IOC Report
719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CH5FQLPZHWQW5TXD_6eeabbae5e165c4a861c92134e9484f56eb98e6_b956fc39_9100153d-56bc-45e0-9f1e-ac46bf4ebbca\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71E3.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Jul 17 10:54:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73C8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER73E9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_01bay35h.on5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wddgtpb.1q3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3dxww1fj.1z2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfpcwqfp.mgt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eq54itpa.dze.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g2mxthd3.tl5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hitzmhp2.yhd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hkjvhu34.xn5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ompeodq2.eme.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ri3llwur.aoy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0lfl0vd.bd1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yfkjlebk.mfz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Jul 17 09:53:15 2024, mtime=Wed Jul 17 09:53:15 2024, atime=Wed Jul 17 09:53:15 2024, length=528384, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe
"C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe"
malicious
C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe
"C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '719#U665a) HBL# LMSIN2407028 (by SEA) PO# 4500577338, by 1x40' HQ.pdf.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7812 -s 2196
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
104.250.180.178
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://services.sunlightlabs.com/api
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.fontbureau.com/designers?
unknown
https://contoso.com/License
unknown
http://crl.microC
unknown
http://www.sakkal.comK
unknown
https://contoso.com/Icon
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
https://www.google.com/search?q=
unknown
http://www.goodfont.co.kr
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 34 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
ProgramId
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
FileId
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
LowerCaseLongPath
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
LongPathHash
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
Name
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
OriginalFileName
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
Publisher
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
Version
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
BinFileVersion
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
BinaryType
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
ProductName
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
ProductVersion
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
LinkDate
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
BinProductVersion
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
AppxPackageFullName
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
AppxPackageRelativeId
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
Size
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
Language
\REGISTRY\A\{f8fa5993-320c-29e3-4c1c-050e0b844bc2}\Root\InventoryApplicationFile\719#u665a) hbl# |9a13ed3f7300e7e2
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00EABCC9886
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2B31000
trusted library allocation
page read and write
malicious
2401000
trusted library allocation
page read and write
malicious
245F000
trusted library allocation
page read and write
malicious
71A0000
trusted library section
page read and write
malicious
4AAE000
stack
page read and write
8341000
heap
page read and write
7610000
trusted library allocation
page read and write
738E000
stack
page read and write
55FE000
stack
page read and write
49F2000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
54F0000
heap
page read and write
3457000
trusted library allocation
page read and write
7C58000
heap
page read and write
5C6A000
stack
page read and write
7CC1000
heap
page read and write
828D000
heap
page read and write
2D40000
trusted library allocation
page read and write
69A0000
heap
page read and write
51CD000
stack
page read and write
7CCB000
heap
page read and write
8100000
heap
page read and write
7C50000
heap
page read and write
1240000
heap
page read and write
2D20000
trusted library section
page read and write
6D1D000
stack
page read and write
5F00000
trusted library allocation
page read and write
717D000
stack
page read and write
2230000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
81C9000
stack
page read and write
