IOC Report
QLTa31hZsN.exe

loading gif

Files

File Path
Type
Category
Malicious
QLTa31hZsN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\QLTa31hZsN.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\build.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Nov 25 11:58:58 2024, mtime=Mon Nov 25 11:58:58 2024, atime=Mon Nov 25 11:58:58 2024, length=41472, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QLTa31hZsN.exe
"C:\Users\user\Desktop\QLTa31hZsN.exe"
malicious
C:\Users\user\AppData\Local\Temp\XClient.exe
"C:\Users\user\AppData\Local\Temp\XClient.exe"
malicious
C:\Users\user\AppData\Local\Temp\build.exe
"C:\Users\user\AppData\Local\Temp\build.exe"
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63

IPs

IP
Domain
Country
Malicious
212.162.149.53
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
XClient
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
12329000
trusted library allocation
page read and write
malicious
602000
unkown
page readonly
malicious
123B7000
trusted library allocation
page read and write
malicious
92000
unkown
page readonly
malicious
2321000
trusted library allocation
page read and write
malicious
12402000
trusted library allocation
page read and write
malicious
2911000
trusted library allocation
page read and write
malicious
4F7000
stack
page read and write
4E7E000
stack
page read and write
7FF887BFD000
trusted library allocation
page execute and read and write
671E000
heap
page read and write
2470000
trusted library allocation
page read and write
8C2000
trusted library allocation
page read and write
1B04E000
stack
page read and write
BDC000
heap
page read and write
A20000
heap
page read and write
C7000
unkown
page readonly
879000
heap
page read and write
6940000
trusted library allocation
page execute and read and write
1AF5E000
stack
page read and write
5CCC000
stack
page read and write
1B8E6000
heap
page read and write
7FF887C14000
trusted library allocation
page read and write
5D9000
heap
page read and write
1B906000
heap
page read and write
1BDCF000
stack
page read and write
7FF887C5C000
trusted library allocation
page execute and read and write
1B63C000
stack
page read and write
6520000
heap
page read and write
2A35000
trusted library allocation
page read and write
62000
unkown
page readonly
2897000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
4BC000
heap
page read and write
CE5000
heap
page read and write
1B060000
heap
page read and write
790000
heap
page read and write
25B0000
heap
page read and write
C0F000
heap
page read and write
28B7000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
6FE0000
heap
page read and write
38DD000
trusted library allocation
page read and write
4B0E000
stack
page read and write
7FF887C22000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
58D0000
heap
page read and write
1B840000
heap
page read and write
5700000
trusted library allocation
page read and write
2945000
trusted library allocation
page read and write
4EE2000
trusted library allocation
page read and write
59B5000
heap
page read and write
E10000
heap
page read and write
1C13F000
stack
page read and write
C8F000
heap
page read and write
7FF887C3B000
trusted library allocation
page execute and read and write
850000
heap
page read and write
6636000
heap
page read and write
4990000
trusted library allocation
page execute and read and write
7FF887BF3000
trusted library allocation
page execute and read and write
9BB000
stack
page read and write
1C440000
heap
page read and write
2A8B000
trusted library allocation
page read and write
26BA000
trusted library allocation
page read and write
7FF887C14000
trusted library allocation
page read and write
56D0000
trusted library allocation
page execute and read and write
9C0000
trusted library allocation
page read and write
1AC9B000
heap
page read and write
2A80000
trusted library allocation
page read and write
7FF887CB0000
trusted library allocation
page read and write
6E0000
heap
page read and write
38D0000
trusted library allocation
page read and write
667F000
heap
page read and write
57B0000
trusted library allocation
page read and write
7FF887C34000
trusted library allocation
page read and write
7FF887C04000
trusted library allocation
page read and write
6CCE000
stack
page read and write
28EE000
trusted library allocation
page read and write
9FE000
trusted library allocation
page read and write
2CEE000
stack
page read and write
23D8000
trusted library allocation
page read and write
97E000
stack
page read and write
279F000
trusted library allocation
page read and write
3732000
trusted library allocation
page read and write
7A0000
heap
page read and write
271F000
