IOC Report
r10072024085940.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
r10072024085940.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mcbxpec.fms.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2g0af0uo.c4b.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bur112n4.vuu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_darftneo.tma.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfyfk3ya.dqh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g2ide0yr.khe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gvdupxdf.out.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ia1mhcba.m00.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kue1o3yy.lqi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_om4vysac.n30.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_soyoeknt.bj2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w5mzxnxo.szq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wlgi3ebw.pka.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wnxuzmjh.qb0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x01r3um3.uls.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xhr21zmx.aig.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Jul 24 12:42:15 2024, mtime=Wed Jul 24 12:42:15 2024, atime=Wed Jul 24 12:42:15 2024, length=626688, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\r10072024085940.scr.exe
"C:\Users\user\Desktop\r10072024085940.scr.exe"
malicious
C:\Users\user\Desktop\r10072024085940.scr.exe
"C:\Users\user\Desktop\r10072024085940.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\r10072024085940.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'r10072024085940.scr.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
104.250.180.178
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.co0
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://tempuri.org/DataSet1.xsd
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 7 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
104.250.180.178
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9040000
trusted library section
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2A89000
trusted library allocation
page read and write
malicious
2A21000
trusted library allocation
page read and write
malicious
87C0000
heap
page read and write
711D000
stack
page read and write
DD1000
heap
page read and write
8212000
heap
page read and write
7BA0000
trusted library allocation
page read and write
6BB0000
heap
page read and write
2956000
trusted library allocation
page read and write
748B000
stack
page read and write
827E000
stack
page read and write
79D6000
heap
page read and write
8FCE000
stack
page read and write
26D0000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
842E000
stack
page read and write
3450000
trusted library allocation
page read and write
4D81000
trusted library allocation
page read and write
1077000
trusted library allocation
page execute and read and write
2AC6000
trusted library allocation
page read and write
8E4E000
stack
page read and write
567E000
trusted library allocation
page read and write
D37000
heap
page read and write
58EB000
trusted library allocation
page read and write
4B7A000
trusted library allocation
page read and write
25D9000
heap
page read and write
7489000
stack
page read and write
5C7E000
stack
page read and write
79FE000
stack
page read and write
88C0000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
7FFD000
trusted library allocation
page read and write
4B1D000
stack
page read and write
75DB000
stack
page read and write
2D4D000
heap
page read and write
74BE000
stack
page read and write
2904000
trusted library allocation
page read and write
6EC0000
heap
page read and write
8184000
heap
page read and write
7310000
trusted library allocation
page execute and read and write
54C4000
trusted library allocation
page read and write
8890000
heap
page read and write
5F10000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
5F2D000
trusted library allocation
page read and write
775B000
stack
page read and write
86F7000
trusted library allocation
page read and write
51D8000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7179000
stack
page read and write
5F79000
trusted library allocation
page read and write
78E9000
heap
page read and write
80AE000
stack
page read and write
8180000
heap
page read and write
5313000
heap
page read and write
761E000
stack
page read and write
6EEE000
stack
page read and write
4E5C000
stack
page read and write
8A39000
heap
page read and write
8A70000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page execute and read and write
3F02000
trusted library allocation
page read and write
DEA000
heap
page read and write
60E4000
trusted library allocation
page read and write
6DEE000
stack
page read and write
7D70000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
7DB2000
trusted library allocation
page read and write
6BBE000
stack
page read and write
1090000
trusted library allocation
page read and write
2B0E000
stack
page read and write
7400000
heap
page execute and read and write
CD0000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
4C1E000
stack
page read and write
6BBC000
heap
page read and write
43DE000
stack
page read and write
6C4D000
heap
page read and write
176000
heap