59BC000
stack
page read and write
483F000
stack
page read and write
7290000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
74CE000
stack
page read and write
65C2000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
740E000
stack
page read and write
7D50000
trusted library allocation
page read and write
29AD000
trusted library allocation
page execute and read and write
650000
trusted library section
page read and write
7D12000
heap
page read and write
7570000
trusted library allocation
page read and write
7745000
heap
page read and write
7150000
heap
page execute and read and write
70DE000
stack
page read and write
758000
stack
page read and write
573E000
stack
page read and write
580000
heap
page read and write
6D60000
heap
page execute and read and write
6E4E000
stack
page read and write
10FB000
trusted library allocation
page execute and read and write
834E000
stack
page read and write
21E0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
1246000
heap
page read and write
79F0000
trusted library allocation
page read and write
4C1B000
stack
page read and write
7347000
heap
page read and write
2AC0000
heap
page read and write
46CE000
stack
page read and write
4A00000
trusted library allocation
page execute and read and write
6FFB000
heap
page read and write
7630000
trusted library allocation
page read and write
6EEC000
stack
page read and write
6D8000
heap
page read and write
7230000
heap
page execute and read and write
72BC000
heap
page read and write
3BB6000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
538E000
stack
page read and write
674000
trusted library allocation
page read and write
4C62000
trusted library allocation
page read and write
4357000
heap
page read and write
428E000
stack
page read and write
2D30000
trusted library allocation
page read and write
7C82000
heap
page read and write
43F0000
trusted library allocation
page execute and read and write
982E000
stack
page read and write
23DC000
stack
page read and write
496D000
trusted library allocation
page read and write
7AE000
stack
page read and write
72B7000
heap
page read and write
8110000
trusted library allocation
page execute and read and write
452E000
trusted library allocation
page read and write
2DF8000
heap
page read and write
7010000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
2DE7000
heap
page read and write
5D91000
trusted library allocation
page read and write
439D000
stack
page read and write
4534000
trusted library allocation
page read and write
4F71000
trusted library allocation
page read and write
53E000
stack
page read and write
10CE000
stack
page read and write
4CF0000
heap
page read and write
6CEE000
stack
page read and write
6A0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
7041000
heap
page read and write
700C000
heap
page read and write
456F000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
28D5000
heap
page read and write
700000
heap
page read and write
2DF0000
heap
page read and write
5DFC000
stack
page read and write
2DDE000
stack
page read and write
795E000
stack
page read and write
7020000
trusted library allocation
page read and write
A2E000
stack
page read and write
4510000
heap
page execute and read and write
3076000
heap
page read and write
727D000
stack
page read and write
8220000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page execute and read and write
4B20000
trusted library allocation
page execute and read and write
61D0000
heap
page read and write
7E70000
trusted library allocation
page read and write
86A3000
trusted library allocation
page read and write
4FBC000
trusted library allocation
page read and write
4925000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
4E39000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
689000
trusted library allocation
page read and write
88CE000
stack
page read and write
49A6000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
6D20000
heap
page read and write
3BDA000
trusted library allocation
page read and write
824F000
stack
page read and write
685E000
stack
page read and write
834C000
stack
page read and write
70A0000
trusted library allocation
page read and write
760000
heap
page readonly
8200000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
6DEF000
stack
page read and write
7AAD000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
118E000
stack
page read and write
6C0000
trusted library allocation
page read and write
71FE000
stack
page read and write
791F000
stack
page read and write
4CB9000
trusted library allocation
page read and write
4ECF000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
827D000
heap
page read and write
71C000
stack
page read and write
6E0000
heap
page read and write
3160000
trusted library allocation
page read and write
220A000
trusted library allocation
page execute and read and write
29B9000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
44DA000
stack
page read and write
6B90000
trusted library allocation