trusted library allocation
page read and write
1B24E000
stack
page read and write
49D0000
trusted library allocation
page read and write
7FF887C2D000
trusted library allocation
page execute and read and write
289C000
trusted library allocation
page read and write
38EC000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
1B77E000
stack
page read and write
7FF887C12000
trusted library allocation
page read and write
6A0000
heap
page read and write
1B25E000
stack
page read and write
EF0000
trusted library allocation
page read and write
2310000
heap
page execute and read and write
8C0000
trusted library allocation
page read and write
2AAE000
trusted library allocation
page read and write
1BF3D000
stack
page read and write
D31000
stack
page read and write
7FF887CAC000
trusted library allocation
page execute and read and write
4C70000
heap
page read and write
E53000
heap
page read and write
6E70000
heap
page read and write
27FE000
trusted library allocation
page read and write
49A5000
trusted library allocation
page read and write
37FA000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
2A42000
trusted library allocation
page read and write
E65000
heap
page read and write
1C43A000
stack
page read and write
450000
heap
page read and write
7FF887CC0000
trusted library allocation
page execute and read and write
6629000
trusted library allocation
page read and write
66FE000
heap
page read and write
594E000
heap
page read and write
F94000
heap
page read and write
34E3000
trusted library allocation
page read and write
2614000
trusted library allocation
page read and write
86AE000
stack
page read and write
4920000
trusted library allocation
page read and write
920000
trusted library allocation
page execute and read and write
7FF887C0D000
trusted library allocation
page execute and read and write
856E000
stack
page read and write
389E000
trusted library allocation
page read and write
1B830000
heap
page execute and read and write
1BA36000
stack
page read and write
9F0000
trusted library allocation
page read and write
296D000
trusted library allocation
page read and write
49C000
heap
page read and write
23CE000
stack
page read and write
6830000
trusted library allocation
page read and write
271C000
trusted library allocation
page read and write
48E4000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
66F5000
heap
page read and write
48EE000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
7FF887C02000
trusted library allocation
page read and write
1022000
heap
page read and write
EA0000
heap
page read and write
470000
heap
page read and write
2974000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
4906000
trusted library allocation
page read and write
7FF887C30000
trusted library allocation
page read and write
58FD000
heap
page read and write
297F000
trusted library allocation
page read and write
5790000
trusted library allocation
page execute and read and write
A27000
heap
page read and write
6A5000
heap
page read and write
A2A000
heap
page read and write
385A000
trusted library allocation
page read and write
1034000
heap
page read and write
38C6000
trusted library allocation
page read and write
1B93E000
stack
page read and write
3849000
trusted library allocation
page read and write
5999000
heap
page read and write
38F5000
trusted library allocation
page read and write
37F0000
trusted library allocation
page read and write
634E000
stack
page read and write
1B6BE000
stack
page read and write
2934000
trusted library allocation
page read and write
7FF887C04000
trusted library allocation
page read and write
663F000
heap
page read and write
1B53D000
stack
page read and write
64C0000
trusted library allocation
page read and write
7E0000
heap
page read and write
6839000
trusted library allocation
page read and write
2581000
trusted library allocation
page read and write
6D0000
trusted library allocation
page read and write
7FF887C3D000
trusted library allocation
page execute and read and write
596B000
heap
page read and write
5F3000
heap
page read and write
2A63000
trusted library allocation
page read and write
6630000
heap
page read and write
58E3000
heap
page read and write
28AC000
trusted library allocation
page read and write
C03000
heap
page read and write
299C000
trusted library allocation
page read and write
12CF8000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
24A1000
trusted library allocation
page read and write
A15000
trusted library allocation
page read and write
672E000
heap
page read and write
2890000
trusted library allocation
page read and write
6733000
heap
page read and write
68A000
heap
page read and write
7FF4706D0000
trusted library allocation