page read and write
412E000
stack
page read and write
1540000
trusted library allocation
page read and write
3360000
trusted library section
page read and write
3F52000
trusted library allocation
page read and write
73CF000
stack
page read and write
7BB0000
trusted library allocation
page read and write
2C78000
trusted library allocation
page read and write
87EB000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
7C66000
heap
page read and write
6EB4000
heap
page read and write
441F000
stack
page read and write
4F3D000
stack
page read and write
7A46000
heap
page read and write
5EC9000
stack
page read and write
8990000
heap
page read and write
7D40000
trusted library allocation
page read and write
7A4E000
stack
page read and write
5948000
trusted library allocation
page read and write
8194000
heap
page read and write
60F5000
trusted library allocation
page read and write
8D4B000
stack
page read and write
318E000
stack
page read and write
567C000
trusted library allocation
page read and write
87F0000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
7A70000
heap
page read and write
5F30000
heap
page read and write
790E000
stack
page read and write
7B10000
trusted library allocation
page read and write
8249000
heap
page read and write
DD3000
heap
page read and write
6FD0000
trusted library allocation
page read and write
3F40000
trusted library allocation
page read and write
8BBF000
trusted library allocation
page read and write
861D000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
1556000
heap
page read and write
6C6D000
stack
page read and write
58E5000
trusted library allocation
page read and write
8740000
trusted library allocation
page read and write
57DE000
trusted library allocation
page read and write
338D000
trusted library allocation
page execute and read and write
2920000
trusted library allocation
page read and write
777F000
stack
page read and write
33AA000
trusted library allocation
page execute and read and write
4CBC000
stack
page read and write
4C4A000
trusted library allocation
page read and write
881D000
stack
page read and write
6F6E000
heap
page read and write
5EDB000
trusted library allocation
page read and write
6CEE000
stack
page read and write
822D000
heap
page read and write
3472000
trusted library allocation
page read and write
56FE000
stack
page read and write
5EEE000
trusted library allocation
page read and write
2CE0000
heap
page readonly
4F51000
trusted library allocation
page read and write
60C000
unkown
page readonly
6C8A000
heap
page read and write
1F0000
heap
page read and write
8188000
heap
page read and write
7EF40000
trusted library allocation
page execute and read and write
40E0000
heap
page read and write
5136000
trusted library allocation
page read and write
435D000
stack
page read and write
5E14000
heap
page read and write
8110000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
330E000
stack
page read and write
8A6F000
stack
page read and write
2F1C000
stack
page read and write
56BA000
trusted library allocation
page read and write
5548000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
2830000
heap
page read and write
78C3000
heap
page read and write
5F14000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
AE0000
heap
page read and write
7D60000
trusted library allocation
page read and write
5390000
heap
page read and write
6C50000
trusted library allocation
page read and write
734E000
stack
page read and write
34F8000
heap
page read and write
4D2E000
stack
page read and write
104D000
trusted library allocation
page execute and read and write
CC0000
trusted library allocation
page read and write
4730000
heap
page read and write
1050000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2F58000
stack
page read and write
CED000
trusted library allocation
page execute and read and write
709F000
stack
page read and write
8440000
trusted library allocation
page read and write
5DCA000
stack
page read and write
46B0000
heap
page read and write
7C5D000
heap
page read and write
6BDC000
heap
page read and write
5DD0000
heap
page read and write
6ED0000
heap
page read and write
5F51000
trusted library allocation
page read and write
8810000
heap
page read and write
7DD0000
trusted library allocation
page read and write
78AF000
heap
page read and write
6040000
trusted library allocation
page read and write
794F000
stack
page read and write
88DA000
trusted library allocation
page read and write
422E000
stack
page read and write
6EAE000
stack
page read and write
7535000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
6C7F000
heap
page read and write
8000000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page execute and read and write
7F228000
trusted library allocation
page execute and read and write
608E000
stack
page read and write
52F3000
trusted library allocation
page read and write
6F60000
heap
page read and write
6CC1000
heap
page read and write
4E54000
trusted library allocation
page read and write
32CF000
heap
page read and write
7060000
trusted library section
page read and write
86FA000
trusted library allocation
page read and write
470E000
stack
page read and write
287E000
stack
page read and write
3356000
heap
page read and write
2A7F000
trusted library allocation
page read and write
7260000
heap
page read and write