page read and write
6B10000
trusted library section
page read and write
1130000
heap
page read and write
5C20000
heap
page read and write
424C000
stack
page read and write
6B0000
heap
page read and write
441E000
stack
page read and write
3174000
trusted library allocation
page read and write
830E000
stack
page read and write
732D000
heap
page read and write
7BE0000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
2840000
heap
page read and write
972E000
stack
page read and write
2CE7000
heap
page read and write
670000
trusted library allocation
page read and write
69BD000
stack
page read and write
75E000
stack
page read and write
6C00000
heap
page read and write
7B60000
heap
page read and write
3173000
trusted library allocation
page execute and read and write
6E8E000
stack
page read and write
67DE000
stack
page read and write
34A5000
trusted library allocation
page read and write
448E000
stack
page read and write
54CF000
trusted library allocation
page read and write
2C7E000
stack
page read and write
7270000
trusted library allocation
page read and write
703E000
stack
page read and write
7320000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
4CCE000
stack
page read and write
76E000
stack
page read and write
4C6D000
stack
page read and write
69A000
trusted library allocation
page execute and read and write
851E000
stack
page read and write
4C5F000
stack
page read and write
8AE000
stack
page read and write
1147000
heap
page read and write
6D73000
heap
page read and write
4C82000
trusted library allocation
page read and write
21E3000
trusted library allocation
page execute and read and write
292E000
stack
page read and write
5469000
trusted library allocation
page read and write
D40000
heap
page read and write
5212000
trusted library allocation
page read and write
5E6F000
trusted library allocation
page read and write
6D78000
heap
page read and write
7D40000
trusted library allocation
page read and write
1120000
trusted library allocation
page execute and read and write
2D75000
trusted library allocation
page execute and read and write
734B000
stack
page read and write
75B0000
trusted library allocation
page read and write
6B7F000
stack
page read and write
3180000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
4540000
heap
page read and write
2938000
heap
page read and write
42B0000
heap
page read and write
4BB0000
trusted library allocation
page read and write
5143000
heap
page read and write
5F10000
heap
page read and write
72A2000
heap
page read and write
4851000
trusted library allocation
page read and write
7CF6000
heap
page read and write
7014000
heap
page read and write
5579000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
475E000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
49F6000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page execute and read and write
702C000
stack
page read and write
7FAB0000
trusted library allocation
page execute and read and write
712E000
stack
page read and write
43AC000
stack
page read and write
7B5F000
stack
page read and write
79A0000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
3130000
heap
page read and write
884E000
stack
page read and write
4EC7000
trusted library allocation
page read and write
443E000
stack
page read and write
4FBE000
trusted library allocation
page read and write
7315000
heap
page read and write
4940000
trusted library allocation
page read and write
707A000
stack
page read and write
518E000
stack
page read and write
80BD000
stack
page read and write
6AC6000
heap
page read and write
2B20000
heap
page execute and read and write
29D0000
heap
page read and write
6E30000
heap
page execute and read and write
6A7E000
stack
page read and write
5EFB000
stack
page read and write
6159000
stack
page read and write
7FD48000
trusted library allocation
page execute and read and write
7A20000
trusted library allocation
page read and write
80FE000
stack
page read and write
4520000
heap
page read and write
85F0000
heap
page read and write
4D4E000
stack
page read and write
6FDF000
heap
page read and write
2AC2000
heap
page read and write
803E000
stack
page read and write
549F000
stack
page read and write
6A5000
trusted library allocation
page execute and read and write
449D000
stack
page read and write
605C000
stack
page read and write
6AEC000
heap
page read and write
7B9A000
trusted library allocation
page read and write
292F000
stack
page read and write
229E000
stack
page read and write
61E0000
trusted library allocation
page execute and read and write
6D70000
heap
page read and write
249E000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
46D0000
heap
page readonly
5571000
trusted library allocation
page read and write
76D3000
heap
page read and write
2AEE000
stack
page read and write
2D10000
trusted library section
page read and write
5135000
trusted library allocation
page read and write
322D000
heap
page read and write
4780000