page execute and read and write
2856000
trusted library allocation
page read and write
275D000
trusted library allocation
page read and write
1255000
heap
page read and write
25E2000
trusted library allocation
page read and write
26CB000
trusted library allocation
page read and write
490000
heap
page read and write
2A75000
trusted library allocation
page read and write
7FF887C20000
trusted library allocation
page read and write
8D8000
heap
page read and write
53E000
stack
page read and write
1AF40000
heap
page execute and read and write
5720000
trusted library allocation
page read and write
663A000
heap
page read and write
7FF887CC0000
trusted library allocation
page read and write
5939000
heap
page read and write
7FF887C14000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
597B000
heap
page read and write
1B14E000
stack
page read and write
5A10000
trusted library allocation
page execute and read and write
2AFC000
trusted library allocation
page read and write
12718000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
6650000
heap
page read and write
7C0000
heap
page read and write
4940000
heap
page read and write
6620000
trusted library allocation
page read and write
505000
heap
page read and write
7FF887C5C000
trusted library allocation
page execute and read and write
6694000
heap
page read and write
4BA000
heap
page read and write
2AB5000
trusted library allocation
page read and write
12321000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
7FF887C0D000
trusted library allocation
page execute and read and write
7FF887CE6000
trusted library allocation
page execute and read and write
1250000
heap
page read and write
5B0000
heap
page read and write
287D000
trusted library allocation
page read and write
2626000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
270D000
trusted library allocation
page read and write
7FF887C12000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
1C33B000
stack
page read and write
7FF887C1D000
trusted library allocation
page execute and read and write
7FF887C10000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
2800000
heap
page read and write
598D000
heap
page read and write
8C6000
trusted library allocation
page execute and read and write
38E3000
trusted library allocation
page read and write
66C8000
heap
page read and write
4B1E000
trusted library allocation
page read and write
2A4F000
trusted library allocation
page read and write
7FF887CCC000
trusted library allocation
page execute and read and write
34C1000
trusted library allocation
page read and write
5D1000
stack
page read and write
90000
unkown
page readonly
5A5C000
stack
page read and write
4ED6000
trusted library allocation
page read and write
1A8AD000
stack
page read and write
6D0E000
stack
page read and write
6FF6000
heap
page read and write
383E000
trusted library allocation
page read and write
6FDE000
stack
page read and write
7FF887D30000
trusted library allocation
page execute and read and write
692E000
trusted library allocation
page read and write
1BE30000
heap
page read and write
2711000
trusted library allocation
page read and write
12711000
trusted library allocation
page read and write
2953000
trusted library allocation
page read and write
261A000
trusted library allocation
page read and write
1B73C000
stack
page read and write
4B20000
trusted library allocation
page read and write
6EDB000
stack
page read and write
440000
heap
page read and write
1445000
heap
page read and write
691F000
stack
page read and write
7FF887DA0000
trusted library allocation
page read and write
6454000
trusted library allocation
page read and write
6848000
trusted library allocation
page read and write
7FF887CD0000
trusted library allocation
page execute and read and write
8DB000
trusted library allocation
page execute and read and write
4B15000
trusted library allocation
page read and write
6C0000
trusted library allocation
page read and write
4D4000
heap
page read and write
38FF000
trusted library allocation
page read and write
4982000
trusted library allocation
page read and write
1E0000
heap
page read and write
8AA000
heap
page read and write
7FF887CE6000
trusted library allocation
page execute and read and write
12713000
trusted library allocation
page read and write
25A0000
heap
page read and write
1B91E000
heap
page read and write
B35000
heap
page read and write
1F5000
stack
page read and write
64B0000
trusted library allocation
page read and write
7FF887C00000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
B50000
heap
page read and write
284E000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
2700000
heap
page execute and read and write