4F40000
heap
page read and write
6C52000
heap
page read and write
7FA70000
trusted library allocation
page execute and read and write
7A84000
heap
page read and write
CD3000
trusted library allocation
page execute and read and write
7FA88000
trusted library allocation
page execute and read and write
78A3000
heap
page read and write
33F0000
heap
page read and write
5360000
trusted library allocation
page read and write
4DD0000
heap
page execute and read and write
3587000
heap
page read and write
576C000
trusted library allocation
page read and write
7310000
heap
page read and write
7AA0000
trusted library allocation
page execute and read and write
3459000
trusted library allocation
page read and write
79DF000
heap
page read and write
B10000
heap
page read and write
5F28000
trusted library allocation
page read and write
6AFF000
stack
page read and write
80D0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page execute and read and write
6CAB000
stack
page read and write
4D70000
heap
page read and write
4E9C000
stack
page read and write
32D7000
heap
page read and write
33DE000
stack
page read and write
8D6E000
stack
page read and write
6D9E000
stack
page read and write
78CE000
stack
page read and write
7D90000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
7314000
heap
page read and write
81FE000
stack
page read and write
170000
heap
page read and write
8BD0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
3BFE000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
87FC000
heap
page read and write
73FE000
stack
page read and write
2C6E000
stack
page read and write
60D0000
trusted library allocation
page read and write
5684000
trusted library allocation
page read and write
85FE000
stack
page read and write
81C2000
heap
page read and write
79A6000
heap
page read and write
6F50000
trusted library allocation
page read and write
81BE000
stack
page read and write
54A1000
trusted library allocation
page read and write
293B000
trusted library allocation
page read and write
4C7C000
stack
page read and write
1043000
trusted library allocation
page execute and read and write
7DB0000
trusted library allocation
page read and write
87E0000
trusted library allocation
page read and write
8897000
heap
page read and write
8A49000
heap
page read and write
7AB2000
heap
page read and write
750E000
stack
page read and write
4BDE000
stack
page read and write
7792000
heap
page read and write
7FD0000
heap
page read and write
4018000
trusted library allocation
page read and write
8E0E000
stack
page read and write
771E000
stack
page read and write
3F39000
trusted library allocation
page read and write
705E000
stack
page read and write
6ABE000
stack
page read and write
572000
unkown
page readonly
4E1E000
stack
page read and write
3420000
trusted library section
page read and write
2FD0000
heap
page read and write
2C72000
trusted library allocation
page read and write
34B0000
heap
page read and write
7405000
heap
page execute and read and write
6BBE000
heap
page read and write
87DE000
stack
page read and write
8BC0000
trusted library allocation
page read and write
688B000
stack
page read and write
6380000
heap
page read and write
79F0000
heap
page read and write
7880000
heap
page read and write
6F2D000
stack
page read and write
D0A000
trusted library allocation
page execute and read and write
252E000
stack
page read and write
8980000
heap
page read and write
8261000
heap
page read and write
3330000
heap
page read and write
53B0000
trusted library allocation
page execute and read and write
271E000
stack
page read and write
790C000
heap
page read and write
7C9E000
stack
page read and write
88D0000
trusted library allocation
page read and write
7A10000
heap
page read and write
4F90000
heap
page read and write
33B5000
trusted library allocation
page execute and read and write
3145000
heap
page read and write
3227000
heap
page read and write
4626000
trusted library allocation
page read and write
6390000
heap
page read and write
684E000
stack
page read and write
7A62000
heap
page read and write
334E000
stack
page read and write
7FAE000
stack
page read and write
4C27000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
8A50000
heap
page read and write
900F000
stack
page read and write
2590000
trusted library allocation
page read and write
26B2000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
12A0000
heap
page read and write
737E000
heap
page read and write
769E000
stack
page read and write
8450000
trusted library allocation
page read and write
33F8000
heap
page read and write
7A7C000
heap
page read and write
31CE000
stack
page read and write
8BE3000
trusted library allocation
page read and write
B00000
heap
page read and write
54BC000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
7162000
heap
page read and write
7A2E000
heap
page read and write
7B00000
trusted library allocation
page read and write
72A0000
trusted library section
page read and write
6E2B000
stack
page read and write
7A34000
heap
page read and write
8C5D000
stack
page read and write
6C06000
heap
page read and write
52FE000
stack
page read and write
81FC000
heap
page read and write
87F0000
heap
page read and write
3F70000
trusted library allocation
page read and write
8600000
trusted library allocation
page execute and read and write