trusted library allocation
page execute and read and write
6920000
heap
page read and write
4B7C000
stack
page read and write
6ACD000
heap
page read and write
7030000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
5D8E000
trusted library allocation
page read and write
7D15000
heap
page read and write
4930000
heap
page read and write
4DFD000
stack
page read and write
51C4000
trusted library allocation
page read and write
888E000
stack
page read and write
4445000
trusted library allocation
page read and write
7E42000
trusted library allocation
page read and write
4799000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
6AA0000
heap
page read and write
735000
heap
page read and write
6D83000
heap
page read and write
8030000
trusted library allocation
page execute and read and write
74CD000
stack
page read and write
31A5000
trusted library allocation
page execute and read and write
7002000
heap
page read and write
6ECE000
stack
page read and write
81C7000
trusted library allocation
page read and write
2967000
heap
page read and write
4350000
heap
page read and write
433E000
stack
page read and write
81B0000
heap
page read and write
2A40000
heap
page read and write
EED000
trusted library allocation
page execute and read and write
6B3E000
stack
page read and write
4C1E000
stack
page read and write
5ED000
stack
page read and write
6AB0000
trusted library allocation
page read and write
54B0000
heap
page read and write
72D0000
trusted library allocation
page read and write
4B30000
heap
page read and write
3222000
heap
page read and write
2EEB000
heap
page read and write
54DE000
heap
page read and write
6F9E000
stack
page read and write
72C0000
trusted library allocation
page read and write
4961000
trusted library allocation
page read and write
587000
heap
page read and write
8281000
heap
page read and write
4AF0000
heap
page readonly
8E0000
heap
page read and write
67D000
trusted library allocation
page execute and read and write
2CE0000
heap
page read and write
300E000
stack
page read and write
6D65000
heap
page execute and read and write
2AF0000
heap
page read and write
894E000
stack
page read and write
4790000
trusted library allocation
page read and write
680000
trusted library allocation
page read and write
E56000
heap
page read and write
71EE000
stack
page read and write
319A000
trusted library allocation
page execute and read and write
6C09000
stack
page read and write
596000
heap
page read and write
1140000
heap
page read and write
8140000
trusted library allocation
page execute and read and write
47CA000
trusted library allocation
page read and write
799D000
stack
page read and write
42A0000
heap
page readonly
7B80000
trusted library allocation
page execute and read and write
7FF0000
trusted library allocation
page read and write
7C40000
heap
page read and write
28CD000
stack
page read and write
6A2000
trusted library allocation
page read and write
8270000
heap
page read and write
5489000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
4AB2000
trusted library allocation
page read and write
446C000
trusted library allocation
page read and write
5A5000
heap
page read and write
7E60000
trusted library allocation
page execute and read and write
59EB000
trusted library allocation
page read and write
9DB000
stack
page read and write
5A0000
heap
page read and write
4F6D000
trusted library allocation
page read and write
449B000
trusted library allocation
page read and write
6BBE000
stack
page read and write
709E000
stack
page read and write
7F1E0000
trusted library allocation
page execute and read and write
84B0000
trusted library allocation
page execute and read and write
5230000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
2CF0000
heap
page read and write
82D2000
heap
page read and write
6BFE000
stack
page read and write
8050000
trusted library allocation
page read and write
5A03000
trusted library allocation
page read and write
8460000
trusted library allocation
page execute and read and write
79E0000
trusted library allocation
page read and write
72C8000
heap
page read and write
6D8C000
heap
page read and write
44C7000
trusted library allocation
page read and write
495E000
trusted library allocation
page read and write
4F7000
stack
page read and write
2A99000
heap
page read and write
4526000
trusted library allocation
page read and write
4CD0000
heap
page read and write
7AB0000
trusted library allocation
page read and write
6177000
trusted library allocation
page read and write
44AA000
trusted library allocation
page read and write
6F10000
heap
page read and write
2D3D000
trusted library allocation
page read and write
7B70000
heap
page read and write
30BE000
stack
page read and write
6E2E000
stack
page read and write
81CA000
trusted library allocation
page read and write
72BA000
stack
page read and write
5140000
heap
page read and write
2A3A000
heap
page read and write
50FA000
trusted library allocation
page read and write
304F000