66B8000
heap
page read and write
1B330000
heap
page execute and read and write
FA2000
heap
page read and write
7EE70000
trusted library allocation
page execute and read and write
3856000
trusted library allocation
page read and write
66F1000
heap
page read and write
7FF887DC0000
trusted library allocation
page read and write
4ACE000
stack
page read and write
12323000
trusted library allocation
page read and write
BA000
unkown
page readonly
6642000
heap
page read and write
4D1000
heap
page read and write
66E4000
heap
page read and write
6659000
heap
page read and write
293D000
trusted library allocation
page read and write
2863000
trusted library allocation
page read and write
8D6000
heap
page read and write
34DB000
trusted library allocation
page read and write
1AE9D000
stack
page read and write
7FF887C1D000
trusted library allocation
page execute and read and write
38B0000
trusted library allocation
page read and write
64B4000
trusted library allocation
page read and write
1B891000
heap
page read and write
1B875000
heap
page read and write
4BF000
heap
page read and write
7FF887DD0000
trusted library allocation
page execute and read and write
BD6000
heap
page read and write
2990000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
7FF887C6C000
trusted library allocation
page execute and read and write
870000
heap
page read and write
2960000
trusted library allocation
page read and write
6A6000
heap
page read and write
4ED1000
trusted library allocation
page read and write
C3B000
heap
page read and write
1B8F8000
heap
page read and write
59C4000
heap
page read and write
7FF887D20000
trusted library allocation
page execute and read and write
1B8D3000
heap
page read and write
1BC3A000
stack
page read and write
2A96000
trusted library allocation
page read and write
270E000
stack
page read and write
38F0000
trusted library allocation
page read and write
459B000
stack
page read and write
49AA000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
DCC000
stack
page read and write
6C0000
trusted library allocation
page read and write
1B34E000
stack
page read and write
1B6F0000
heap
page read and write
69F0000
trusted library allocation
page execute and read and write
BD0000
heap
page read and write
26D6000
trusted library allocation
page read and write
5993000
heap
page read and write
644D000
stack
page read and write
CBC000
heap
page read and write
34AF000
trusted library allocation
page read and write
38F2000
trusted library allocation
page read and write
898000
heap
page read and write
5710000
trusted library allocation
page read and write
4D7F000
stack
page read and write
A00000
heap
page execute and read and write
38B6000
trusted library allocation
page read and write
26BF000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
1440000
heap
page read and write
BF2000
heap
page read and write
64C8000
trusted library allocation
page read and write
2765000
trusted library allocation
page read and write
930000
heap
page read and write
3897000
trusted library allocation
page read and write
1B7FE000
stack
page read and write
2CF1000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
48FE000
trusted library allocation
page read and write
8F0000
trusted library allocation
page read and write
7FF887C10000
trusted library allocation
page read and write
1F0000
heap
page read and write
3850000
trusted library allocation
page read and write
741000
stack
page read and write
F66000
heap
page read and write
D80000
heap
page read and write
684F000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
E80000
heap
page read and write
6697000
heap
page read and write
673D000
heap
page read and write
1C93C000
stack
page read and write
5BE000
heap
page read and write
59D0000
trusted library allocation
page execute and read and write
C40000
heap
page read and write
B53000
trusted library allocation
page read and write
3837000
trusted library allocation
page read and write
7FF887D90000
trusted library allocation
page read and write
8D2000
trusted library allocation
page read and write
278D000
trusted library allocation
page read and write
916000
heap
page read and write
1180000
heap
page execute and read and write
BFA000
heap
page read and write
6B0000
trusted library allocation
page read and write
12CF3000
trusted library allocation
page read and write
56AF000
stack
page read and write
1B05E000
stack
page read and write
49C0000
trusted library allocation
page read and write
6DD000
trusted library allocation
page execute and read and write
67BF000
heap
page read and write
5E6000
heap
page read and write
6715000
heap
page read and write
27C7000
trusted library allocation
