocation
page read and write
1C8DA000
heap
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
10D6000
heap
page read and write
7FFD9B947000
trusted library allocation
page read and write
1460000
heap
page read and write
1C337000
heap
page read and write
1B9FE000
stack
page read and write
7FFD9B88A000
trusted library allocation
page execute and read and write
7FFD9B927000
trusted library allocation
page read and write
13278000
trusted library allocation
page read and write
1C2B0000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B89C000
trusted library allocation
page execute and read and write
D86000
stack
page read and write
1C34A000
heap
page read and write
1B8AE000
stack
page read and write
7FFD9B886000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
7FFD9B95F000
trusted library allocation
page read and write
1BBFE000
stack
page read and write
8A7000
heap
page read and write
12EED000
trusted library allocation
page read and write
1C4CD000
stack
page read and write
12FBD000
trusted library allocation
page read and write
7FFD9B991000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1BC64000
stack
page read and write
12C0000
trusted library allocation
page read and write
159E000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
1C2F9000
heap
page read and write
1B4FE000
stack
page read and write
7FFD9B92B000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
126F0000
trusted library allocation
page read and write
C25000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
14A6000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1AFE0000
trusted library allocation
page read and write
1C2AE000
stack
page read and write
EA2000
unkown
page readonly
1080000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
2F96000
trusted library allocation
page read and write
1B53D000
stack
page read and write
26B4000
trusted library allocation
page read and write
7FFD9B92B000
trusted library allocation
page read and write
FBE000
unkown
page readonly
7FFD9B7B4000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
9C5000
heap
page read and write
12FA5000
trusted library allocation
page read and write
159B000
heap
page read and write
7FFD9B90C000
trusted library allocation
page read and write
1740000
trusted library section
page read and write
1285D000
trusted library allocation
page read and write
12EF1000
trusted library allocation
page read and write
1790000
heap
page read and write
9A0000
heap
page read and write
1BCFD000
stack
page read and write
1B9BE000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
12FB1000
trusted library allocation
page read and write
1B7FC000
stack
page read and write
7FFD9B90A000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
1730000
heap
page execute and read and write
14C0000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1363F000
trusted library allocation
page read and write
7FFD9B971000
trusted library allocation
page read and write
1BE63000
stack
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
2D50000
heap
page execute and read and write
ACF000
stack
page read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1760000
heap
page read and write
10E6000
heap
page read and write
10BD000
heap
page read and write
1C2D6000
heap
page read and write
109C000
heap
page read and write
1518000
heap
page read and write
1512000
heap
page read and write
10FE000
heap
page read and write
1C374000
heap
page read and write
1BD44000
stack
page read and write
1420000
heap
page read and write
EA0000
unkown
page readonly
1290000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
1B501000
heap
page read and write
FC2000
unkown
page readonly
1470000
heap
page read and write
7FFD9B933000
trusted library allocation
page read and write
344F000
trusted library allocation
page read and write
1B46D000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B94A000
trusted library allocation
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
1B1F3000
stack
page read and write
2611000
trusted library allocation
page read and write
260F000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
DD0000
heap
page read and write
2639000
trusted library allocation
page read and write
2660000
trusted library allocation
page read and write
1020000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
6F6000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B773000
trusted library allocation
page read and write
380000
heap
page read and write
12F0000
trusted library allocation
page read and write
12EE1000
trusted library allocation
page read and write
1C8DC000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1C396000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1560000
heap
page read and write
840000
heap
page read and write
7FFD9B7A7000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B90C000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B971000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
12F4B000
trusted library allocation
page read and write
180BDB00000
heap
page read and write
2FFD000
trusted library allocation
page read and write
390000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1BB4E000
stack
page read and write
1C7CE000
stack
page read and write
1C8C0000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
12EE8000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BAFE000
stack
page read and write
14E5000
heap
page read and write
10D0000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
154F000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1B541000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
1BF4E000
stack
page read and write
2573000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1266D000
trusted library allocation
page read and write
189E000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B766000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1C050000
heap
page read and write
1080000
trusted library allocation
page read and write
10017E000
stack
page read and write
7FFD9B93E000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1C0A3000
stack
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
12FB8000
trusted library allocation
page read and write
8EC000
heap
page read and write
1C1AE000
stack
page read and write
1BBB0000
heap
page read and write
1C36B000
heap
page read and write
109B000
heap
page read and write
1B0FE000
stack
page read and write
12595000
trusted library allocation
page read and write
180BDA28000
heap
page read and write
2F9C000
trusted library allocation
page read and write
124D1000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
7FFD9B923000
trusted library allocation
page read and write
7FFD9B923000
trusted library allocation
page read and write
12FB3000
trusted library allocation
page read and write
24CE000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1475000
heap
page read and write
7FFD9B93C000
trusted library allocation
page read and write
12EE3000
trusted library allocation
page read and write
12530000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
10E8000
heap
page read and write
14E3000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B90E000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
143E000
stack
page read and write
14AC000
heap
page read and write
1C2EA000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B77C000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
10FC000
heap
page read and write
169E000
stack
page read and write
3315000
trusted library allocation
page read and write
2FA0000
heap
page execute and read and write
7FFD9B93C000
trusted library allocation
page read and write
1B8B0000
heap
page read and write
1AA5E000
stack
page read and write
10BF000
heap
page read and write
7FFD9B95D000
trusted library allocation
page read and write
268B000
trusted library allocation
page read and write
14C8000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
2656000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2ECE000
stack
page read and write
3260000
heap
page read and write
1370000
heap
page execute and read and write
7FFD9B94E000
trusted library allocation
page read and write
1C303000
heap
page read and write
1340000
heap
page read and write
180BDA25000
heap
page read and write
1020000
heap
page read and write
1AE9E000
stack
page read and write
1A500000
trusted library allocation
page read and write
7FFD9B77C000
trusted library allocation
page read and write
1C043000
stack
page read and write
1090000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
10007B000
stack
page read and write
7FFD9B97B000
trusted library allocation
page read and write
33F5000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B975000
trusted library allocation
page read and write
14A0000
heap
page read and write
1CBBB000
stack
page read and write
199F000
stack
page read and write
1C353000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
C20000
heap
page read and write
1253B000
trusted library allocation
page read and write
7FFD9B903000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
7FFD9B953000
trusted library allocation
page read and write
10B0000
heap
page read and write
7FFD9B971000
trusted library allocation
page read and write
7FFD9B95D000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
7FFD9B903000
trusted library allocation
page read and write
157E000
stack
page read and write
1C330000
heap
page read and write
7FFD9B777000
trusted library allocation
page read and write
7FFD9B944000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
7FFD9B8C1000
trusted library allocation
page execute and read and write
1BF6E000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
180BD900000
heap
page read and write
10D3000
heap
page read and write
DC0000
heap
page read and write
124DD000
trusted library allocation
page read and write
1C6CE000
stack
page read and write
1BA40000
heap
page read and write
1096000
heap
page read and write
10BD000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
180BDA16000
heap
page read and write
1250000
heap
page read and write
1C37C000
heap
page read and write
1B2A0000
trusted library allocation
page read and write
There are 410 hidden memdumps, click here to show them.