stack
page read and write
4E69000
trusted library allocation
page read and write
70A2000
trusted library allocation
page read and write
7050000
trusted library allocation
page read and write
744E000
stack
page read and write
748D000
stack
page read and write
5390000
heap
page execute and read and write
71E000
stack
page read and write
92E000
stack
page read and write
4400000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
804B000
trusted library allocation
page read and write
6E9E000
stack
page read and write
7AAB000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
7333000
heap
page read and write
3409000
trusted library allocation
page read and write
7690000
heap
page read and write
81AE000
stack
page read and write
23E0000
trusted library allocation
page read and write
46A6000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
890F000
stack
page read and write
2D44000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
6E2E000
stack
page read and write
4840000
heap
page read and write
86D0000
trusted library allocation
page execute and read and write
6FB0000
heap
page read and write
16C000
stack
page read and write
E06000
heap
page read and write
4D0E000
stack
page read and write
7B97000
trusted library allocation
page read and write
7B1D000
stack
page read and write
EF0000
heap
page read and write
3C20000
trusted library allocation
page read and write
6DC6000
heap
page read and write
8279000
heap
page read and write
6D0000
heap
page read and write
660000
trusted library allocation
page read and write
8490000
trusted library allocation
page execute and read and write
6F00000
heap
page read and write
48AB000
trusted library allocation
page read and write
6D10000
heap
page read and write
5198000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
8480000
trusted library allocation
page read and write
EE3000
trusted library allocation
page execute and read and write
818D000
stack
page read and write
6E50000
trusted library allocation
page execute and read and write
7361000
heap
page read and write
6B3E000
stack
page read and write
6FCA000
heap
page read and write
2D50000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
3137000
heap
page read and write
7300000
trusted library allocation
page read and write
6EAE000
stack
page read and write
2990000
trusted library allocation
page read and write
6E6E000
stack
page read and write
2E28000
heap
page read and write
62E000
stack
page read and write
7644000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
76E2000
heap
page read and write
75C0000
trusted library allocation
page read and write
6A6000
heap
page read and write
5DA2000
trusted library allocation
page read and write
6E03000
heap
page read and write
4C30000
heap
page read and write
8285000
heap
page read and write
7305000
heap
page read and write
E04000
heap
page read and write
10D0000
trusted library allocation
page read and write
10E2000
trusted library allocation
page read and write
2217000
trusted library allocation
page execute and read and write
6AB0000
heap
page read and write
4E01000
trusted library allocation
page read and write
72D6000
heap
page read and write
698000
heap
page read and write
6D2E000
stack
page read and write
81D0000
trusted library allocation
page read and write
711E000
stack
page read and write
62C0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
673000
trusted library allocation
page execute and read and write
6ABE000
stack
page read and write
81C0000
trusted library allocation
page read and write
880D000
stack
page read and write
31C8000
heap
page read and write
10F2000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
6AA0000
trusted library section
page read and write
587E000
stack
page read and write
2A16000
heap
page read and write
6FA7000
heap
page read and write
590000
heap
page read and write
6D6E000
stack
page read and write
21ED000
trusted library allocation
page execute and read and write
6BB7000
trusted library allocation
page read and write
4551000
trusted library allocation
page read and write
2E78000
stack
page read and write
72CE000
heap
page read and write
820E000
stack
page read and write
EE0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7D70000
heap
page read and write
7BA0000
trusted library allocation
page read and write
2212000
trusted library allocation
page read and write
68E5000
heap
page execute and read and write
47EE000
stack
page read and write
289C000
stack
page read and write
4270000
trusted library allocation
page read and write
6FA0000
heap
page read and write
6BBE000
stack
page read and write
6FA0000
trusted library allocation
page read and write
4B6C000
stack
page read and write
6B7A000
stack
page read and write
4C80000
heap
page read and write
8040000
trusted library allocation
page read and write
7CC7000
heap
page read and write
493E000
trusted library allocation
page read and write
2E3C000
stack
page read and write
7264000
heap
page read and write