449A000
stack
page read and write
129C000
stack
page read and write
D1E000
heap
page read and write
81C7000
heap
page read and write
2DB4000
heap
page read and write
806E000
stack
page read and write
87D0000
trusted library allocation
page read and write
7306000
heap
page read and write
7350000
heap
page read and write
294E000
trusted library allocation
page read and write
2AD5000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
53AE000
stack
page read and write
E03000
heap
page read and write
5665000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
87E0000
heap
page read and write
464C000
stack
page read and write
903F000
stack
page read and write
1A0000
heap
page read and write
3390000
trusted library allocation
page read and write
8610000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
7B60000
heap
page execute and read and write
68CD000
stack
page read and write
71FE000
stack
page read and write
6C23000
heap
page read and write
79DA000
heap
page read and write
874E000
stack
page read and write
5ED0000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
4BE2000
trusted library allocation
page read and write
76FF000
stack
page read and write
8998000
heap
page read and write
33F0000
heap
page read and write
26B7000
trusted library allocation
page execute and read and write
7F558000
trusted library allocation
page execute and read and write
2D5B000
heap
page read and write
6C14000
heap
page read and write
5811000
trusted library allocation
page read and write
25A0000
heap
page read and write
4B3D000
trusted library allocation
page read and write
5D80000
heap
page read and write
2820000
trusted library allocation
page execute and read and write
1EE000
stack
page read and write
445E000
stack
page read and write
7BBC000
heap
page read and write
88E0000
trusted library allocation
page read and write
585F000
stack
page read and write
3A77000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
885E000
stack
page read and write
DDF000
heap
page read and write
7A50000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
738E000
stack
page read and write
2C59000
trusted library allocation
page read and write
2D9B000
heap
page read and write
4EA0000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
570000
unkown
page readonly
6EB0000
heap
page read and write
8130000
trusted library allocation
page read and write
416E000
stack
page read and write
468C000
stack
page read and write
6DEE000
stack
page read and write
880C000
heap
page read and write
2FE0000
heap
page read and write
797000
stack
page read and write
7580000
heap
page read and write
86D0000
heap
page read and write
CE3000
trusted library allocation
page read and write
817E000
stack
page read and write
713E000
stack
page read and write
7B50000
trusted library allocation
page read and write
10B0000
heap
page read and write
2C40000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
80DA000
trusted library allocation
page read and write
2DFD000
heap
page read and write
7A8C000
heap
page read and write
723E000
stack
page read and write
7290000
heap
page read and write
7FC80000
trusted library allocation
page execute and read and write
7A10000
trusted library allocation
page read and write
7A8E000
stack
page read and write
3443000
trusted library allocation
page execute and read and write
2758000
stack
page read and write
79BE000
stack
page read and write
7F540000
trusted library allocation
page execute and read and write
2980000
trusted library allocation
page read and write
5EF6000
trusted library allocation
page read and write
7BB8000
heap
page read and write
567A000
trusted library allocation
page read and write
460E000
stack
page read and write
50A7000
trusted library allocation
page read and write
8984000
heap
page read and write
7F50000
trusted library allocation
page read and write
4737000
heap
page read and write
8920000
trusted library allocation
page read and write
50D4000
trusted library allocation
page read and write
2A10000
heap
page execute and read and write
7A30000
heap
page read and write
10E7000
heap
page read and write
88D7000
trusted library allocation
page read and write
74CE000
stack
page read and write
7D1D000
stack
page read and write
A00000
heap
page read and write
3384000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
439B000
stack
page read and write
87F4000
heap
page read and write
7C10000
trusted library allocation
page read and write
743E000
stack
page read and write
58E6000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
71B0000
heap
page execute and read and write
31F0000
heap
page read and write
CD4000
trusted library allocation
page read and write
7995000
heap
page read and write
690B000
stack
page read and write
1030000
trusted library allocation
page read and write
733D000
trusted library allocation
page read and write
73CD000
stack
page read and write
759B000
trusted library allocation
page read and write
878C000
stack
page read and write
5661000
trusted library allocation
page read and write
125E000
stack
page read and write
7510000
trusted library allocation
page execute and read and write
87DF000
trusted library allocation
page read and write
42C0000
heap
page read and write
87A2000
trusted library allocation
page read and write
4F60000
trusted library section