page read and write
A2E000
heap
page read and write
7FF887C13000
trusted library allocation
page execute and read and write
599C000
heap
page read and write
820000
heap
page read and write
6626000
trusted library allocation
page read and write
5957000
heap
page read and write
F40000
heap
page read and write
595F000
heap
page read and write
2773000
trusted library allocation
page read and write
595B000
heap
page read and write
7630000
heap
page read and write
4970000
heap
page read and write
258E000
stack
page read and write
684A000
trusted library allocation
page read and write
6E4E000
stack
page read and write
490D000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
81E000
stack
page read and write
1AB8D000
stack
page read and write
39FF000
trusted library allocation
page read and write
2100000
heap
page execute and read and write
1B35E000
stack
page read and write
7FF887DE0000
trusted library allocation
page execute and read and write
8AC000
heap
page read and write
496000
heap
page read and write
1B88C000
heap
page read and write
846E000
stack
page read and write
7FF887D10000
trusted library allocation
page execute and read and write
1B89F000
heap
page read and write
60000
unkown
page readonly
1BA3F000
stack
page read and write
1B43E000
stack
page read and write
1B880000
heap
page read and write
48E0000
trusted library allocation
page read and write
600000
unkown
page readonly
8BE000
stack
page read and write
E60000
heap
page read and write
85AD000
stack
page read and write
9D0000
trusted library allocation
page read and write
290B000
stack
page read and write
2AF6000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
4EBE000
stack
page read and write
2AC3000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
34A1000
trusted library allocation
page read and write
7FF887DA0000
trusted library allocation
page read and write
7FF887C14000
trusted library allocation
page read and write
2490000
heap
page read and write
C11000
heap
page read and write
34CA000
trusted library allocation
page read and write
91E000
stack
page read and write
F8C000
heap
page read and write
6930000
trusted library allocation
page execute and read and write
3871000
trusted library allocation
page read and write
59BF000
heap
page read and write
2A6F000
trusted library allocation
page read and write
B30000
heap
page read and write
382A000
trusted library allocation
page read and write
59CE000
heap
page read and write
710000
heap
page read and write
48EB000
trusted library allocation
page read and write
26B5000
trusted library allocation
page read and write
4B30000
heap
page execute and read and write
1AE50000
heap
page read and write
7FF887C10000
trusted library allocation
page read and write
6CD000
trusted library allocation
page execute and read and write
6D4E000
stack
page read and write
49E1000
trusted library allocation
page read and write
4943000
heap
page read and write
685F000
trusted library allocation
page read and write
23A6000
trusted library allocation
page read and write
1B55B000
stack
page read and write
7FF887C10000
trusted library allocation
page read and write
68DE000
stack
page read and write
500000
heap
page read and write
7FF887CA0000
trusted library allocation
page read and write
7FF887C03000
trusted library allocation
page execute and read and write
12327000
trusted library allocation
page read and write
69DE000
stack
page read and write
699E000
stack
page read and write
592A000
heap
page read and write
B00000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
7FF887CB0000
trusted library allocation
page execute and read and write
685A000
trusted library allocation
page read and write
D6000
unkown
page readonly
FD2000
heap
page read and write
2754000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
1B45E000
stack
page read and write
387D000
trusted library allocation
page read and write
667000
heap
page read and write
4EEE000
trusted library allocation
page read and write
7FF887CD6000
trusted library allocation
page execute and read and write
1B877000
heap
page read and write
37F6000
trusted library allocation
page read and write
21A0000
heap
page read and write
7FF887C1D000
trusted library allocation
page execute and read and write
4EF1000
trusted library allocation
page read and write
29A7000
trusted library allocation
page read and write
17A000
stack
page read and write
49A0000
trusted library allocation
page read and write
660000
heap
page read and write
2794000
trusted library allocation
page read and write
FA0000
heap
page read and write
8D5000
trusted library allocation
page execute and read and write
22AE000
stack
page read and write
715000
heap