67B000
heap
page read and write
4AEF000
stack
page read and write
50F0000
trusted library allocation
page read and write
570000
heap
page read and write
8490000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
75D000
stack
page read and write
4F7E000
trusted library allocation
page read and write
2C3F000
stack
page read and write
6ABE000
stack
page read and write
47F0000
heap
page execute and read and write
6DBD000
heap
page read and write
3B31000
trusted library allocation
page read and write
E49000
heap
page read and write
6D5B000
stack
page read and write
5E01000
trusted library allocation
page read and write
4EA9000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
31F7000
heap
page read and write
51E4000
trusted library allocation
page read and write
6EEB000
stack
page read and write
1230000
trusted library allocation
page read and write
4DF0000
heap
page execute and read and write
701D000
heap
page read and write
560000
heap
page read and write
834F000
heap
page read and write
7140000
trusted library allocation
page execute and read and write
29C3000
heap
page read and write
4944000
trusted library allocation
page read and write
3257000
heap
page read and write
31A2000
trusted library allocation
page read and write
494B000
trusted library allocation
page read and write
68DE000
stack
page read and write
7310000
trusted library allocation
page read and write
3220000
heap
page read and write
7722000
heap
page read and write
31C0000
heap
page read and write
68CD000
stack
page read and write
3401000
trusted library allocation
page read and write
285C000
stack
page read and write
29CA000
trusted library allocation
page execute and read and write
6DAB000
heap
page read and write
317D000
trusted library allocation
page execute and read and write
6BCD000
stack
page read and write
7F1F8000
trusted library allocation
page execute and read and write
5D74000
trusted library allocation
page read and write
68E0000
heap
page execute and read and write
7D10000
heap
page read and write
4475000
trusted library allocation
page read and write
71FE000
stack
page read and write
722E000
stack
page read and write
7AA0000
trusted library allocation
page read and write
3070000
heap
page read and write
45B1000
trusted library allocation
page read and write
52BC000
trusted library allocation
page read and write
4360000
heap
page execute and read and write
7A90000
trusted library allocation
page execute and read and write
6B70000
trusted library allocation
page read and write
69FB000
stack
page read and write
702F000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
10EA000
trusted library allocation
page execute and read and write
E2000
unkown
page readonly
6198000
trusted library allocation
page read and write
756D000
stack
page read and write
29B0000
trusted library allocation
page read and write
30FD000
stack
page read and write
72C0000
trusted library allocation
page execute and read and write
6FA2000
heap
page read and write
42CE000
stack
page read and write
DFA000
heap
page read and write
4CF3000
trusted library allocation
page read and write
7300000
heap
page read and write
4D8E000
stack
page read and write
5D69000
stack
page read and write
2930000
heap
page read and write
6A7E000
stack
page read and write
7060000
trusted library allocation
page read and write
6C12000
heap
page read and write
D90000
heap
page read and write
804D000
trusted library allocation
page read and write
4A10000
heap
page read and write
890D000
stack
page read and write
7D20000
trusted library allocation
page execute and read and write
5022000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
1A8000
stack
page read and write
6A3E000
stack
page read and write
3110000
heap
page read and write
6FDD000
stack
page read and write
58BF000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
7E90000
trusted library allocation
page read and write
4499000
trusted library allocation
page read and write
71BB000
stack
page read and write
727F000
heap
page read and write
2A49000
heap
page read and write
6DAE000
stack
page read and write
76A1000
heap
page read and write
2D72000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
54A0000
heap
page read and write
3190000
trusted library allocation
page read and write
29D0000
heap
page read and write
4F36000
trusted library allocation
page read and write
EBB000
heap
page read and write
580000
heap
page read and write
D8E000
stack
page read and write
7C4C000
heap
page read and write
750E000
stack
page read and write
4CE0000
trusted library allocation
page read and write
8345000
heap
page read and write
8210000
trusted library allocation
page read and write
78DE000
stack
page read and write
6D0000
heap
page read and write
43DB000
stack
page read and write
640000
trusted library section
page read and write
7031000
heap
page read and write
72F0000
trusted library allocation
page read and write
29EE000
stack
page read and write
6C0000
heap