page read and write
106A000
trusted library allocation
page execute and read and write
2CDE000
stack
page read and write
7F63000
trusted library allocation
page read and write
4F0E000
stack
page read and write
4E52000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
3350000
heap
page read and write
2BDE000
stack
page read and write
5761000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
100C000
stack
page read and write
346A000
trusted library allocation
page execute and read and write
773E000
stack
page read and write
6E5E000
stack
page read and write
730C000
heap
page read and write
891E000
stack
page read and write
1165000
heap
page read and write
8F3E000
stack
page read and write
7D30000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
52EF000
trusted library allocation
page read and write
85F0000
heap
page read and write
2E3E000
stack
page read and write
7915000
heap
page read and write
32BA000
heap
page read and write
2F5D000
stack
page read and write
107B000
trusted library allocation
page execute and read and write
70FE000
stack
page read and write
6B39000
stack
page read and write
2D30000
heap
page read and write
4A34000
trusted library allocation
page read and write
60CC000
stack
page read and write
6B90000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
2B90000
heap
page read and write
79B8000
heap
page read and write
7250000
trusted library allocation
page read and write
290D000
trusted library allocation
page execute and read and write
4690000
heap
page execute and read and write
7FF0000
trusted library allocation
page read and write
7A1B000
trusted library allocation
page read and write
86F0000
trusted library allocation
page read and write
744E000
stack
page read and write
3E41000
trusted library allocation
page read and write
2D38000
heap
page read and write
823D000
stack
page read and write
77DB000
stack
page read and write
8DB0000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
354B000
heap
page read and write
D10000
heap
page read and write
6A90000
heap
page read and write
12A7000
heap
page read and write
72FE000
heap
page read and write
3475000
trusted library allocation
page execute and read and write
332E000
stack
page read and write
5635000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
32E9000
heap
page read and write
571E000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
BD0000
heap
page read and write
7BC0000
heap
page read and write
6ABE000
stack
page read and write
75C0000
trusted library allocation
page read and write
7071000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
79CC000
heap
page read and write
25A8000
heap
page read and write
8BA0000
trusted library allocation
page execute and read and write
51C0000
heap
page execute and read and write
1141000
heap
page read and write
7A60000
trusted library allocation
page read and write
80B0000
trusted library allocation
page execute and read and write
715C000
stack
page read and write
44C0000
heap
page execute and read and write
7FFB000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
2B8E000
stack
page read and write
507E000
stack
page read and write
3389000
trusted library allocation
page read and write
5CBB000
stack
page read and write
898C000
heap
page read and write
2910000
heap
page read and write
7F210000
trusted library allocation
page execute and read and write
5769000
trusted library allocation
page read and write
5DD5000
heap
page read and write
3380000
trusted library allocation
page read and write
2C44000
trusted library allocation
page read and write
6BD9000
heap
page read and write
2C60000
trusted library allocation
page read and write
7D80000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
34C8000
heap
page read and write
2BF0000
heap
page read and write
5F20000
trusted library allocation
page read and write
530E000
stack
page read and write
5664000
trusted library allocation
page read and write
1550000
heap
page read and write
2DF6000
heap
page read and write
85B3000
trusted library allocation
page read and write
2917000
heap
page read and write
D02000
trusted library allocation
page read and write
4240000
heap
page execute and read and write
5F02000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
2D88000
stack
page read and write
80FE000
stack
page read and write
6E1E000
stack
page read and write
4EAC000
trusted library allocation
page read and write
58D4000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
8BE0000
trusted library allocation
page read and write
8730000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
2962000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
A16E000
stack
page read and write
750E000
stack
page read and write
747F000
stack
page read and write
7BDE000
stack
page read and write
8139000
stack
page read and write
70DE000
stack
page read and write
1062000
trusted library allocation
page read and write
6E9E000
stack
page read and write
7C61000
heap
page read and write
8C10000
trusted library allocation
page execute and read and write
6F40000
trusted library allocation
page execute and read and write
105D000
trusted library allocation
page execute and read and write
452B000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
788E000
stack
page read and write
31F8000
heap
page read and write
53C0000
heap