page read and write
C5E000
stack
page read and write
2844000
trusted library allocation
page read and write
1B894000
heap
page read and write
7FF887C03000
trusted library allocation
page execute and read and write
591B000
heap
page read and write
1B8AA000
heap
page read and write
B2F000
stack
page read and write
6E60000
trusted library allocation
page read and write
830000
heap
page read and write
2536000
trusted library allocation
page read and write
135E000
stack
page read and write
FCF000
heap
page read and write
6860000
trusted library allocation
page read and write
4912000
trusted library allocation
page read and write
594C000
heap
page read and write
7FF887C4C000
trusted library allocation
page execute and read and write
9F0000
unkown
page readonly
1BD34000
stack
page read and write
7FF887D20000
trusted library allocation
page execute and read and write
38E7000
trusted library allocation
page read and write
12922000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
55F000
heap
page read and write
29DD000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
3532000
trusted library allocation
page read and write
3552000
trusted library allocation
page read and write
C3D000
heap
page read and write
4EFA000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
4901000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
C2000
unkown
page readonly
12CF1000
trusted library allocation
page read and write
27A6000
trusted library allocation
page read and write
6E0000
trusted library allocation
page read and write
5907000
heap
page read and write
8CA000
trusted library allocation
page execute and read and write
CE0000
heap
page read and write
F6C000
heap
page read and write
6685000
heap
page read and write
7FF887CC6000
trusted library allocation
page read and write
4C3000
heap
page read and write
4B1B000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
60000
unkown
page readonly
7FF887CF6000
trusted library allocation
page execute and read and write
2623000
trusted library allocation
page read and write
8D7000
trusted library allocation
page execute and read and write
66A9000
heap
page read and write
1B27C000
stack
page read and write
900000
heap
page read and write
7FF887C0D000
trusted library allocation
page execute and read and write
6E90000
heap
page read and write
2617000
trusted library allocation
page read and write
38D6000
trusted library allocation
page read and write
6C4000
trusted library allocation
page read and write
C0D000
heap
page read and write
5BCE000
stack
page read and write
38FA000
trusted library allocation
page read and write
5A00000
trusted library allocation
page execute and read and write
678F000
heap
page read and write
6C3000
trusted library allocation
page execute and read and write
3866000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
4ECB000
trusted library allocation
page read and write
1B865000
heap
page read and write
B3E000
stack
page read and write
7FF887C20000
trusted library allocation
page read and write
690000
heap
page read and write
2AE4000
trusted library allocation
page read and write
2885000
trusted library allocation
page read and write
6855000
trusted library allocation
page read and write
55AF000
stack
page read and write
7FF887DB0000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
5B7C000
stack
page read and write
8A0000
heap
page read and write
668E000
heap
page read and write
38BA000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
59AE000
heap
page read and write
1BB33000
stack
page read and write
27BB000
trusted library allocation
page read and write
E60000
heap
page read and write
6870000
trusted library allocation
page read and write
677F000
heap
page read and write
FCD000
heap
page read and write
115F000
stack
page read and write
6832000
trusted library allocation
page read and write
B40000
heap
page execute and read and write
1A940000
trusted library allocation
page read and write
F60000
heap
page read and write
7FF887C1D000
trusted library allocation
page execute and read and write
12911000
trusted library allocation
page read and write
5A70000
trusted library allocation
page execute and read and write
57D000
stack
page read and write
7FF887BF4000
trusted library allocation
page read and write
27AB000
trusted library allocation
page read and write
E50000
heap
page read and write
381D000
trusted library allocation
page read and write
3806000
trusted library allocation
page read and write
B55000
heap
page read and write
5780000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
4C6E000
stack
page read and write
6E5000
heap
page read and write
There are 620 hidden memdumps, click here to show them.