page read and write
815E000
stack
page read and write
CF7000
stack
page read and write
790000
trusted library allocation
page execute and read and write
23F0000
heap
page read and write
2D43000
trusted library allocation
page execute and read and write
21F0000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
4493000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page execute and read and write
21E4000
trusted library allocation
page read and write
7670000
heap
page execute and read and write
6B0000
heap
page read and write
420E000
stack
page read and write
7080000
trusted library allocation
page read and write
82D9000
heap
page read and write
4CBB000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
4966000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
55BF000
trusted library allocation
page read and write
7FDA0000
trusted library allocation
page execute and read and write
2B6D000
trusted library allocation
page read and write
28EE000
stack
page read and write
52DC000
trusted library allocation
page read and write
6EDE000
stack
page read and write
29A3000
trusted library allocation
page execute and read and write
71C0000
heap
page read and write
992F000
stack
page read and write
5ABE000
stack
page read and write
2210000
trusted library allocation
page read and write
6D2D000
heap
page read and write
898E000
stack
page read and write
7330000
trusted library allocation
page read and write
4275000
trusted library allocation
page execute and read and write
473C000
stack
page read and write
46E8000
trusted library allocation
page read and write
772B000
heap
page read and write
6F5E000
stack
page read and write
7D08000
heap
page read and write
7E79000
trusted library allocation
page read and write
4C20000
trusted library section
page readonly
717E000
stack
page read and write
79D0000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
8160000
heap
page read and write
67E000
heap
page read and write
79B0000
trusted library allocation
page execute and read and write
32B8000
heap
page read and write
6FF4000
heap
page read and write
73CE000
stack
page read and write
6AFA000
stack
page read and write
4E4C000
trusted library allocation
page read and write
6D7F000
heap
page read and write
639000
stack
page read and write
4539000
trusted library allocation
page read and write
6310000
heap
page read and write
748E000
stack
page read and write
3050000
heap
page read and write
221B000
trusted library allocation
page execute and read and write
730E000
stack
page read and write
76E4000
heap
page read and write
5D82000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
6DEE000
stack
page read and write
7BF0000
trusted library allocation
page read and write
5A0B000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
7250000
heap
page read and write
4E27000
trusted library allocation
page read and write
713E000
stack
page read and write
59FC000
trusted library allocation
page read and write
7AE000
stack
page read and write
4942000
trusted library allocation
page read and write
681E000
stack
page read and write
2950000
heap
page read and write
2D4D000
trusted library allocation
page execute and read and write
61C0000
trusted library allocation
page execute and read and write
10E6000
trusted library allocation
page execute and read and write
10DD000
trusted library allocation
page execute and read and write
2A90000
heap
page read and write
4F61000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
7E80000
trusted library allocation
page read and write
71AE000
stack
page read and write
8472000
trusted library allocation
page read and write
7028000
heap
page read and write
6DEC000
heap
page read and write
5D9D000
trusted library allocation
page read and write
2E1B000
heap
page read and write
6DB6000
heap
page read and write
72C3000
heap
page read and write
295A000
heap
page read and write
6EA2000
heap
page read and write
82CC000
stack
page read and write
5D7E000
trusted library allocation
page read and write
7A80000
heap
page read and write
477C000
stack
page read and write
72A0000
trusted library allocation
page read and write
7D1F000
heap
page read and write
4272000
trusted library allocation
page read and write
29A4000
trusted library allocation
page read and write
7C44000
heap
page read and write
4ED2000
trusted library allocation
page read and write
72C5000
heap
page execute and read and write
42FE000
stack
page read and write
49F0000
trusted library allocation
page read and write
4933000
heap
page read and write
86A0000
trusted library allocation
page read and write
6DAE000
stack
page read and write
5461000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
778000
trusted library allocation
page read and write
84DE000
stack
page read and write
EE4000
trusted library allocation
page read and write
4972000
trusted library allocation
page read and write
420000
heap
page read and write
72D3000
heap
page read and write
4EEA000
trusted library allocation