page read and write
BE0000
heap
page read and write
4CA2000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
5DC0000
heap
page read and write
9060000
trusted library allocation
page execute and read and write
281E000
stack
page read and write
8E80000
trusted library allocation
page execute and read and write
32CA000
heap
page read and write
295D000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
34C0000
heap
page read and write
7302000
heap
page read and write
10A0000
trusted library allocation
page execute and read and write
3350000
heap
page read and write
7520000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
7BB0000
heap
page read and write
5EFD000
trusted library allocation
page read and write
344D000
trusted library allocation
page execute and read and write
6C18000
heap
page read and write
2C75000
trusted library allocation
page execute and read and write
88BE000
stack
page read and write
B5B000
stack
page read and write
883A000
heap
page read and write
79C5000
heap
page read and write
4D9E000
stack
page read and write
6FF0000
trusted library allocation
page read and write
7C5E000
stack
page read and write
D51000
heap
page read and write
3000000
heap
page read and write
5F71000
trusted library allocation
page read and write
86E0000
trusted library allocation
page execute and read and write
1210000
heap
page execute and read and write
291C000
stack
page read and write
2C90000
trusted library allocation
page read and write
599E000
stack
page read and write
8700000
trusted library allocation
page read and write
11EE000
stack
page read and write
5530000
trusted library section
page readonly
1066000
trusted library allocation
page execute and read and write
5310000
heap
page read and write
54C1000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
8988000
heap
page read and write
3FFE000
stack
page read and write
8430000
trusted library allocation
page read and write
1044000
trusted library allocation
page read and write
6DAA000
stack
page read and write
2646000
heap
page read and write
6379000
stack
page read and write
2C30000
trusted library allocation
page read and write
31E0000
trusted library section
page read and write
899C000
heap
page read and write
7AB0000
heap
page read and write
3F55000
trusted library allocation
page execute and read and write
7B0A000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
8DCD000
stack
page read and write
4010000
trusted library allocation
page read and write
7A00000
heap
page execute and read and write
47A2000
trusted library allocation
page read and write
10B8000
heap
page read and write
7C00000
trusted library allocation
page read and write
5D89000
trusted library allocation
page read and write
6D2E000
stack
page read and write
566D000
trusted library allocation
page read and write
2B4E000
stack
page read and write
889D000
stack
page read and write
79CF000
heap
page read and write
83EE000
stack
page read and write
4E50000
trusted library allocation
page read and write
6A81000
trusted library allocation
page read and write
5EDE000
trusted library allocation
page read and write
8832000
heap
page read and write
3410000
trusted library section
page read and write
6E2E000
stack
page read and write
6C9C000
stack
page read and write
8E70000
trusted library allocation
page read and write
81F6000
heap
page read and write
6C0F000
heap
page read and write
8884000
heap
page read and write
27D0000
heap
page read and write
2D18000
trusted library allocation
page read and write
10E4000
heap
page read and write
868E000
stack
page read and write
83A0000
trusted library allocation
page execute and read and write
6030000
trusted library allocation
page read and write
7FC0000
heap
page read and write
6C20000
heap
page execute and read and write
7E00000
trusted library allocation
page read and write
8BB0000
trusted library allocation
page read and write
5DA1000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
74FD000
stack
page read and write
4D30000
heap
page execute and read and write
75A0000
trusted library allocation
page read and write
76DA000
stack
page read and write
2E41000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
339E000
stack
page read and write
8E60000
trusted library allocation
page execute and read and write
8A42000
heap
page read and write
8808000
heap
page read and write
7B40000
trusted library allocation
page read and write
555E000
stack
page read and write
BC0000
heap
page read and write
7010000
trusted library allocation
page read and write
8F0B000
stack
page read and write
7C7F000
heap
page read and write
1072000
trusted library allocation
page read and write
87D0000
trusted library allocation
page execute and read and write
5DE9000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page execute and read and write
8F8C000
stack
page read and write
7B60000
trusted library allocation
page read and write
5ED6000
trusted library allocation
page read and write
744E000
stack
page read and write
5DBD000
stack
page read and write
86CE000
stack
page read and write
8D20000
trusted library allocation
page read and write
575E000
stack
page read and write
549F000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
47D000
stack
page read and write
40B0000
trusted library allocation
page execute and read and write
8875000