page read and write
831C000
heap
page read and write
689E000
stack
page read and write
6D6C000
heap
page read and write
2CBE000
stack
page read and write
7D21000
heap
page read and write
6AE3000
heap
page read and write
48E0000
heap
page read and write
31A0000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
828E000
stack
page read and write
4F69000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
4325000
heap
page execute and read and write
82B3000
heap
page read and write
ED0000
trusted library allocation
page read and write
7FF3000
trusted library allocation
page read and write
7580000
trusted library allocation
page execute and read and write
2D59000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
723E000
stack
page read and write
4440000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
71BE000
stack
page read and write
2EE7000
heap
page read and write
8289000
heap
page read and write
7A80000
trusted library allocation
page read and write
807E000
stack
page read and write
6ED0000
trusted library allocation
page execute and read and write
239F000
stack
page read and write
7650000
trusted library allocation
page read and write
43ED000
stack
page read and write
2DE0000
heap
page read and write
719E000
stack
page read and write
57E000
stack
page read and write
2D6A000
trusted library allocation
page execute and read and write
72C0000
heap
page execute and read and write
400000
remote allocation
page execute and read and write
288E000
stack
page read and write
72D000
stack
page read and write
5879000
trusted library allocation
page read and write
4C40000
heap
page execute and read and write
21D0000
trusted library allocation
page read and write
6C8E000
stack
page read and write
4450000
heap
page read and write
4320000
heap
page execute and read and write
4920000
trusted library allocation
page read and write
692E000
stack
page read and write
871D000
stack
page read and write
6BFE000
stack
page read and write
76C4000
heap
page read and write
72B0000
trusted library allocation
page read and write
1F9000
stack
page read and write
824D000
stack
page read and write
459C000
stack
page read and write
445E000
stack
page read and write
DD8000
heap
page read and write
6910000
heap
page read and write
4A60000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
56FF000
stack
page read and write
75A0000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
7FD30000
trusted library allocation
page execute and read and write
7E7F000
trusted library allocation
page read and write
1198000
trusted library allocation
page read and write
452B000
trusted library allocation
page read and write
583F000
stack
page read and write
2202000
trusted library allocation
page read and write
2250000
heap
page execute and read and write
28D0000
heap
page read and write
6F1E000
stack
page read and write
524A000
trusted library allocation
page read and write
3FC000
stack
page read and write
6B3000
heap
page read and write
6E6A000
stack
page read and write
2200000
trusted library allocation
page read and write
2A07000
heap
page read and write
670000
heap
page read and write
6C4E000
stack
page read and write
6D49000
heap
page read and write
7BD0000
trusted library allocation
page read and write
4290000
trusted library allocation
page read and write
8690000
trusted library allocation
page read and write
6B93000
trusted library allocation
page read and write
6E6000
heap
page read and write
2206000
trusted library allocation
page execute and read and write
5D96000
trusted library allocation
page read and write
21FD000
trusted library allocation
page execute and read and write
6170000
trusted library allocation
page read and write
29F0000
heap
page read and write
2EF0000
heap
page read and write
4461000
trusted library allocation
page read and write
6DAE000
heap
page read and write
74D0000
heap
page read and write
4C94000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
31EA000
heap
page read and write
29D8000
heap
page read and write
35DE000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
6FED000
stack
page read and write
690B000
stack
page read and write
726D000
stack
page read and write
E6D000
heap
page read and write
71DA000
heap
page read and write
4CF5000
heap
page read and write
597E000
stack
page read and write
5D76000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
2240000
trusted library allocation
page execute and read and write
EF6000
heap
page read and write
6AFD000
stack
page read and write
6AC0000
trusted library allocation
page read and write
7C54000
heap
page read and write
E0000
unkown
page readonly
10F7000
trusted library allocation
page execute and read and write
6190000
trusted library allocation
page read and write
4BBE000
stack
page read and write
49E0000
heap
page read and write
482C000
trusted library allocation
page read and write
DD0000
heap
page read and write
There are 893 hidden memdumps, click here to show them.