heap
page read and write
7A40000
trusted library allocation
page execute and read and write
2D4C000
stack
page read and write
6B7E000
stack
page read and write
740A000
stack
page read and write
4000000
heap
page readonly
41EB000
stack
page read and write
275D000
stack
page read and write
5C3E000
stack
page read and write
2C50000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
8A2E000
stack
page read and write
4245000
heap
page execute and read and write
85B0000
trusted library allocation
page read and write
40E7000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
3F50000
trusted library allocation
page read and write
5F35000
trusted library allocation
page read and write
63A9000
heap
page read and write
7BF2000
heap
page read and write
6B80000
heap
page execute and read and write
2DAF000
heap
page read and write
2C43000
trusted library allocation
page execute and read and write
76BE000
stack
page read and write
40C0000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
589E000
stack
page read and write
7FE0000
trusted library allocation
page execute and read and write
4F47000
heap
page read and write
7A90000
heap
page read and write
6F30000
trusted library allocation
page read and write
8A11000
heap
page read and write
7B50000
trusted library allocation
page read and write
861B000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
3498000
heap
page read and write
7BC4000
heap
page read and write
43E000
stack
page read and write
5708000
trusted library allocation
page read and write
82BF000
stack
page read and write
792E000
heap
page read and write
13AE000
stack
page read and write
711F000
stack
page read and write
2550000
heap
page read and write
7A05000
heap
page read and write
10DA000
heap
page read and write
4E72000
trusted library allocation
page read and write
32BE000
heap
page read and write
72F8000
heap
page read and write
29A0000
trusted library allocation
page read and write
6A70000
heap
page read and write
87F8000
heap
page read and write
2C70000
trusted library allocation
page read and write
6E6E000
stack
page read and write
6D6D000
stack
page read and write
7B80000
trusted library allocation
page execute and read and write
7D50000
trusted library allocation
page read and write
D18000
heap
page read and write
7B40000
trusted library allocation
page execute and read and write
5741000
trusted library allocation
page read and write
8BD0000
trusted library allocation
page read and write
8B82000
trusted library allocation
page read and write
3490000
heap
page read and write
85A0000
trusted library allocation
page read and write
6B7F000
stack
page read and write
7B30000
trusted library allocation
page read and write
5DF0000
heap
page read and write
8804000
heap
page read and write
3120000
heap
page read and write
7B07000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
CF0000
heap
page read and write
7A00000
trusted library allocation
page execute and read and write
1070000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
8BB9000
trusted library allocation
page read and write
517F000
stack
page read and write
8A80000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
73BE000
stack
page read and write
2D08000
heap
page read and write
7580000
trusted library allocation
page read and write
887D000
stack
page read and write
6BA0000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
4EB0000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
2A0E000
stack
page read and write
7DE0000
trusted library allocation
page read and write
8D8E000
stack
page read and write
87D9000
trusted library allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
26BB000
trusted library allocation
page execute and read and write
C5F000
stack
page read and write
72CE000
heap
page read and write
54BD000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
44D1000
trusted library allocation
page read and write
33E0000
heap
page readonly
7AFE000
stack
page read and write
6FA0000
trusted library allocation
page read and write
7F350000
trusted library allocation
page execute and read and write
818C000
heap
page read and write
7DC0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
2885000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
72F5000
heap
page read and write
6C33000
heap
page read and write
80D7000
trusted library allocation
page read and write
3F4A000
trusted library allocation
page execute and read and write
311E000
stack
page read and write
4897000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
889C000
heap
page read and write
2663000
heap
page read and write
7B0D000
stack
page read and write
D53000
heap
page read and write
3F40000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
118000
stack
page read and write
7280000
heap
page read and write
759D000
stack
page read and write
7B10000
trusted library allocation
page read and write
DC000
stack
page read and write
534F000
stack
page read and write
C9E000
stack
page read and write
2880000
trusted library allocation
page read and write
765E000
stack
page read and write
4ED6000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
6C64000
heap
page read and write
B5E000
stack
page read and write
8220000
heap
page read and write
4F5F000
stack
page read and write
8DB3000
trusted library allocation
page read and write
7FEF000
stack
page read and write
5FB8000
trusted library allocation
page read and write
63A7000
heap
page read and write
4E29000
trusted library allocation
page read and write
2D67000
heap
page read and write
3383000
trusted library allocation
page execute and read and write
6C25000
heap
page execute and read and write
52B0000
heap
page execute and read and write
4DA0000
heap
page readonly
D06000
trusted library allocation
page execute and read and write
7EF58000
trusted library allocation
page execute and read and write
4741000
trusted library allocation
page read and write
730B000
stack
page read and write
4E69000
trusted library allocation
page read and write
701C000
stack
page read and write
8910000
trusted library allocation
page read and write
3357000
heap
page read and write
5DE0000
heap
page read and write
2903000
trusted library allocation
page execute and read and write
4F93000
heap
page read and write
8ECD000
stack
page read and write
69A000
stack
page read and write
8750000
trusted library allocation
page read and write
6AFD000
stack
page read and write
7902000
heap
page read and write
5EE2000
trusted library allocation
page read and write
2E2E000
heap
page read and write
80C0000
trusted library allocation
page execute and read and write
522D000
trusted library allocation
page read and write
28CE000
stack
page read and write
89C2000
heap
page read and write
8620000
trusted library allocation
page read and write
6DDD000
stack
page read and write
8382000
trusted library allocation
page read and write
7371000
heap
page read and write
72CD000
stack
page read and write
5540000
heap
page read and write
7C40000
heap
page read and write
79A4000
heap
page read and write
87ED000
trusted library allocation
page read and write
8198000
heap
page read and write
6F60000
trusted library allocation
page read and write
4DB8000
trusted library allocation
page read and write
7662000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page execute and read and write
7A1D000
trusted library allocation
page read and write
27E0000
heap
page read and write
7DB2000
trusted library allocation
page read and write
80B0000
heap
page read and write
5BFE000
stack
page read and write
4BE9000
trusted library allocation
page read and write
10CE000
heap
page read and write
6F80000
trusted library allocation
page read and write
3AC5000
trusted library allocation
page read and write
406C000
stack
page read and write
6EAB000
stack
page read and write
8F4E000
stack
page read and write
7B50000
trusted library allocation
page read and write
1179000
heap
page read and write
7950000
heap
page read and write
8800000
heap
page read and write
3543000
heap
page read and write
2D30000
heap
page read and write
7ACE000
stack
page read and write
79BE000
heap
page read and write
2995000
trusted library allocation
page read and write
6C2E000
heap
page read and write
7270000
heap
page execute and read and write
54D1000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
725E000
stack
page read and write
7907000
heap
page read and write
8267000
heap
page read and write
6C31000
heap
page read and write
8250000
heap
page read and write
41AD000
stack
page read and write
33A0000
trusted library allocation
page read and write
51BE000
stack
page read and write
3590000
heap
page read and write
779D000
stack
page read and write
6910000
heap
page read and write
863E000
stack
page read and write
627D000
stack
page read and write
3440000
trusted library allocation
page read and write
87C0000
trusted library allocation
page execute and read and write
34EB000
heap
page read and write
74CE000
stack
page read and write
4EDC000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page read and write
8DAE000
stack
page read and write
8190000
heap
page read and write
78FE000
heap
page read and write
3140000
heap
page read and write
B7DE000
stack
page read and write
52CE000
stack
page read and write
3460000
trusted library allocation
page read and write
7323000
heap
page read and write
321A000
heap
page read and write
6B3E000
stack
page read and write
551E000
stack
page read and write
2D00000
heap
page read and write
2900000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
7C1E000
stack
page read and write
59EB000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
6104000
trusted library allocation
page read and write
25CC000
heap
page read and write
3FBE000
stack
page read and write
60FB000
trusted library allocation
page read and write
71B5000
heap
page execute and read and write
5538000
trusted library allocation
page read and write
88DE000
stack
page read and write
3370000
trusted library allocation
page read and write
7BB4000
heap
page read and write
40AC000
stack
page read and write
8700000
trusted library allocation
page execute and read and write
CF8000
heap
page read and write
1128000
heap
page read and write
63C4000
heap
page read and write
428F000
stack
page read and write
7CDE000
stack
page read and write
8843000
heap
page read and write
271C000
stack
page read and write
78E4000
heap
page read and write
F0E000
stack
page read and write
6E6E000
stack
page read and write
8A15000
heap
page read and write
2B95000
heap
page read and write
7A8E000
stack
page read and write
There are 1006 hidden memdumps, click here to show them.